{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T02:07:39Z","timestamp":1769566059902,"version":"3.49.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"2","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2026,6,30]]},"abstract":"<jats:p>Distributed Ledger Technology (DLT) has gained significant attention due to its potential for enabling secure and decentralised systems. However, this premise can only be achieved if information asymmetry is eliminated and there is equal and simultaneous access to consistent and transparent data by all participants in the network. In this article, we explore various DLT information symmetry challenges, including theoretical fundamentals and practical hurdles in relation to the technology stack. We explore the potential of using DLT to facilitate mutual knowledge sharing in E-Commerce scenarios via Proofs of Information Symmetry (PoIS). We found that PoIS have the ability to significantly improve trust between transacting parties, specifically in the context of producer-consumer relationships and associated investor-asset management and contract obligations. In addition, we discovered that the effectiveness of PoIS strongly depends on the presence of a reliable notification system. Our study found that the utilisation of Zero-Knowledge (ZK) proofs can improve confidence among transaction partners, particularly in situations where safeguarding trade secrets or maintaining the privacy of agents is necessary. Our results are demonstrated by deriving from testing PoIS in a commercial context that includes a vehicle under a short-term lease management setup. This evaluation demonstrates the benefit of a contextual ZK proof that maintains the individual privacy of trading partners.<\/jats:p>","DOI":"10.1145\/3731682","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T10:58:17Z","timestamp":1745837897000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Proofs of Information Symmetry for Meeting of the Minds in E-Commerce Transactions"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2255-2418","authenticated-orcid":false,"given":"Thomas","family":"Miller","sequence":"first","affiliation":[{"name":"School of Computer Science, Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7554-490X","authenticated-orcid":false,"given":"Xavier","family":"Boyen","sequence":"additional","affiliation":[{"name":"School of Computer Science, Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5178-7454","authenticated-orcid":false,"given":"Shoufeng","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Design, Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9892-0208","authenticated-orcid":false,"given":"Marcus","family":"Foth","sequence":"additional","affiliation":[{"name":"School of Design, Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9746-7616","authenticated-orcid":false,"given":"Warwick","family":"Powell","sequence":"additional","affiliation":[{"name":"School of Design, Queensland University of Technology, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"issue":"3","key":"e_1_3_3_2_2","doi-asserted-by":"crossref","first-page":"488","DOI":"10.2307\/1879431","article-title":"The market for \u201clemons\u201d: Quality uncertainty and the market mechanism","volume":"84","author":"Akerlof George A.","year":"1970","unstructured":"George A. Akerlof. 1970. The market for \u201clemons\u201d: Quality uncertainty and the market mechanism. Q. J. Econ. 84, 3 (Aug. 1970), 488\u2013500.","journal-title":"Q. J. Econ"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1515\/sats-2020-0016"},{"key":"e_1_3_3_4_2","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/978-3-030-96627-0_23","volume-title":"Intelligent Distributed Computing XIV","author":"Bella Giampaolo","year":"2022","unstructured":"Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi Asmundo, and Daniele Francesco Santamaria. 