{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T15:16:17Z","timestamp":1771427777536,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00829-7","type":"journal-article","created":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T14:30:32Z","timestamp":1771425032000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Matrix protocol: a comprehensive systematic mapping study"],"prefix":"10.1186","volume":"15","author":[{"given":"Jos\u00e9 A. P.","family":"Martins","sequence":"first","affiliation":[]},{"given":"Paulo A. L.","family":"Rego","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 A. F.","family":"de Mac\u00eado","sequence":"additional","affiliation":[]},{"given":"Francisco Airton","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Vin\u00edcius","family":"Lagrota","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,18]]},"reference":[{"key":"829_CR1","unstructured":"Matrix F (2024) An open network for secure, decentralised communication. https:\/\/matrix.org\/. Accessed: 2024-08-25"},{"key":"829_CR2","doi-asserted-by":"publisher","unstructured":"Schipper GC, Seelt R, Le-Khac NA (2021) Forensic analysis of Matrix protocol and Riot.Im application. Forensic Sci Int: Digit Investigation 36:301118. https:\/\/doi.org\/10.1016\/j.fsidi.2021.301118","DOI":"10.1016\/j.fsidi.2021.301118"},{"key":"829_CR3","doi-asserted-by":"crossref","unstructured":"Jacob F, Becker L, Grash\u00f6fer J, Hartenstein H (2020) Matrix decomposition: analysis of an access control approach on transaction-based DAGs without finality. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT\u201920, Association for Computing Machinery. event-place, New York, NY, USA,: Barcelona, Spain., 81\u201392","DOI":"10.1145\/3381991.3395399"},{"key":"829_CR4","doi-asserted-by":"crossref","unstructured":"Alatawi M, Saxena N (2023) SoK: an analysis of end-to-end encryption and authentication ceremonies in secure messaging systems. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec\u201923, New York, NY, USA,: Guildford, United Kingdom., 187\u2013201. Association for Computing Machinery. event-place","DOI":"10.1145\/3558482.3581773"},{"key":"829_CR5","unstructured":"Foundation M (2022) Mozilla\u2019s use of matrix for internal communications. https:\/\/blog.mozilla.org\/. Accessed: 2024-08-25"},{"key":"829_CR6","unstructured":"E (2024) Element: secure messaging app based on matrix protocol. https:\/\/element.io\/. Accessed: 2024-06-08"},{"key":"829_CR7","unstructured":"NHS Digital (2023) How the nhs uses matrix for secure communications. https:\/\/digital.nhs.uk\/matrix\/. Accessed: 2024-10-07"},{"key":"829_CR8","unstructured":"Germany G (2022) Berlin\u2019s digital transformation: integrating secure communication with matrix protocol. https:\/\/govtech.de\/berlim-matrix\/. Accessed: 2024-10-07"},{"key":"829_CR9","doi-asserted-by":"crossref","unstructured":"Weidner M, Kleppmann M, Hugenroth D, Beresford AR (2021) Key Agreement for decentralized secure group messaging with strong security guarantees. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201921, New York, NY, USA, 2024\u20132045. Association for Computing Machinery. event-place: Virtual Event, Republic of Korea","DOI":"10.1145\/3460120.3484542"},{"key":"829_CR10","unstructured":"Government F (2020) Tchap: the official messaging platform for French civil servants. https:\/\/www.tchap.gouv.fr\/. Accessed: 2024-08-25"},{"key":"829_CR11","doi-asserted-by":"publisher","unstructured":"Jacob F, Beer C, Henze N, Hartenstein H (2021) Analysis of the Matrix event Graph Replicated data type. IEEE Access 9:28317\u201328333. https:\/\/doi.org\/10.1109\/ACCESS.2021.3058576","DOI":"10.1109\/ACCESS.2021.3058576"},{"key":"829_CR12","doi-asserted-by":"crossref","unstructured":"Jacob