{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:09:27Z","timestamp":1740175767190,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272192"],"award-info":[{"award-number":["62272192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100015800","name":"Jilin Province Development and Reform Commission","doi-asserted-by":"crossref","award":["2021C044-1","2021C045-9"],"award-info":[{"award-number":["2021C044-1","2021C045-9"]}],"id":[{"id":"10.13039\/100015800","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100013061","name":"Jilin Scientific and Technological Development Program","doi-asserted-by":"publisher","award":["20210201080GX","20210202129NC","20200101146FG"],"award-info":[{"award-number":["20210201080GX","20210202129NC","20200101146FG"]}],"id":[{"id":"10.13039\/501100013061","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Mutual selection (the process of two types of objects choosing each other) often occurs in practical applications, such as those concerning financial credit. Considering the increasing demands for credibility, traditional artificial methods often cannot satisfy the corresponding requirements for security and transparency. Blockchain technology has the characteristics of decentralization, traceability, transparency, and being tamper-resistant, making it a potential method for solving the abovementioned problems. However, the existing consensus algorithms have some shortcomings in terms of efficiency, fault tolerance, security, and other relevant aspects, rendering them unsuitable for direct implementation in a mutual selection scenario. In this study, a system for mutual selection operations, denoted as \u201cMuSelect Chain,\" is established. First, the institution information initialization method on blockchain is developed via a smart contract, ensuring the authenticity of information stored on the chain. Second, a mutual selection relationship confirmation algorithm is designed to ensure a reliable automated mutual selection process. Next, considering the characteristics of nodes participating in the network, a consensus algorithm called \u201cProof-of-Leadership\u201d is proposed to ensure consistency of information stored by different nodes on the chain. Subsequently, an incentive mechanism is established with the focus on improving MuSelect Chain efficiency. Finally, a MuSelect Chain prototype is built. Simulation results prove that the proposed MuSelect Chain is secure with strong fault tolerance.<\/jats:p>","DOI":"10.1007\/s40747-023-01270-6","type":"journal-article","created":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T09:03:09Z","timestamp":1701075789000},"page":"2515-2529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MuSelect Chain: trusted decentralized mutual selection through blockchain"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5115-8137","authenticated-orcid":false,"given":"Xiaohu","family":"Shi","sequence":"first","affiliation":[]},{"given":"Ying","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Zhongqi","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9077-5526","authenticated-orcid":false,"given":"Deyin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"1270_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus Rev 21260"},{"key":"1270_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telemat Inform 36:55\u201381","journal-title":"Telemat Inform"},{"key":"1270_CR3","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292\u20132303","journal-title":"IEEE Access"},{"issue":"5","key":"1270_CR4","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1109\/JBHI.2021.3097237","volume":"26","author":"H Ghayvat","year":"2021","unstructured":"Ghayvat H, Pandya S, Bhattacharya P, Zuhair M, Rashid M, Hakak S, Dev K (2021) Cp-bdhca: blockchain-based confidentiality-privacy preserving big data scheme for healthcare clouds and applications. IEEE J Biomed Health Inf 26(5):1937\u20131948","journal-title":"IEEE J Biomed Health Inf"},{"issue":"7862","key":"1270_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1038\/s41586-021-03583-3","volume":"594","author":"S Warnat-Herresthal","year":"2021","unstructured":"Warnat-Herresthal S, Schultze H, Shastry KL, Manamohan S, Mukherjee S, Garg V, Sarveswara R, H\u00e4ndler K, Pickkers P, Aziz NA et al (2021) Swarm learning for decentralized and confidential clinical machine learning. Nature 