{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:02:44Z","timestamp":1755223364020,"version":"3.43.0"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"16","license":[{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:00:00Z","timestamp":1755216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014862","name":"Hainan Province Science and Technology Special Fund","doi-asserted-by":"publisher","award":["ZDYF2024GXJS008"],"award-info":[{"award-number":["ZDYF2024GXJS008"]}],"id":[{"id":"10.13039\/100014862","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2027","62172297"],"award-info":[{"award-number":["U22B2027","62172297"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RD Program of China","award":["2023YFB2703800"],"award-info":[{"award-number":["2023YFB2703800"]}]},{"name":"Guangxi Science and Technology Plan Project (Guangxi Science and Technology Base and Talent Special Project)","award":["AD23026096"],"award-info":[{"award-number":["AD23026096"]}]},{"name":"Xinjiang Corps \u201cTianchi Talent\u201d Introduction Program"},{"name":"Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security"},{"name":"Fundamental Research Funds for the Central Universities, JLU"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,8,15]]},"DOI":"10.1109\/jiot.2025.3577616","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T13:35:53Z","timestamp":1749476153000},"page":"34297-34308","source":"Crossref","is-referenced-by-count":0,"title":["TSS-ZKP: Enabling Blockchain Account Supervision Without Compromising User Identity"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1115-8607","authenticated-orcid":false,"given":"Cong","family":"Wang","sequence":"first","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-3944","authenticated-orcid":false,"given":"Guanquan","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0401-2062","authenticated-orcid":false,"given":"Tiantian","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-372X","authenticated-orcid":false,"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Jinan University, Guangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7781-3005","authenticated-orcid":false,"given":"Pan","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5974-1589","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Lab for Intelligent Networks and Network Security, aka MOE KLINNS Laboratory, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010080"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3330864"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3226120"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120217"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3233448"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2910058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102865"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.039908"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3389714"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2996161"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3345431"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01698-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3362058"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3175179"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3019923"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.210528.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3406092"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/foods11182785"},{"key":"ref22","first-page":"2214","article-title":"A privacy protection scheme for telemedicine diagnosis based on double blockchain","volume":"61","author":"Wan","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208471"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2025.3560012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-07779-1"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11121332\/11028938.pdf?arnumber=11028938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:44:46Z","timestamp":1754934286000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11028938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,15]]},"references-count":25,"journal-issue":{"issue":"16"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3577616","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,8,15]]}}}