{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T21:23:13Z","timestamp":1774041793733,"version":"3.50.1"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272255"],"award-info":[{"award-number":["62272255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302248"],"award-info":[{"award-number":["62302248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022LZH011"],"award-info":[{"award-number":["ZR2022LZH011"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2023QF018"],"award-info":[{"award-number":["ZR2023QF018"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2025M771580"],"award-info":[{"award-number":["2025M771580"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["2023TZXD049"],"award-info":[{"award-number":["2023TZXD049"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["2023CXGC010102"],"award-info":[{"award-number":["2023CXGC010102"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.ins.2026.123332","type":"journal-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T07:54:01Z","timestamp":1772524441000},"page":"123332","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cross-chain identity privacy protection scheme based on oblivious transfer protocol and key agreement"],"prefix":"10.1016","volume":"743","author":[{"given":"Yuli","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0584-9529","authenticated-orcid":false,"given":"Zhichao","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Pei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ins.2026.123332_bib0005","doi-asserted-by":"crossref","first-page":"1618","DOI":"10.1109\/TNSM.2025.3527810","article-title":"Priority-based blockchain packing for dependent industrial IOT transactions","volume":"22","author":"Lin","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"6","key":"10.1016\/j.ins.2026.123332_bib0010","doi-asserted-by":"crossref","first-page":"4266","DOI":"10.1109\/TNSE.2022.3196816","article-title":"A group covert communication method of digital currency based on blockchain technology","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"10.1016\/j.ins.2026.123332_bib0015","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TNSE.2024.3503996","article-title":"Blockchain-assisted flexible revocable anonymous authentication in industrial internet of things","volume":"12","author":"Wang","year":"2025","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.ins.2026.123332_bib0020","article-title":"A comprehensive review of blockchain technology: underlying principles and historical background with future challenges","volume":"9","author":"Tripathi","year":"2023","journal-title":"Decis. Anal. J."},{"key":"10.1016\/j.ins.2026.123332_bib0025","series-title":"R3 research paper","article-title":"Chain interoperability","volume":"9","author":"Buterin","year":"2016"},{"issue":"6","key":"10.1016\/j.ins.2026.123332_bib0030","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1016\/j.dcan.2022.04.012","article-title":"A notary group-based cross-chain mechanism","volume":"8","author":"Xiong","year":"2022","journal-title":"Digit. Commun. Netw."},{"issue":"21","key":"10.1016\/j.ins.2026.123332_bib0035","doi-asserted-by":"crossref","first-page":"15776","DOI":"10.1109\/JIOT.2021.3081578","article-title":"Cross-cluster federated learning and blockchain for internet of medical things","volume":"8","author":"Jin","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.ins.2026.123332_bib0040","doi-asserted-by":"crossref","first-page":"87777","DOI":"10.1109\/ACCESS.2021.3089603","article-title":"appXchain: application-level interoperability for blockchain networks","volume":"9","author":"Madine","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2026.123332_bib0045","doi-asserted-by":"crossref","first-page":"34045","DOI":"10.1109\/ACCESS.2019.2904042","article-title":"Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IOT scenario","volume":"7","author":"Ma","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2026.123332_bib0050","series-title":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","first-page":"89","article-title":"A cross-chain solutions based on proxy network","author":"Wei","year":"2021"},{"key":"10.1016\/j.ins.2026.123332_bib0055","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1007\/s00500-021-06577-5","article-title":"Cross-chain exchange by transaction dependence with conditional transaction method","author":"Su","year":"2022","journal-title":"Soft Comput."