{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T11:14:32Z","timestamp":1770981272701,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T00:00:00Z","timestamp":1756339200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T00:00:00Z","timestamp":1756339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272007"],"award-info":[{"award-number":["62272007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>With the development of electric vehicles, charging stations have garnered significant attention and progress. As a result, various charging platforms have emerged. However, due to the lack of shared charging information, issues such as low utilization of charging stations during peak hours and insufficient station availability have negatively impacted user experience. Inspired by the concept of an aggregation platform, we propose an aggregated charging platform for electric vehicles (EVs). However, challenges related to trust, such as single-point failures and the difficulty of achieving unified identity management, hinder the implementation of the aggregation model. To address these issues, we propose a blockchain-based EV aggregation charging platform model and a cross-platform identity authentication scheme. Leveraging the decentralized and highly secure characteristics of blockchain, we construct a decentralized aggregation platform and enhance the credibility and reliability of cross-platform authentication through smart contracts. Furthermore, we design a batch authentication scheme to efficiently handle a large number of authentication requests. Simulation results demonstrate that, compared to other schemes, our proposed approach improves authentication efficiency by 50\u201366.6%.<\/jats:p>","DOI":"10.1186\/s42400-025-00355-8","type":"journal-article","created":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T01:03:18Z","timestamp":1756342998000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Blockchain-based cross-platform authentication scheme for EV aggregate charging platform"],"prefix":"10.1186","volume":"8","author":[{"given":"Tingli","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yunhua","family":"He","sequence":"additional","affiliation":[]},{"given":"Pengyue","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,28]]},"reference":[{"issue":"10","key":"355_CR1","doi-asserted-by":"publisher","first-page":"6971","DOI":"10.1109\/TII.2020.3030949","volume":"17","author":"S Aggarwal","year":"2021","unstructured":"Aggarwal S, Kumar N, Gope P (2021) An efficient blockchain-based authentication scheme for energy-trading in v2g networks. IEEE Trans Ind Inf 17(10):6971\u20136980. https:\/\/doi.org\/10.1109\/TII.2020.3030949","journal-title":"IEEE Trans Ind Inf"},{"key":"355_CR2","doi-asserted-by":"publisher","unstructured":"Asghar M, Doss RRM, Pan L (2018) A scalable and efficient PKI based authentication protocol for vanets. In: 2018 28th international telecommunication networks and applications conference (ITNAC), pp 1\u20133. https:\/\/doi.org\/10.1109\/ATNAC.2018.8615224","DOI":"10.1109\/ATNAC.2018.8615224"},{"key":"355_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2024.05.005","volume":"223","author":"S Basudan","year":"2024","unstructured":"Basudan S (2024) A privacy-preserving federated learning protocol with a secure data aggregation for the internet of everything. Comput Commun 223:1\u201314. https:\/\/doi.org\/10.1016\/j.comcom.2024.05.005","journal-title":"Comput Commun"},{"key":"355_CR4","doi-asserted-by":"publisher","unstructured":"Behzad B, Jose DT, Chakravorty A, Rong C (2021) Totem sdk: an open toolset for token controlled computation managed by blockchain. In: 2021 IEEE Asia-Pacific conference on computer science and data engineering (CSDE), pp 1\u20138. https:\/\/doi.org\/10.1109\/CSDE53843.2021.9718489","DOI":"10.1109\/CSDE53843.2021.9718489"},{"issue":"1","key":"355_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.23919\/JCIN.2021.9387704","volume":"6","author":"R Chen","year":"2021","unstructured":"Chen R, Shu F, Huang S, Huang L, Liu H, Liu J, Lei K (2021) Bidm: A blockchain-enabled cross-domain identity management system. J Commun Inf Netw 6(1):44\u201358. https:\/\/doi.org\/10.23919\/JCIN.2021.9387704","journal-title":"J Commun Inf Netw"},{"key":"355_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10018-0","author":"J Chen","year":"2021","unstructured":"Chen J, Xia X, Lo D, Grundy J, Yang X (2021) Maintenance-related concerns for post-deployed Ethereum smart contract development: issues, techniques, and future challenges. Engg Empirical Softw. https:\/\/doi.org\/10.1007\/s10664-021-10018-0","journal-title":"Engg Empirical Softw"},{"key":"355_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2024.110528","volume":"197","author":"W Chen","year":"2024","unstructured":"Chen W, Yang H, Zhao X, Wang H (2024) Strategies of electricity enterprises and urban parks cooperatively investing in electric vehicle charging stations. Comput Ind Eng 197:110528. https:\/\/doi.org\/10.1016\/j.cie.2024.110528","journal-title":"Comput Ind Eng"},{"issue":"9","key":"355_CR8","doi-asserted-by":"publisher","first-page":"15869","DOI":"10.1109\/JIOT.2024.3352016","volume":"11","author":"Y Chen","year":"2024","unstructured":"Chen Y, Zhang J, Wei X, Wang Y, Cui J (2024) Cross-domain authentication scheme for vehicles based on given virtual identities. IEEE Internet Things J 11(9):15869\u201315879. https:\/\/doi.org\/10.1109\/JIOT.2024.3352016","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"355_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TCSS.2021.3056540","volume":"9","author":"G Cheng","year":"2022","unstructured":"Cheng G, Chen Y, Deng S, Gao H, Yin J (2022) A blockchain-based mutual authentication scheme for collaborative edge computing. IEEE Trans Computat Social Syst 9(1):146\u2013158. https:\/\/doi.org\/10.1109\/TCSS.2021.3056540","journal-title":"IEEE Trans Computat Social Syst"},{"issue":"16","key":"355_CR10","doi-asserted-by":"publisher","first-page":"27043","DOI":"10.1109\/JIOT.2024.3399031","volume":"11","author":"CNA Cobblah","year":"2024","unstructured":"Cobblah CNA, Xia Q, Gao J, Xia H, Kusi GA, Obiri IA (2024) A secure and lightweight NDN-based vehicular network using edge computing and certificateless signcryption. IEEE Internet Things J 11(16):27043\u201327057. https:\/\/doi.org\/10.1109\/JIOT.2024.3399031","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"355_CR11","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1109\/TNSE.2022.3224453","volume":"10","author":"J Cui","year":"2023","unstructured":"Cui J, Liu N, Zhang Q, He D, Gu C, Zhong H (2023) Efficient and anonymous cross-domain authentication for iiot based on blockchain. IEEE Trans Netw Sci Eng 10(2):899\u2013910. https:\/\/doi.org\/10.1109\/TNSE.2022.3224453","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"9","key":"355_CR12","doi-asserted-by":"publisher","first-page":"16325","DOI":"10.1109\/JIOT.2024.3351892","volume":"11","author":"J Cui","year":"2024","unstructured":"Cui J, Zhu Y, Zhong H, Zhang Q, Gu C, He D (2024) Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIOT. IEEE Internet Things J 11(9):16325\u201316338. https:\/\/doi.org\/10.1109\/JIOT.2024.3351892","journal-title":"IEEE Internet Things J"},{"key":"355_CR13","unstructured":"Dib O, Brousmiche K-L, Durand A, Thea E, Hamida E (2018) Consortium blockchains: overview, applications and