{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T17:00:55Z","timestamp":1774976455654,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"The Tai Shan Industry leading talent project","award":["tscy20180416"],"award-info":[{"award-number":["tscy20180416"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>To realize the encryption of document information, authority authentication, and traceability of historical records, we propose a trusted verification scheme (TVS) for office documents to ensure security. Specifically, the scheme is realized by timestamps, smart contracts (or chaincode), and other blockchain technologies. It is based on the features of blockchain, such as security, credibility, immutability, and traceability of network behavior. And the TVS stores users and documents information through blockchain; it can monitor the state changes of office documents in real time by setting the trigger conditions of smart contracts. The experiment indicates that we have realized the real-time monitoring of data and the traceability of historical records. Moreover, we have achieved the purpose of document encryption and authority authentication, ensuring the authenticity and objectivity of data, avoiding the illegal tampering of malicious users to realize the trusted verification for documents.<\/jats:p>","DOI":"10.1007\/s40747-021-00617-1","type":"journal-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T07:02:34Z","timestamp":1641366154000},"page":"2865-2877","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["TVS: a trusted verification scheme for office documents based on blockchain"],"prefix":"10.1007","volume":"9","author":[{"given":"Xue","family":"Zhai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5705-1218","authenticated-orcid":false,"given":"Shanchen","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sibo","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,5]]},"reference":[{"key":"617_CR1","unstructured":"Li XS Research on Authenticated Encryption Technology for Important Information Document System. PhD thesis, Guizhou University"},{"key":"617_CR2","doi-asserted-by":"crossref","unstructured":"Chowdhury M, Colman A, Kabir MA, Han J, Sarda P (2018) Blockchain as a notarization service for data sharing with personal data store. pp 1330\u20131335","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00183"},{"key":"617_CR3","unstructured":"Chao Y, Xu M, Si X, Li B (2017) Blockchain with accountable cp-abe: How to effectively protect the electronic documents. In: IEEE international conference on parallel & distributed systems"},{"key":"617_CR4","doi-asserted-by":"crossref","unstructured":"Zhu XX, Fan T (2019) Research on application of blockchain and identity-based cryptography. In: 2018 4TH international conference on environmental science and material application","DOI":"10.1088\/1755-1315\/252\/4\/042095"},{"key":"617_CR5","unstructured":"Wang T, Wen-Ping MA, Luo W (2019) Information sharing and secure multi-party computing model based on blockchain. Computer confernce"},{"key":"617_CR6","doi-asserted-by":"crossref","unstructured":"Tian H, Wang J, Chang CC, Quan H (2020) Public auditing of log integrity for shared cloud storage systems via blockchain. Wirel Netw 1\u201316","DOI":"10.1007\/s11276-020-02373-5"},{"key":"617_CR7","first-page":"1","volume":"12","author":"S Datta","year":"2021","unstructured":"Datta S, Sinha D (2021) Besddffs: blockchain and edgedrone based secured data delivery for forest fire surveillance. Peer-to-Peer Netw Appl 12:1\u201330","journal-title":"Peer-to-Peer Netw Appl"},{"key":"617_CR8","doi-asserted-by":"crossref","unstructured":"Qiao SB, Pang SC, Luo G, Pan SL, Chen TT, Lv ZH (2021) Flds: An intelligent feature learning detection system for visualizing medical images supporting fetal four-chamber views. IEEE J Biomed Health Inf 1","DOI":"10.1109\/JBHI.2021.3091579"},{"key":"617_CR9","doi-asserted-by":"crossref","unstructured":"Qiao SB, Pang SC, Zhai X, Wang M, Cheng XC (2020) Human body multiple parts parsing for person reidentification based on exception. Int J Comput Intell Syst 14(1)","DOI":"10.2991\/ijcis.d.201222.001"},{"key":"617_CR10","doi-asserted-by":"crossref","unstructured":"Qiao SB, Pang SC, Luo G, Pan SL, Yu ZC, Chen TT, Lv ZH (2022) Rlds: an explainable residual learning diagnosis system for fetal congenital heart disease. Future Gener Comput Syst 128: 205\u2013218","DOI":"10.1016\/j.future.2021.10.001"},{"key":"617_CR11","doi-asserted-by":"crossref","unstructured":"Qiao SB, Pang SC, Wang M, Zhai X, Dai F (2021) Online video popularity regression prediction model with multichannel dynamic scheduling based on user behavior. Chin J Electron 30(5): 876\u2013884","DOI":"10.1049\/cje.2021.06.010"},{"key":"617_CR12","doi-asserted-by":"crossref","unstructured":"Zhu XX, Wang D (2019) Application of blockchain in document certification, asset trading and payment reconciliation. In: 2018 international symposium on power electronics and control engineering (ISPECE 2018)","DOI":"10.1088\/1742-6596\/1187\/5\/052080"},{"key":"617_CR13","doi-asserted-by":"crossref","unstructured":"Sharma B, Sekharan CN, Zuo (F) (2019) Merkle-tree based approach for ensuring integrity of electronic medical records. In: 2018 9th IEEE annual ubiquitous computing, electronics & mobile communication conference (UEMCON)","DOI":"10.1109\/UEMCON.2018.8796607"},{"issue":"4","key":"617_CR14","doi-asserted-by":"publisher","first-page":"634","DOI":"10.3390\/electronics9040634","volume":"9","author":"X Jia","year":"2020","unstructured":"Jia X, Hu N, Su S, Yin S, Zhang C (2020) Irba: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4):634","journal-title":"Electronics"},{"issue":"99","key":"617_CR15","first-page":"1","volume":"PP","author":"Prabhakar Krishnan","year":"2021","unstructured":"Krishnan Prabhakar, Jain Kurunandan, Achuthan