},{"key":"10.1016\/j.ins.2026.123332_bib0060","series-title":"2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","first-page":"357","article-title":"Overview of block chain cross chain technology","author":"Lin","year":"2021"},{"issue":"16","key":"10.1016\/j.ins.2026.123332_bib0065","doi-asserted-by":"crossref","first-page":"14767","DOI":"10.1109\/JIOT.2021.3061687","article-title":"Synergychain: a multichain-based data-sharing framework with hierarchical access control","volume":"9","author":"Chang","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.ins.2026.123332_bib0070","doi-asserted-by":"crossref","first-page":"2157","DOI":"10.1109\/JBHI.2019.2963437","article-title":"Dynamic autonomous cross consortium chain mechanism in e-healthcare","volume":"24","author":"Qiao","year":"2020","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"7","key":"10.1016\/j.ins.2026.123332_bib0075","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.3390\/s20071898","article-title":"Privacy-preserving in healthcare blockchain systems based on lightweight message sharing","volume":"20","author":"Fu","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.ins.2026.123332_bib0080","article-title":"Chain Bridge: a secure privacy-preserving framework for anonymous authentication and cross-chain routing","author":"Zhang","year":"2025","journal-title":"Blockchain: Res. Appl."},{"key":"10.1016\/j.ins.2026.123332_bib0085","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.future.2023.09.032","article-title":"A scalable and lightweight group authentication framework for internet of medical things using integrated blockchain and fog computing","volume":"151","author":"Alsaeed","year":"2024","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"10.1016\/j.ins.2026.123332_bib0090","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/JBHI.2022.3203577","article-title":"A privacy-preserving medical data sharing scheme based on blockchain","volume":"27","author":"Xu","year":"2022","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"2","key":"10.1016\/j.ins.2026.123332_bib0095","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1109\/TNSM.2022.3186006","article-title":"A hybrid blockchain-edge architecture for electronic health record management with attribute-based cryptographic mechanisms","volume":"20","author":"Guo","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.ins.2026.123332_bib0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119783","article-title":"Secure internet of medical things (IoMT) based on ECMQV-MAC authentication protocol and ekmc-scp blockchain networking","volume":"654","author":"Lin","year":"2024","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.ins.2026.123332_bib0105","doi-asserted-by":"crossref","first-page":"3025","DOI":"10.1109\/JSYST.2022.3148989","article-title":"Compact multiple attribute-based signatures with key aggregation and its application","volume":"16","author":"Guo","year":"2023","journal-title":"IEEE Syst. J."},{"issue":"4","key":"10.1016\/j.ins.2026.123332_bib0110","first-page":"6114","article-title":"Privacy preserving for electronic medical record sharing in healthchain with group signature","volume":"17","author":"Li","year":"2023","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.ins.2026.123332_bib0115","series-title":"2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)","first-page":"274","article-title":"Security enhancement of digital signatures for blockchain using eddsa algorithm","author":"Basha","year":"2021"},{"issue":"4","key":"10.1016\/j.ins.2026.123332_bib0120","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.3390\/s23041864","article-title":"CCIO: a cross-chain interoperability approach for consortium blockchains based on Oracle","volume":"23","author":"Lu","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.ins.2026.123332_bib0125","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2022.102782","article-title":"Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network","volume":"134","author":"Ma","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.ins.2026.123332_bib0130","series-title":"Fifth International Conference on Computer Communication and Network Security (CCNS 2024)","first-page":"402","article-title":"Blockchain transaction data privacy protection scheme","volume":"vol. 13228","author":"Li","year":"2024"},{"key":"10.1016\/j.ins.2026.123332_bib0135","doi-asserted-by":"crossref","first-page":"6992","DOI":"10.1007\/s11227-020-03548-9","article-title":"Provably secure authentication key exchange scheme using fog nodes in vehicular AD hoc networks","volume":"77","author":"Wu","year":"2021","journal-title":"J. Supercomput."