challenges"},{"issue":"2","key":"355_CR14","doi-asserted-by":"publisher","first-page":"3316","DOI":"10.1109\/JIOT.2023.3296506","volume":"11","author":"J Dong","year":"2024","unstructured":"Dong J, Xu G, Ma C, Liu J, Cliff UGO (2024) Blockchain-based certificate-free cross-domain authentication mechanism for industrial internet. IEEE Internet Things J 11(2):3316\u20133330. https:\/\/doi.org\/10.1109\/JIOT.2023.3296506","journal-title":"IEEE Internet Things J"},{"key":"355_CR15","doi-asserted-by":"publisher","unstructured":"Dong X, Lei C, Luo S (2021) Research on aggregate mode in car-hailing market\u2013from the perspective of compatibility. In: Proceedings of the 2021 5th international conference on E-Education, E-Business and E-Technology. ICEBT, Association for Computing Machinery, New York, 21, pp 126\u2013132. https:\/\/doi.org\/10.1145\/3474880.3474897","DOI":"10.1145\/3474880.3474897"},{"issue":"8","key":"355_CR16","doi-asserted-by":"publisher","first-page":"6224","DOI":"10.1109\/JIOT.2021.3113321","volume":"9","author":"C Feng","year":"2022","unstructured":"Feng C, Liu B, Guo Z, Yu K, Qin Z, Choo K-KR (2022) Blockchain-based cross-domain authentication for intelligent 5 g-enabled internet of drones. IEEE Internet Things J 9(8):6224\u20136238. https:\/\/doi.org\/10.1109\/JIOT.2021.3113321","journal-title":"IEEE Internet Things J"},{"key":"355_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2020.121219","volume":"261","author":"Z Fu","year":"2020","unstructured":"Fu Z, Dong P, Ju Y (2020) An intelligent electric vehicle charging system for new energy companies based on consortium blockchain. J Clean Prod 261:121219. https:\/\/doi.org\/10.1016\/j.jclepro.2020.121219","journal-title":"J Clean Prod"},{"issue":"14","key":"355_CR18","doi-asserted-by":"publisher","first-page":"12590","DOI":"10.1109\/JIOT.2023.3252051","volume":"10","author":"B Gong","year":"2023","unstructured":"Gong B, Zheng G, Waqas M, Tu S, Chen S (2023) Lcdma: Lightweight cross-domain mutual identity authentication scheme for internet of things. IEEE Internet Things J 10(14):12590\u201312602. https:\/\/doi.org\/10.1109\/JIOT.2023.3252051","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"355_CR19","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/TDSC.2016.2596286","volume":"15","author":"D He","year":"2018","unstructured":"He D, Kumar N, Wang H, Wang L, Choo K-KR, Vinel A (2018) A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans Depend Sec Comput 15(4):633\u2013645. https:\/\/doi.org\/10.1109\/TDSC.2016.2596286","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"355_CR49","doi-asserted-by":"publisher","unstructured":"He Y, Zhang C, Wu B, Geng Z, Xiao K, Li H (2021) A trusted architecture for EV shared charging based on blockchain technology. High-Confidence Comput 1(2). https:\/\/doi.org\/10.1016\/j.hcc.2021.100001","DOI":"10.1016\/j.hcc.2021.100001"},{"key":"355_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2024.03.003","author":"Y He","year":"2024","unstructured":"He Y, Yang Y, Wang C, Xie A, Ma L, Wu B, Wu Y (2024a) A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation. Digital Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2024.03.003","journal-title":"Digital Commun Netw"},{"key":"355_CR46","doi-asserted-by":"publisher","unstructured":"He Y, Zhou Z, Pan Y, Chong F, Wu B, Xiao K, Li H (2024b) Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization. High-Confidence Comput 4(3). https:\/\/doi.org\/10.1016\/j.hcc.2024.100233","DOI":"10.1016\/j.hcc.2024.100233"},{"key":"355_CR21","doi-asserted-by":"publisher","unstructured":"Jiang S, Chen X, Cao Y, Xu T, He J, Cui Y (2022) Apki: An anonymous authentication scheme based on pki for vanet. In: 2022 7th International conference on computer and communication systems (ICCCS), pp 