594(7862):265\u2013270","journal-title":"Nature"},{"issue":"5","key":"1270_CR6","doi-asserted-by":"publisher","first-page":"3915","DOI":"10.1109\/JIOT.2020.3025953","volume":"8","author":"H Xu","year":"2020","unstructured":"Xu H, Zhang L, Onireti O, Fang Y, Buchanan WJ, Imran MA (2020) Beeptrace: blockchain-enabled privacy-preserving contact tracing for covid-19 pandemic and beyond. IEEE Internet Things J 8(5):3915\u20133929","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1270_CR7","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s40747-021-00549-w","volume":"8","author":"N Sammeta","year":"2022","unstructured":"Sammeta N, Parthiban L (2022) Hyperledger blockchain enabled secure medical record management with deep learning-based diagnosis model. Complex Intell Syst 8(1):625\u2013640","journal-title":"Complex Intell Syst"},{"key":"1270_CR8","doi-asserted-by":"publisher","first-page":"5112","DOI":"10.1109\/ACCESS.2018.2789929","volume":"6","author":"M Turkanovi\u0107","year":"2018","unstructured":"Turkanovi\u0107 M, H\u00f6lbl M, Ko\u0161i\u010d K, Heri\u010dko M, Kami\u0161ali\u0107 A (2018) Eductx: a blockchain-based higher education credit platform. IEEE Access 6:5112\u20135127","journal-title":"IEEE Access"},{"key":"1270_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telemat Inf 36:55\u201381","journal-title":"Telemat Inf"},{"issue":"1","key":"1270_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s12528-019-09209-y","volume":"32","author":"D Lizcano","year":"2020","unstructured":"Lizcano D, Lara JA, White B, Aljawarneh S (2020) Blockchain-based approach to create a model of trust in open and ubiquitous higher education. J Comput High Educ 32(1):109\u2013134","journal-title":"J Comput High Educ"},{"issue":"2","key":"1270_CR11","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2018","unstructured":"Yang Z, Yang K, Lei L, Zheng K, Leung VC (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J 6(2):1495\u20131505","journal-title":"IEEE Internet Things J"},{"key":"1270_CR12","unstructured":"King S, Nadal S (2012) Ppcoin: peer-to-peer crypto-currency with proof-of-stake. Self-published paper, August, vol 19(1)"},{"key":"1270_CR13","doi-asserted-by":"publisher","first-page":"73295","DOI":"10.1109\/ACCESS.2019.2918000","volume":"7","author":"K Salah","year":"2019","unstructured":"Salah K, Nizamuddin N, Jayaraman R, Omar M (2019) Blockchain-based soybean traceability in agricultural supply chain. IEEE Access 7:73295\u201373305","journal-title":"IEEE Access"},{"key":"1270_CR14","unstructured":"Tian F (2017) A supply chain traceability system for food safety based on HACCP, blockchain & internet of things. In: 2017 International conference on service systems and service management. IEEE, pp 1\u20136"},{"key":"1270_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.09.004","volume":"52","author":"D Bumblauskas","year":"2020","unstructured":"Bumblauskas D, Mann A, Dugan B, Rittmer J (2020) A blockchain use case in food distribution: do you know where your food has been? Int J Inf Manage 52:102008","journal-title":"Int J Inf Manage"},{"issue":"1","key":"1270_CR16","first-page":"3712","volume":"1","author":"R Kamath","year":"2018","unstructured":"Kamath R (2018) Food traceability on blockchain: Walmart\u2019s pork and mango pilots with IBM. J Br Blockchain Assoc 1(1):3712","journal-title":"J Br Blockchain Assoc"},{"issue":"18","key":"1270_CR17","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) Fairaccess: a new blockchain-based access control framework for the internet of things. Secur Commun Netw 9(18):5943\u20135964","journal-title":"Secur Commun Netw"},{"key":"1270_CR18","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for iot security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops). IEEE, pp 618\u2013623","DOI":"10.1109\/PERCOMW.2017.7917634"},{"issue":"6","key":"1270_CR19","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2019","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2019) Blockchain and federated learning for privacy-preserved data sharing in industrial iot. IEEE Trans Ind Inf 16(6):4177\u20134186","journal-title":"IEEE Trans Ind Inf"},{"key":"1270_CR20","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s40747-021-00489-5","volume":"9","author":"SK Jain","year":"2021","unstructured":"Jain SK, Kesswani N (2021) A noise-based privacy preserving model for internet of things. Complex Intell Syst 9:3655\u20133679","journal-title":"Complex Intell