Krishnashree, Buyya Rajkumar (2021) Software-defined security-by-contract for blockchain-enabled mud-aware industrial iot edge networks. IEEE Trans Industr Inf PP(99):1","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"617_CR16","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen W, Qin J, Yu J, Hao R, Hu J (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331\u2013346","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"617_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/ACCESS.2020.3022746","volume":"8","author":"M Toapanta","year":"2020","unstructured":"Toapanta M, Quimis Oae, Mafla E, Maciel R (2020) Analysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks. IEEE Access 8:18","journal-title":"IEEE Access"},{"key":"617_CR18","doi-asserted-by":"crossref","unstructured":"Rana R, Zaeem RN, Barber KS (2019) An assessment of blockchain identity solutions: minimizing risk and liability of authentication","DOI":"10.1145\/3350546.3352497"},{"issue":"1","key":"617_CR19","first-page":"1","volume":"PP","author":"W Ding","year":"2016","unstructured":"Ding W, Cheng H, He D, Ping W (2016) On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J PP(1):1\u201310","journal-title":"IEEE Syst J"},{"key":"617_CR20","doi-asserted-by":"crossref","unstructured":"Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 20632\u201320640 10.1109\/ACCESS.2018.2809426","DOI":"10.1109\/ACCESS.2018.2809426"},{"issue":"09","key":"617_CR21","first-page":"283","volume":"31","author":"ZW Zhang","year":"2020","unstructured":"Zhang ZW, Wang GR, Xu JL, Du XY (2020) Survey on data management in blockchain systems. J Softw 31(09):283\u2013305","journal-title":"J Softw"},{"key":"617_CR22","unstructured":"Liu YZ, Liu JW, Zhang ZY, Tong-Ge XU, Hui YU (2019) Overview on blockchain consensus mechanisms. J Cryptologic Res 6(4): 395\u2013432"},{"key":"617_CR23","unstructured":"Shao QF, Zhang Z, Zhu YC, Zhou AY (2019) Survey of enterprise blockchains. J Softw 30(9): 2571\u20132592"},{"key":"617_CR24","doi-asserted-by":"crossref","unstructured":"Szabo N (1997) Formalizing and securing relationship on public networks. First Monday 2(9)","DOI":"10.5210\/fm.v2i9.548"},{"issue":"009","key":"617_CR25","first-page":"225","volume":"028","author":"Y Fang","year":"2019","unstructured":"Fang Y, Cong LH, Yang ZB (2019) Study on digital smart contract based on blockchian. Comput Syst Appl 028(009):225\u2013231","journal-title":"Comput Syst Appl"},{"key":"617_CR26","doi-asserted-by":"crossref","unstructured":"Harris CG (2019) The risks and challenges of implementing ethereum smart contracts. In: 2019 IEEE international conference on blockchain and cryptocurrency (ICBC)","DOI":"10.1109\/BLOC.2019.8751493"},{"issue":"11","key":"617_CR27","first-page":"7","volume":"46","author":"JL Fan","year":"2019","unstructured":"Fan JL, Li XH, Nie TZ, Yu G (2019) Survey on smart contract based on blockchain system. Comput Sci 46(11):7\u201316","journal-title":"Comput Sci"},{"key":"617_CR28","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.compeleceng.2019.03.014","volume":"76","author":"N Nizamuddin","year":"2019","unstructured":"Nizamuddin N, Salah K, Ajmal Azad M, Arshad J, Rehman MH (2019) Decentralized document version control using ethereum blockchain and ipfs. Comput Electric Eng 76:183\u2013197","journal-title":"Comput Electric Eng"},{"key":"617_CR29","doi-asserted-by":"crossref","unstructured":"Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts (sok). In: International conference on principles of security & trust","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"617_CR30","doi-asserted-by":"crossref","unstructured":"Marino B, Juels A (2016) Setting standards for altering and undoing smart contracts. In: Rule technologies: research, tools, and applications","DOI":"10.1007\/978-3-319-42019-6_10"},{"issue":"005","key":"617_CR31","first-page":"969","volume":"041","author":"QF Shao","year":"2018","unstructured":"Shao QF, Jin CQ, Zhang Z, Qian WN, Zhou AY (2018) Blockchain: architecture and research progress. Chin J Comput 041(005):969\u2013988","journal-title":"Chin J Comput"},{"key":"617_CR32","volume-title":"The core technologies of hyperledger fabric","author":"SB Chen","year":"2020","unstructured":"Chen SB, Zheng SH, Tong YJ (2020) The core technologies of hyperledger fabric. Publishing House of Electronics Industry, Beijing"},{"issue":"9","key":"617_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.2017.3571064","volume":"50","author":"T Aste","year":"2017","unstructured":"Aste T, Tasca P, Matteo TD (2017) Blockchain technologies: the foreseeable impact on society and industry. Computer 50(9):18\u201328","journal-title":"Computer"},{"key":"617_CR34","doi-asserted-by":"crossref","unstructured":"Androulaki E, Manevich Y, Muralidharan S, Murthy C, Laventman G (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: the thirteenth EuroSys conference","DOI":"10.1145\/3190508.3190538"},{"key":"617_CR35","unstructured":"Kapritsos M, Yang W, Quema V, Clement A, Dahlin M (2012) All about eve: execute-verify replication for multi-core servers. In: Usenix conference on operating systems design & implementation"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00617-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00617-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00617-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:02:55Z","timestamp":1686330175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00617-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,5]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["617"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00617-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,5]]},"assertion":[{"value":"15 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no declaration of conflict of interest by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}