F, Grash\u00f6fer J, Hartenstein H (2019 December) A glimpse of the Matrix: scalability issues of a new message-oriented data synchronization middleware. In Proceedings of the 20th International Middleware Conference Demos and Posters, Middleware\u201919, Association for Computing Machinery, New York, NY, USA, 5\u20136","DOI":"10.1145\/3366627.3368106"},{"key":"829_CR13","doi-asserted-by":"crossref","unstructured":"Albrecht MR, Celi S, Dowling B, Jones D (2023 May) Practically-exploitable cryptographic vulnerabilities in Matrix. In 2023 IEEE Symposium on Security and Privacy (SP), pp 164\u2013181.ISSN:2375-1207","DOI":"10.1109\/SP46215.2023.10351027"},{"key":"829_CR14","doi-asserted-by":"crossref","unstructured":"Li H, Wu Y, Huang R, Mi X, Hu C, Guo S (2023 December) Demystifying decentralized Matrix communication network: ecosystem and security. In 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS), pp 260\u2013267. ISSN:2690-5965","DOI":"10.1109\/ICPADS60453.2023.00047"},{"key":"829_CR15","unstructured":"Project F Fluffychat: a matrix client with a focus on user-friendly design. https:\/\/fluffychat.im\/. Accessed: 2024-06-08"},{"key":"829_CR16","unstructured":"Project H Hydrogen: a lightweight matrix client for web and mobile. https:\/\/hydrogen.element.io\/. Accessed: 2024-06-08"},{"key":"829_CR17","doi-asserted-by":"crossref","unstructured":"Bernstein DJ (2006) Curve25519: new diffie-hellman speed records. https:\/\/cr.yp.to\/ecdh\/curve25519-20060209.pdf. Accessed: 2024-08-01","DOI":"10.1007\/11745853_14"},{"key":"829_CR18","unstructured":"Moerel L, Timmers P (2021) Digital sovereignty and the open strategic autonomy of europe. SSRN Electron J 10(2139\/ssrn.3776179)"},{"key":"829_CR19","doi-asserted-by":"crossref","unstructured":"Brunila M, McConnell M, Grigg S, Appuhn M, Sumner B, Bohman M (2022) Drift: E2EE Spatial feature sharing & instant messaging. In Proceedings of the 6th ACM SIGSPATIAL International Workshop on Location-Based Recommendations, Geosocial Networks and Geoadvertising, LocalRec\u201922, New York, NY, USA.: Seattle, Washington. Association for Computing Machinery. event-place","DOI":"10.1145\/3557992.3565987"},{"key":"829_CR20","unstructured":"Hoffman P, McGrew D, Kampanakis P (2022) Transitioning to post-quantum cryptography. Internet Eng Task Force (IETF) Draft IETF draft-ietf-pqc-transition-05"},{"key":"829_CR21","unstructured":"Of Standards NI, Technology (2022) Post-quantum cryptography: NIST\u2019s plan for the future. Technical report, NIST. Accessed April 2025"},{"key":"829_CR22","unstructured":"Project S Schildichat: a matrix client with enhanced user experience features. https:\/\/schildi.chat\/. Accessed: 2024-06-08"},{"key":"829_CR23","unstructured":"Foundation M Synapse: matrix reference homeserver. https:\/\/github.com\/matrix-org\/synapse. Accessed: 2024-06-08"},{"key":"829_CR24","unstructured":"Foundation M Dendrite: next-generation matrix homeserver written in go. https:\/\/github.com\/matrix-org\/dendrite. Accessed: 2024-06-08"},{"key":"829_CR25","unstructured":"Project C Conduit: lightweight matrix homeserver written in rust. https:\/\/conduit.rs\/. Accessed: 2024-06-08"},{"key":"829_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/9965573","volume":"2021","author":"C Johansen","year":"2021","unstructured":"Johansen C, Mujaj A, Arshad H, Noll J (2021 July) The snowden phone: a comparative Survey of secure instant messaging mobile applications. Secur And Commun Networks 2021:1\u201330. https:\/\/doi.org\/10.1155\/2021\/9965573","journal-title":"Secur And Commun Networks"},{"key":"829_CR28","doi-asserted-by":"crossref","unstructured":"Blessing J (2023) One protocol to rule them all? On securing interoperable