Syst"},{"issue":"1","key":"1270_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3419102","volume":"21","author":"Z Yan","year":"2021","unstructured":"Yan Z, Peng L, Feng W, Yang LT (2021) Social-chain: decentralized trust evaluation based on blockchain in pervasive social networking. ACM Trans Internet Technol (TOIT) 21(1):1\u201328","journal-title":"ACM Trans Internet Technol (TOIT)"},{"key":"1270_CR22","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7562848","volume":"2022","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Bin S, Sun G (2022) Research on information propagation model in social network based on blockchain. Discrete Dyn Nat Soc 2022:7562848","journal-title":"Discrete Dyn Nat Soc"},{"issue":"4","key":"1270_CR23","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TEM.2020.2971865","volume":"67","author":"M Guerar","year":"2020","unstructured":"Guerar M, Merlo A, Migliardi M, Palmieri F, Verderame L (2020) A fraud-resilient blockchain-based solution for invoice financing. IEEE Trans Eng Manage 67(4):1086\u20131098","journal-title":"IEEE Trans Eng Manage"},{"key":"1270_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2019.119854","volume":"151","author":"S Ahluwalia","year":"2020","unstructured":"Ahluwalia S, Mahto RV, Guerrero M (2020) Blockchain technology and startup financing: a transaction cost economics perspective. Technol Forecast Soc Chang 151:119854","journal-title":"Technol Forecast Soc Chang"},{"key":"1270_CR25","unstructured":"Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In: 2014 USENIX annual technical conference (Usenix ATC 14), pp 305\u2013319"},{"key":"1270_CR26","unstructured":"Larimer D (2014) Delegated proof-of-stake (DPOS). Bitshare Whitepaper 81:85"},{"issue":"7","key":"1270_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal I, Sirer EG (2018) Majority is not enough: bitcoin mining is vulnerable. Commun ACM 61(7):95\u2013102","journal-title":"Commun ACM"},{"issue":"1","key":"1270_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3430502","volume":"21","author":"Y Sun","year":"2020","unstructured":"Sun Y, Xue R, Zhang R, Su Q, Gao S (2020) Rtchain: a reputation system with transaction and consensus incentives for e-commerce blockchain. ACM Trans Internet Technol (TOIT) 21(1):1\u201324","journal-title":"ACM Trans Internet Technol (TOIT)"},{"key":"1270_CR29","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: International workshop on peer-to-peer systems. Springer, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"1270_CR30","doi-asserted-by":"crossref","unstructured":"Micali S, Rabin M, Vadhan S (1999) Verifiable random functions. In: 40th annual symposium on foundations of computer science (cat. No. 99CB37039). IEEE, pp 120\u2013130","DOI":"10.1109\/SFFCS.1999.814584"},{"issue":"3","key":"1270_CR31","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Techn J 27(3):379\u2013423","journal-title":"Bell Syst Techn J"},{"key":"1270_CR32","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.future.2019.08.005","volume":"102","author":"EK Wang","year":"2020","unstructured":"Wang EK, Liang Z, Chen C-M, Kumari S, Khan MK (2020) Porx: a reputation incentive scheme for blockchain consensus of IJOT. Futur Gener Comput Syst 102:140\u2013151","journal-title":"Futur Gener Comput Syst"},{"key":"1270_CR33","doi-asserted-by":"crossref","unstructured":"Bonneau J, Felten EW, Goldfeder S, Kroll JA, Narayanan A (2016) Why buy when you can rent? bribery attacks on bitcoin consensus. In: International conference on financial cryptography and data security. Springer, pp 19\u201326","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"1270_CR34","doi-asserted-by":"crossref","unstructured":"Sapirshtein A, Sompolinsky Y, Zohar A (2016) Optimal selfish mining strategies in bitcoin. In: International conference on financial cryptography and data security. Springer, pp 515\u2013532","DOI":"10.1007\/978-3-662-54970-4_30"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01270-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01270-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01270-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T15:30:22Z","timestamp":1711812622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01270-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["1270"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01270-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"6 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}