2022. Blockchains through ontologies: The case study of the Ethereum ERC721 standard in oasis. In Intelligent Distributed Computing XIV. David Camacho, Domenico Rosaci, Giuseppe M. L. Sarn\u00e9, and Mario Versaci (Eds.). Springer International Publishing, Cham, 249\u2013259. DOI:10.1007\/978-3-030-96627-0_23"},{"key":"e_1_3_3_5_2","volume-title":"Proceedings of the Second SHA-3 Candidate Conference","year":"2010","unstructured":"Guido Bertoni, Joan Daemen, Micha\u00ebl Peeters, and Gilles Van Assche. 2010. Building power analysis resistant implementations of Keccak. In Proceedings of the Second SHA-3 Candidate Conference. William Burr (Ed.). University of California, Santa Barbara, USA, Vol. 142. Retrieved form https:\/\/csrc.nist.gov\/events\/2010\/the-second-sha-3-candidate-conference"},{"key":"e_1_3_3_6_2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/2993600.2993611","volume-title":"2016 ACM Workshop on Programming Languages and Analysis for Security (PLAS \u201916)","author":"Bhargavan Karthikeyan","year":"2016","unstructured":"Karthikeyan Bhargavan, Antoine Delignat-Lavaud, C\u00e9dric Fournet, Anitha Gollamudi, Georges Gonthier, Nadim Kobeissi, Natalia Kulatova, Aseem Rastogi, Thomas Sibut-Pinote, Nikhil Swamy, et al. 2016. Formal verification of smart contracts: Short paper. In 2016 ACM Workshop on Programming Languages and Analysis for Security (PLAS \u201916). ACM, New York, NY, 91\u201396."},{"issue":"1","key":"e_1_3_3_7_2","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/s40831-018-0162-8","article-title":"Rare earths and the balance problem: How to deal with changing markets","volume":"4","author":"Binnemans Koen","year":"2018","unstructured":"Koen Binnemans, Peter Tom Jones, Torsten M\u00fcller, and Lourdes Yurramendi. 2018. Rare earths and the balance problem: How to deal with changing markets? Journal of Sustainable Metallurgy 4, 1 (Mar. 2018), 126\u2013146.","journal-title":"Journal of Sustainable Metallurgy"},{"key":"e_1_3_3_8_2","volume-title":"Blockchain Driven Supply Chains and Enterprise Information Systems","author":"Bouras Abdelaziz","year":"2022","unstructured":"Abdelaziz Bouras, Ibrahim Khalil, and Belaid Aouni. 2022. Blockchain Driven Supply Chains and Enterprise Information Systems. Springer Nature, Brisbane."},{"key":"e_1_3_3_9_2","unstructured":"Vitalik Buterin. 2014. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. Retrieved July 4 2022 from https:\/\/ethereum.org\/669c9e2e2027310b6b3cdce6e1c52962\/Ethereum_Whitepaper_-_Buterin_2014.pdf"},{"issue":"3","key":"e_1_3_3_10_2","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1177\/0004865814521224","article-title":"Online frauds: Learning from victims why they fall for these scams","volume":"47","author":"Button Mark","year":"2014","unstructured":"Mark Button, Carol Mcnaughton Nicholls, Jane Kerr, and Rachael Owen. 2014. Online frauds: Learning from victims why they fall for these scams. Aust. N. Z. J. Criminol. 47, 3 (Dec. 2014), 391\u2013408.","journal-title":"Aust. N. Z. J. Criminol"},{"issue":"5","key":"e_1_3_3_11_2","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1108\/SCM-11-2015-0436","article-title":"Does finance solve the supply chain financing problem?","volume":"21","author":"Caniato Federico","year":"2016","unstructured":"Federico Caniato, Gelsomino Luca Mattia, Alessandro Perego, and Stefano Ronchi. 2016. Does finance solve the supply chain financing problem? Supply Chain Manage.: Int. J. 21, 5 (Jan. 2016), 534\u2013549.","journal-title":"Supply Chain Manage.: Int. J"},{"key":"e_1_3_3_12_2","doi-asserted-by":"crossref","first-page":"105886","DOI":"10.1016\/j.compag.2020.105886","article-title":"Strengthening consumer trust in beef supply chain traceability with a blockchain-based human-machine reconcile mechanism","volume":"180","author":"Cao Shoufeng","year":"2021","unstructured":"Shoufeng Cao, Warwick Powell, Marcus Foth, Valeri Natanelov, Thomas Miller, and Uwe Dulleck. 2021. Strengthening consumer trust in beef supply chain traceability with a blockchain-based human-machine reconcile mechanism. Comput. Electron. Agric. 