},{"key":"10.1016\/j.ins.2026.123332_bib0140","series-title":"2024 IEEE 11th International Conference on Cyber Security and Cloud Computing (CSCloud)","first-page":"59","article-title":"Lightweight privacy-preserving mechanisms for cross-chain transactions","author":"Zhu","year":"2024"},{"issue":"2","key":"10.1016\/j.ins.2026.123332_bib0145","doi-asserted-by":"crossref","DOI":"10.4018\/IJDCF.302876","article-title":"A privacy protection scheme for cross-chain transactions based on group signature and relay chain","volume":"14","author":"Liang","year":"2022","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"10.1016\/j.ins.2026.123332_bib0150","series-title":"Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City","first-page":"353","article-title":"Identity authentication chain based on encrypted database in heterogeneous alliance network","author":"Zhang","year":"2020"},{"key":"10.1016\/j.ins.2026.123332_bib0155","series-title":"2021 International Conference on Information and Communication Technology Convergence (ICTC)","first-page":"150","article-title":"Blockchain-based personal data trading system using decentralized identifiers and verifiable credentials","author":"Yoon","year":"2021"},{"issue":"12","key":"10.1016\/j.ins.2026.123332_bib0160","doi-asserted-by":"crossref","first-page":"20042","DOI":"10.1109\/JIOT.2025.3543332","article-title":"Cross-chain privacy preserving for biomt with designated verifier proxy signature","volume":"12","author":"Li","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.ins.2026.123332_bib0165","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1007\/s11280-021-00864-9","article-title":"IBE-BCIOT: an ibe based cross-chain communication mechanism of blockchain in IOT","volume":"24","author":"Shao","year":"2021","journal-title":"World Wide Web"},{"key":"10.1016\/j.ins.2026.123332_bib0170","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110187","article-title":"Blockchain-based multi-institution collaborative credit evaluation modeling method","volume":"240","author":"Qiao","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.ins.2026.123332_bib0175","first-page":"201","article-title":"Enabling blockchain innovations with pegged","volume":"72","author":"Back","year":"2014","journal-title":"Open Sci. Rev."},{"key":"10.1016\/j.ins.2026.123332_bib0180","series-title":"2019 IEEE Symposium on Security and Privacy (SP)","first-page":"193","article-title":"XCLAIM: trustless, interoperable, cryptocurrency-backed assets","author":"Zamyatin","year":"2019"},{"key":"10.1016\/j.ins.2026.123332_bib0185","series-title":"Financial Cryptography and Data Security","first-page":"3","article-title":"Sok: communication across distributed ledgers","author":"Zamyatin","year":"2021"},{"key":"10.1016\/j.ins.2026.123332_bib0190","series-title":"Smart Blockchain","first-page":"12","article-title":"A new sustainable interchain design on transport layer for blockchain","author":"Wu","year":"2018"},{"key":"10.1016\/j.ins.2026.123332_bib0195","series-title":"2022 IEEE 5th International Conference on Information Systems and Computer Aided Education (ICISCAE)","first-page":"99","article-title":"AbitBridge: a cross-chain protocol based on main-sub-chain architecture","author":"Pang","year":"2022"},{"issue":"4","key":"10.1016\/j.ins.2026.123332_bib0200","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1007\/s42524-020-0124-2","article-title":"Blockchain-driven supply chain finance solution for small and medium enterprises","volume":"7","author":"Li","year":"2020","journal-title":"Front. Eng. Manag."},{"issue":"4","key":"10.1016\/j.ins.2026.123332_bib0205","doi-asserted-by":"crossref","first-page":"422","DOI":"10.3390\/electronics8040422","article-title":"Distributed E-voting and E-bidding systems based on smart contract","volume":"8","author":"Tso","year":"2019","journal-title":"Electronics"},{"key":"10.1016\/j.ins.2026.123332_bib0210","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.ins.2020.08.116","article-title":"FAPS: a fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, ether cheque and smart contracts","volume":"544","author":"Li","year":"2021","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.ins.2026.123332_bib0215","article-title":"A privacy-preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare","volume":"2021","author":"Yang","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.ins.2026.123332_bib0220","series-title":"Finite Fields","author":"Lidl","year":"1997"},{"key":"10.1016\/j.ins.2026.123332_bib0225","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.ffa.2014.10.001","article-title":"Permutation polynomials over finite fields \u2014 a survey of recent advances","volume":"32","author":"Hou","year":"2015","journal-title":"Finite Fields Their Appl."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002552600263X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002552600263X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:35:40Z","timestamp":1774035340000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002002552600263X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":45,"alternative-id":["S002002552600263X"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2026.123332","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cross-chain identity privacy protection scheme based on oblivious transfer protocol and key agreement","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2026.123332","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"123332"}}