{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:04:46Z","timestamp":1759971886441,"version":"build-2065373602"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62366004"],"award-info":[{"award-number":["62366004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research and Development Program of Guangxi","award":["AD25069071","AB24010316"],"award-info":[{"award-number":["AD25069071","AB24010316"]}]},{"DOI":"10.13039\/501100015794","name":"Innovation Project of Guangxi Graduate Education","doi-asserted-by":"publisher","award":["YCSW2024125"],"award-info":[{"award-number":["YCSW2024125"]}],"id":[{"id":"10.13039\/501100015794","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tnsm.2025.3580403","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T14:58:50Z","timestamp":1750085930000},"page":"4856-4870","source":"Crossref","is-referenced-by-count":0,"title":["MGRS-PBFT: An Optimized Consensus Algorithm Based on Multi-Group Ring Signatures for Blockchain Privacy Protection"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7495-9124","authenticated-orcid":false,"given":"Jiali","family":"Zheng","sequence":"first","affiliation":[{"name":"Guangxi Key Laboratory of Multimedia Communications and Network Technology, School of Computer, Electronics and Information, Guangxi University, Nanning, Guangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1642-8277","authenticated-orcid":false,"given":"Jiawen","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Multimedia Communications and Network Technology, School of Computer, Electronics and Information, Guangxi University, Nanning, Guangxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-019-0147-z"},{"key":"ref2","first-page":"80","article-title":"The blockchain: State-of-the-art and research challenges","volume":"5","author":"Yang","year":"2019","journal-title":"J. Ind. Inf. Integr."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"ref4","article-title":"The balance attack against proof-of-work blockchains: The R3 testbed as an example","author":"Natoli","year":"2016","journal-title":"arXiv:1612.09426"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/jsan11040086"},{"issue":"4","key":"ref6","first-page":"29","article-title":"Survey on blockchain privacy protection techniques in cryptography","volume":"8","author":"Liu","year":"2022","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/math11102248"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","volume-title":"Proc. Decentralized Bus. Rev.","author":"Nakamoto","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2393940"},{"key":"ref12","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume-title":"Proc. 3rd Symp. OSDI","author":"Castro"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref14","first-page":"305","article-title":"In search of an understandable consensus algorithm","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Ongaro"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3264011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3215152"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2023.0016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104713"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100609"},{"issue":"1","key":"ref20","first-page":"1","article-title":"An efficient identity based ring signature scheme and its extension","volume":"39","author":"Deng","year":"2021","journal-title":"J. Guizhou Norm. Univ."},{"issue":"11","key":"ref21","first-page":"3368","article-title":"Efficient certificateless ring signature scheme based on elliptic curve","volume":"43","author":"Zhu","year":"2023","journal-title":"J. Comput. Appl."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2974954"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100414"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3222217"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.01.029"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102884"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3153701"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3042392"},{"key":"ref30","article-title":"SBFT: A scalable and decentralized trust infrastructure","author":"Gueta","year":"2018","journal-title":"arXiv:1804.01626"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11194281\/11037567.pdf?arnumber=11037567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:38:16Z","timestamp":1759945096000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11037567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":31,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3580403","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}