180 (Jan. 2021), 105886.","journal-title":"Comput. Electron. Agric"},{"issue":"4","key":"e_1_3_3_13_2","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TEM.2019.2957439","article-title":"Light in dark places: The hidden world of supply chain fraud","volume":"69","author":"DuHadway Scott","year":"2022","unstructured":"Scott DuHadway, Sri Talluri, William Ho, and Thomas Buckhoff. 2022. Light in dark places: The hidden world of supply chain fraud. IEEE Trans. Eng. Manage. 69, 4 (Aug. 2022), 874\u2013887.","journal-title":"IEEE Trans. Eng. Manage"},{"key":"e_1_3_3_14_2","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-030-02671-4_16","volume-title":"On the Move to Meaningful Internet Systems (OTM \u201918 Conferences)","author":"El Ioini Nabil","year":"2018","unstructured":"Nabil El Ioini and Claus Pahl. 2018. A review of distributed ledger technologies. In On the Move to Meaningful Internet Systems (OTM \u201918 Conferences). Springer International Publishing, Malta, 277\u2013288."},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/79147.79161"},{"issue":"5","key":"e_1_3_3_16_2","first-page":"436","article-title":"Overview and applications of zero knowledge proof (ZKP)","volume":"8","author":"Hasan Jahid","year":"2019","unstructured":"Jahid Hasan. 2019. Overview and applications of zero knowledge proof (ZKP). Int. J. Comput. Sci. Netw. 8, 5 (2019), 436\u2013440.","journal-title":"Int. J. Comput. Sci. Netw"},{"issue":"2","key":"e_1_3_3_17_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3379463","article-title":"Trade-offs between distributed ledger technology characteristics","volume":"53","author":"Kannengie\u00dfer Niclas","year":"2020","unstructured":"Niclas Kannengie\u00dfer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2020. Trade-offs between distributed ledger technology characteristics. ACM Comput. Surv. 53, 2 (May 2020), 1\u201337.","journal-title":"ACM Comput. Surv"},{"key":"e_1_3_3_18_2","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.tifs.2019.10.005","article-title":"A systematic review of consumer perceptions of food fraud and authenticity: A European perspective","volume":"94","author":"Kendall Helen","year":"2019","unstructured":"Helen Kendall, Beth Clark, Caroline Rhymer, Sharron Kuznesof, Jana Hajslova, Monika Tomaniova, Paul Brereton, and Lynn Frewer. 2019. A systematic review of consumer perceptions of food fraud and authenticity: A European perspective. Trends Food Sci. Technol. 94 (Dec. 2019), 79\u201390.","journal-title":"Trends Food Sci. Technol"},{"key":"e_1_3_3_19_2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/ICDCSW60045.2023.00011","volume-title":"2023 IEEE 43rd International Conference on Distributed Computing Systems Workshops (ICDCSW)","author":"Kleinwort Felix","year":"2023","unstructured":"Felix Kleinwort, Wolf Posdorfer, and Janick Edinger. 2023. Analyzing the effect of taproot on bitcoin deanonymization. In 2023 IEEE 43rd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, Hamburg, 25\u201330."},{"issue":"4","key":"e_1_3_3_20_2","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1080\/03634523.2018.1503313","article-title":"Fake news, phishing, and fraud: A call for research on digital media literacy education beyond the classroom","volume":"67","author":"Lee Nicole M.","year":"2018","unstructured":"Nicole M. Lee. 2018. Fake news, phishing, and fraud: A call for research on digital media literacy education beyond the classroom. Commun. Educ. 67, 4 (Oct. 2018), 460\u2013466.","journal-title":"Commun. Educ"},{"key":"e_1_3_3_21_2","unstructured":"Calum Moore and Sidhant Gandhi. 2023. L2 Ethereum ZK Rollup for Private and Compliant Transactions. Retrieved March 10 2024 from https:\/\/polybase.github.io\/zk-rollup\/whitepaper.pdf"},{"issue":"2","key":"e_1_3_3_22_2","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.pursup.2018.06.004","article-title":"Supply chain finance: From traditional to supply chain credit rating","volume":"25","author":"Moretto Antonella","year":"2019","unstructured":"Antonella Moretto, Laura Grassi, Federico Caniato, Marco Giorgino, and Stefano Ronchi. 2019. Supply chain finance: From traditional to supply chain credit rating. J. Purch. Supply Manag. 