{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:26Z","timestamp":1775744966879,"version":"3.50.1"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["22YDTPJC00140"],"award-info":[{"award-number":["22YDTPJC00140"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["19JCYBJC15800"],"award-info":[{"award-number":["19JCYBJC15800"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Project Foundation of Tianjin","award":["20212053"],"award-info":[{"award-number":["20212053"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802281"],"award-info":[{"award-number":["61802281"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702366"],"award-info":[{"award-number":["61702366"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tcss.2024.3378719","type":"journal-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T17:38:09Z","timestamp":1715189889000},"page":"5880-5891","source":"Crossref","is-referenced-by-count":13,"title":["Revocable Certificateless Cross-Domain Authentication Scheme Based on Primary\u2013Secondary Blockchain"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6971-2004","authenticated-orcid":false,"given":"Ze","family":"Wang","sequence":"first","affiliation":[{"name":"School of Software, Tiangong University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2819-789X","authenticated-orcid":false,"given":"Zhenglin","family":"Zong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tiangong University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1094-9709","authenticated-orcid":false,"given":"Fang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tiangong University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7630-4455","authenticated-orcid":false,"given":"Shimin","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Software, Tiangong University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4597-1532","authenticated-orcid":false,"given":"Ping","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tiangong University, Tianjin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102642"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2459"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8527010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.04.043"},{"key":"ref6","first-page":"23","volume-title":"White Paper for Chinese Blockchain Technology and Application Development","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00143"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113321"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1109-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0985-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.08.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2447-9"},{"issue":"4","key":"ref13","first-page":"756","article-title":"Cross-domain authentication scheme based on proxy re-signature in cloud environment","volume":"42","author":"Yang","year":"2019","journal-title":"Chin. J. Comput."},{"issue":"9","key":"ref14","first-page":"111","article-title":"Identity-based cross-domain authentication scheme in pervasive computing environments","volume":"32","author":"Luo","year":"2011","journal-title":"J. Commun."},{"issue":"3","key":"ref15","first-page":"740","article-title":"Heterogenous cross-domain identity authentication scheme based on signcryption in cloud environment","volume":"40","author":"Jiang","year":"2020","journal-title":"J. Comput. Appl."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.017"},{"issue":"2","key":"ref17","first-page":"316","article-title":"An efficient cross-domain authentication scheme based on blockchain technology","volume":"38","author":"Zhou","year":"2018","journal-title":"J. Comput. Appl."},{"issue":"11","key":"ref18","first-page":"2571","article-title":"A cross-domain authentication scheme based on blockchain technology","volume":"46","author":"Ma","year":"2018","journal-title":"Acta Electronica Sinica"},{"issue":"5","key":"ref19","first-page":"908","article-title":"A cross-domain authentication protocol by identity-based cryptography on consortium blockchain","volume":"44","author":"Wei","year":"2021","journal-title":"Chin. J. Comput."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3092375"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref22","article-title":"Chameleon hashing and signatures","author":"Krawczyk","year":"1998"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.37"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2016.7507936"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102812"},{"key":"ref27","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume-title":"Proc. Annu. Int. Cryptol. Conf.","author":"Dan","year":"2001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10704022\/10522761.pdf?arnumber=10522761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T17:28:11Z","timestamp":1727976491000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10522761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":28,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2024.3378719","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}