messaging (transcript of&nbsp;discussion). In: Security protocols XXVIII: 28th international workshop. Springer-Verlag. event-place, Cambridge, UK, Berlin, Heidelberg: Cambridge, United Kingdom, pp 193\u2013198. March 27\u201328, 2023,Revised Selected Papers","DOI":"10.1007\/978-3-031-43033-6_18"},{"key":"829_CR29","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-031-43033-6_21","volume-title":"Security protocols XXVIII","author":"J Blessing","year":"2023","unstructured":"Blessing J, Chowdhury PD, Sameen M, Anderson R, Gardiner J, Rashid A (2023) Towards Human-centric endpoint security. In: Stajano F, Maty\u00e1\u0161 V, Christianson B, Anderson J (eds) Security protocols XXVIII. Springer Nature Switzerland, Cham, pp 211\u2013219"},{"key":"829_CR30","unstructured":"Kitchenham B, Charters S et al. (2007) Guidelines for performing systematic literature reviews in software engineering"},{"key":"829_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf And Softw Technol 64:1\u201318","journal-title":"Inf And Softw Technol"},{"key":"829_CR32","doi-asserted-by":"crossref","unstructured":"Wichelmann J, Berndt S, Pott C, Eisenbarth T (2021) Help, my Signal has bad Device! Breaking the Signal Messenger\u2019s Post-Compromise Security Through a Malicious device. In Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14\u201316, 2021, Proceedings, Springer-Verlag, Berlin, Heidelberg, 88\u2013105","DOI":"10.1007\/978-3-030-80825-9_5"},{"key":"829_CR33","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-030-90428-9_5","volume-title":"E-Business and telecommunications","author":"I Vazquez Sandoval","year":"2021","unstructured":"Vazquez Sandoval I, Atashpendar A, Lenzini G, Ryan PYA (2021) PakeMail: authentication and key management in decentralized secure email and messaging via PAKE. In: Obaidat MS, Ben-Othman J (eds) E-Business and telecommunications. Springer International Publishing, Cham, pp 102\u2013128"},{"key":"829_CR34","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.procir.2021.10.037","volume":"103","author":"M M\u00fcller","year":"2021","unstructured":"M\u00fcller M, Lee JU, Frick N, Stangier L, Gurevych I, Metternich J (2021) Extracting problem related entities from production chats to enhance the data base for assistance functions on the shop floor. Procedia CIRP 103:231\u2013236. https:\/\/doi.org\/10.1016\/j.procir.2021.10.037","journal-title":"Procedia CIRP"},{"key":"829_CR35","doi-asserted-by":"publisher","unstructured":"Eisele S, Eghtesad T, Campanelli K, Agrawal P, Laszka A, Dubey A (2021 December) Safe and private forward-trading platform for transactive microgrids. ACM Trans Cyber-Phys. Syst 5(1). https:\/\/doi.org\/10.1145\/3403711","DOI":"10.1145\/3403711"},{"key":"829_CR36","doi-asserted-by":"crossref","unstructured":"Brodbeck F, Hromada DD (2022) February. teacher.Js: a low-bandwidth digital Tool for outdoor online teaching. In 2022 IEEE 5th Eurasian Conference on Educational Innovation (ECEI), pp 47\u201350","DOI":"10.1109\/ECEI53102.2022.9829451"},{"key":"829_CR37","doi-asserted-by":"crossref","unstructured":"Ihle C, Deifu\u00df F, Schubotz M, Gipp B (2022 July) Towards portable identities in the Matrix protocol. In 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp 88\u201389. ISSN:2332-5666","DOI":"10.1109\/ICDCSW56584.2022.00025"},{"key":"829_CR38","doi-asserted-by":"crossref","unstructured":"Griggio CF, Nouwens M, Klokmose CN (2022) Caught in the network: the impact of WhatsApp\u2019s 2021 privacy policy update on users\u2019 messaging app ecosystems. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI\u201922, Association for Computing Machinery. event-place, New York, NY, USA.: New Orleans, USA","DOI":"10.1145\/3491102.3502032"},{"key":"829_CR39","unstructured":"Chowdhury PD, Sameen M, Blessing J, Boucher N, Gardiner J, Burrows T, Anderson R, Rashid A (2023 May) Threat models over space and time: a case study of E2EE messaging applications. arXiv:2301.05653 [cs"},{"key":"829_CR40","doi-asserted-by":"crossref","unstructured":"Alwen J, Mularczyk M, Tselekounis Y (2023) Fork-resilient continuous group key Agreement. In Advances in Cryptology \u2013 CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Springer-Verlag. event-place, Santa Barbara, CA, USA,, Berlin, Heidelberg, August 20\u201324, 2023, Proceedings, Part IV, 396\u2013429","DOI":"10.1007\/978-3-031-38551-3_13"},{"key":"829_CR41","doi-asserted-by":"crossref","unstructured":"Gibb R, Madhavapeddy A, Crowcroft J (2023) Where on Earth is the Spatia name system? In Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, HotNets\u201923, New York, NY, USA,: Cambridge, MA, USA., 79\u201386. Association for Computing Machinery. event-place","DOI":"10.1145\/3626111.3628210"},{"key":"829_CR42","doi-asserted-by":"crossref","unstructured":"Wallez T, Protzenko J, Bhargavan K (2023) Comparse: provably secure formats for cryptographic protocols. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201923, New York, NY, USA,: Copenhagen, Denmark., 564\u2013578. Association for Computing Machinery. event-place","DOI":"10.1145\/3576915.3623201"},{"key":"829_CR43","doi-asserted-by":"crossref","unstructured":"Cui M, Gu C, Nan G (2023 March) CrossChat: instant messaging across different apps on mobile devices |. In Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing","DOI":"10.1145\/3555776.3577599"},{"key":"829_CR44","doi-asserted-by":"publisher","unstructured":"Rahman M, Wang Y, De D (2024) Implementation of dew-inspired matrix-mesh communication protocol. In: Roy S (ed) Dew computing: the sustainable IoT perspectives. Springer Nature Singapore, Singapore, pp 105\u2013115. https:\/\/doi.org\/10.1007\/978-981-99-4590-0_5","DOI":"10.1007\/978-981-99-4590-0_5"},{"key":"829_CR45","doi-asserted-by":"publisher","unstructured":"Blessing J, Chowdhury PD, Sameen M, Anderson R, Gardiner J, Rashid A, Stajano F (2023) Towards Human-centric endpoint security. In: Maty\u00e1\u0161 V, Christianson B, Anderson J (eds) Security protocols XXVIII, vol 14186. Springer Nature Switzerland. Series Title: Lecture Notes in Computer Science. Cham, pp 211\u2013219. https:\/\/doi.org\/10.1007\/978-3-031-43033-6_21","DOI":"10.1007\/978-3-031-43033-6_21"},{"key":"829_CR46","doi-asserted-by":"crossref","unstructured":"Albrecht MR, Dowling B, Jones D (2024 May) Device-oriented group messaging: a formal cryptographic analysis of matrix core. In 2024 IEEE Symposium on Security and Privacy (SP), IEEE","DOI":"10.1109\/SP54263.2024.00075"},{"key":"829_CR47","doi-asserted-by":"publisher","unstructured":"Franco M, Gaggi O, Guidi B, Michienzi A, Palazzi CE (2023 August) A decentralised messaging system robust against the unauthorised forwarding of private content. Future Gener Comput Syst 145:211\u2013222. https:\/\/doi.org\/10.1016\/j.future.2023.03.025","DOI":"10.1016\/j.future.2023.03.025"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00829-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00829-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00829-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T14:30:46Z","timestamp":1771425046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-025-00829-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,18]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["829"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00829-7","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,18]]},"assertion":[{"value":"4 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"20"}}