25, 2 (Mar. 2019), 197\u2013217.","journal-title":"J. Purch. Supply Manag"},{"issue":"1","key":"e_1_3_3_23_2","article-title":"Bitcoin: a peer-to-peer electronic cash system","volume":"1","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto. 2008. Bitcoin: a peer-to-peer electronic cash system. Anonymous 1, 1 (2008), 1.","journal-title":"Anonymous"},{"key":"e_1_3_3_24_2","first-page":"1356","volume-title":"2018 2nd International Conference on Intelligent Computing and Control Systems (ICICCS)","author":"Nalavade Alisha","year":"2018","unstructured":"Alisha Nalavade, Divya Rawat, and Harshil Kanakia. 2018. Blockchain technology: Most secure database. In 2018 2nd International Conference on Intelligent Computing and Control Systems (ICICCS), 1356\u20131362."},{"key":"e_1_3_3_25_2","first-page":"100389","article-title":"Blockchain smart contracts for supply chain finance: Mapping the innovation potential in Australia-China beef supply chains","volume":"30","author":"Natanelov Valeri","year":"2022","unstructured":"Valeri Natanelov, Shoufeng Cao, Marcus Foth, and Uwe Dulleck. 2022. Blockchain smart contracts for supply chain finance: Mapping the innovation potential in Australia-China beef supply chains. J. Ind. Inf. Integr. 30 (Nov. 2022), 100389.","journal-title":"J. Ind. Inf. Integr"},{"issue":"3","key":"e_1_3_3_26_2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11896-019-09334-5","article-title":"The psychology of Internet fraud victimisation: A systematic review","volume":"34","author":"Norris Gareth","year":"2019","unstructured":"Gareth Norris, Alexandra Brookes, and David Dowell. 2019. The psychology of Internet fraud victimisation: A systematic review. J. Police Crim. Psychol. 34, 3 (Sept. 2019), 231\u2013245.","journal-title":"J. Police Crim. Psychol"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046025"},{"key":"e_1_3_3_28_2","first-page":"21","volume-title":"Revisiting Trust in Supply Chains: How Does Blockchain Redefine Trust?Blockchain Driven Supply Chains and Enterprise Information Systems","author":"Powell Warwick","year":"2023","unstructured":"Warwick Powell, Shoufeng Cao, Marcus Foth, Shan He, Charles Turner-Morris, and Ming Li. 2023. Revisiting Trust in Supply Chains: How Does Blockchain Redefine Trust? In Blockchain Driven Supply Chains and Enterprise Information Systems. Abdelaziz Bouras, Ibrahim Khalil, and Belaid Aouni (Eds.). Springer, Cham, Switzerland, 21\u201342. DOI:10.1007\/978-3-030-96154-1_2"},{"key":"e_1_3_3_29_2","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1016\/j.comnet.2021.108536","article-title":"From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains","volume":"200","author":"Powell W.","year":"2021","unstructured":"W. Powell, S. Cao, T. Miller, M. Foth, X. Boyen, B. Earsman, S. D. Valle, and C. Turner-Morris. 2021. From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains. Comput. Netw. 200 (2021), 1389.","journal-title":"Comput. Netw"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100261"},{"key":"e_1_3_3_31_2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1145\/3375627.3375820","volume-title":"AAAI\/ACM Conference on AI, Ethics, and Society","author":"Inioluwa Deborah Raji","year":"2020","unstructured":"Inioluwa Deborah Raji, Timnit Gebru, Margaret Mitchell, Joy Buolamwini, Joonseok Lee, and Emily Denton. 2020. Saving face. In AAAI\/ACM Conference on AI, Ethics, and Society. ACM, New York, NY, 145\u2013150."},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/1668862.1668876"},{"key":"e_1_3_3_33_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03269-5","volume-title":"Public-Key Cryptography","author":"Salomaa Arto","year":"1996","unstructured":"Arto Salomaa. 1996. Public-Key Cryptography. Springer Science & Business Media, Berlin."},{"issue":"1","key":"e_1_3_3_34_2","first-page":"81","article-title":"Limitations of proof of stake algorithm in blockchain: A review","volume":"39","author":"Shifferaw Yenatfanta","year":"2021","unstructured":"Yenatfanta Shifferaw and Surafel Lemma. 2021. Limitations of proof of stake algorithm in blockchain: A review. Zede J. 39, 1 (Nov. 2021), 81\u201395.","journal-title":"Zede J"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330664"},{"issue":"4","key":"e_1_3_3_36_2","first-page":"198","article-title":"Weixin Xie, and Xiang Peng. 2021. A survey on zero-knowledge proof in blockchain","volume":"35","author":"Sun Xiaoqiang","year":"2021","unstructured":"Xiaoqiang Sun, F. Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng. 2021. A survey on zero-knowledge proof in blockchain. IEEE Netw. 35, 4 (2021), 198\u2013205.","journal-title":"IEEE Netw"},{"key":"e_1_3_3_37_2","first-page":"1","article-title":"A framework for understanding unintended consequences of machine learning","volume":"21","author":"Suresh Harini","year":"2019","unstructured":"Harini Suresh and J. Guttag. 2019. A framework for understanding unintended consequences of machine learning. arXiv.org 21 (2019), 1.","journal-title":"arXiv.org"},{"issue":"7","key":"e_1_3_3_38_2","doi-asserted-by":"crossref","first-page":"e0000024","DOI":"10.1371\/journal.pstr.0000024","article-title":"A critical review of information asymmetry in the business cycle: How digital ledger technology can transform and sustain the business cycle","volume":"1","author":"Besong Susan Enyang","year":"2022","unstructured":"Enyang Besong Susan and Manases Mbengwor Natu. 2022. A critical review of information asymmetry in the business cycle: How digital ledger technology can transform and sustain the business cycle. PLOS Sustain. Transform. 1, 7 (July 2022), e0000024.","journal-title":"PLOS Sustain. Transform"},{"issue":"8","key":"e_1_3_3_39_2","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.2113\/econgeo.110.8.1925","article-title":"A detailed assessment of global rare earth element resources: Opportunities and challenges","volume":"110","author":"Weng Zhehan","year":"2015","unstructured":"Zhehan Weng, Simon M. Jowitt, Gavin M. Mudd, and Nawshad Haque. 2015. A detailed assessment of global rare earth element resources: Opportunities and challenges. Econ. Geol. 110, 8 (Dec. 2015), 1925\u20131952.","journal-title":"Econ. Geol"},{"key":"e_1_3_3_40_2","first-page":"77","volume-title":"Blockchain for Teens: With Case Studies and Examples of Blockchain across Various Industries","author":"Wu Brian","year":"2023","unstructured":"Brian Wu and Bridget Wu. 2023. Bitcoin: The future of money. In Blockchain for Teens: With Case Studies and Examples of Blockchain across Various Industries. Brian Wu and Bridget Wu (Eds.), Apress, Berkeley, CA, 77\u2013134."},{"key":"e_1_3_3_41_2","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.ijpe.2018.08.003","article-title":"Supply chain finance: A systematic literature review and bibliometric analysis","volume":"204","author":"Xu Xinhan","year":"2018","unstructured":"Xinhan Xu, Xiangfeng Chen, Fu Jia, Steve Brown, Yu Gong, and Yifan Xu. 2018. Supply chain finance: A systematic literature review and bibliometric analysis. Int. J. Prod. Econ. 204 (Oct. 2018), 160\u2013173.","journal-title":"Int. J. Prod. Econ"},{"key":"e_1_3_3_42_2","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-981-19-8877-6_5","volume-title":"Blockchain Technology and Application","author":"Zhou Yu","year":"2022","unstructured":"Yu Zhou, Zeming Wei, Shansi Ma, and Hua Tang. 2022. Overview of zero-knowledge proof and its applications in blockchain. In Blockchain Technology and Application. Yi Sun, Liang Cai, Wei Wang, Xianhua Song, and Zeguang Lu (Eds.). Communications in Computer and Information Science, Vol. 1736, Springer Nature, Singapore, 60\u201382. DOI:10.1007\/978-981-19-8877-6_5"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T12:50:09Z","timestamp":1769518209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,6,30]]}},"alternative-id":["10.1145\/3731682"],"URL":"https:\/\/doi.org\/10.1145\/3731682","relation":{},"ISSN":["2769-6480","2769-6480"],"issn-type":[{"value":"2769-6480","type":"print"},{"value":"2769-6480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"2024-05-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}