530\u2013536. https:\/\/doi.org\/10.1109\/ICCCS55155.2022.9845923","DOI":"10.1109\/ICCCS55155.2022.9845923"},{"issue":"4","key":"355_CR22","doi-asserted-by":"publisher","first-page":"4434","DOI":"10.1109\/TNSM.2021.3098439","volume":"18","author":"M Li","year":"2021","unstructured":"Li M, Zhu L, Zhang Z, Lal C, Conti M, Alazab M (2021) Anonymous and verifiable reputation system for e-commerce platforms based on blockchain. IEEE Trans Netw Serv Manag 18(4):4434\u20134449. https:\/\/doi.org\/10.1109\/TNSM.2021.3098439","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"23","key":"355_CR23","doi-asserted-by":"publisher","first-page":"21100","DOI":"10.1109\/JIOT.2023.3285402","volume":"10","author":"X Li","year":"2023","unstructured":"Li X, Yin X, Ning J (2023) Relclas: A reliable malicious KGC-resistant certificateless aggregate signature protocol for vehicular ad hoc networks. IEEE Internet Things J 10(23):21100\u201321114. https:\/\/doi.org\/10.1109\/JIOT.2023.3285402","journal-title":"IEEE Internet Things J"},{"issue":"19","key":"355_CR24","doi-asserted-by":"publisher","first-page":"32025","DOI":"10.1109\/JIOT.2024.3422188","volume":"11","author":"X Liu","year":"2024","unstructured":"Liu X, Li L, Li X, Qi Y (2024) Lcaa: Lightweight conditional anonymous authentication scheme for vehicular carbon emissions environment. IEEE Internet Things J 11(19):32025\u201332040. https:\/\/doi.org\/10.1109\/JIOT.2024.3422188","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"355_CR25","doi-asserted-by":"publisher","first-page":"4444","DOI":"10.1109\/TSC.2023.3324736","volume":"16","author":"J Ma","year":"2023","unstructured":"Ma J, Xu S, Ning J, Huang X, Deng RH (2023) Catch me if you can: a secure bilateral access control system with anonymous credentials. IEEE Trans Serv Comput 16(6):4444\u20134455. https:\/\/doi.org\/10.1109\/TSC.2023.3324736","journal-title":"IEEE Trans Serv Comput"},{"issue":"2\/3","key":"355_CR26","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1147\/JRD.2019.2900647","volume":"63","author":"Y Manevich","year":"2019","unstructured":"Manevich Y, Barger A, Tock Y (2019) Endorsement in hyperledger fabric via service discovery. IBM J Res Dev 63(2\/3):2\u2013129. https:\/\/doi.org\/10.1147\/JRD.2019.2900647","journal-title":"IBM J Res Dev"},{"issue":"1","key":"355_CR27","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/JSYST.2020.2966526","volume":"15","author":"Q Mei","year":"2021","unstructured":"Mei Q, Xiong H, Chen J, Yang M, Kumari S, Khan MK (2021) Efficient certificateless aggregate signature with conditional privacy preservation in IOV. IEEE Syst J 15(1):245\u2013256. https:\/\/doi.org\/10.1109\/JSYST.2020.2966526","journal-title":"IEEE Syst J"},{"key":"355_CR28","unstructured":"Mordor intelligence: electric vehicle charging station market size and share analysis - growth trends forecasts (2024 - 2029). In: Accessed: 2024-12-12. https:\/\/www.mordorintelligence.com\/industry-reports\/electric-vehicles-charging-stations-market"},{"key":"355_CR29","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Consulted"},{"key":"355_CR30","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.comcom.2024.02.018","volume":"218","author":"Z Ou","year":"2024","unstructured":"Ou Z, Xing X, He S, Wang G (2024) TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication. Comput Commun 218:240\u2013252. https:\/\/doi.org\/10.1016\/j.comcom.2024.02.018","journal-title":"Comput Commun"},{"issue":"6","key":"355_CR31","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman R (1999) An overview of PKI trust models. IEEE Network 13(6):38\u201343. https:\/\/doi.org\/10.1109\/65.806987","journal-title":"IEEE Network"},{"issue":"7","key":"355_CR32","doi-asserted-by":"publisher","first-page":"11232","DOI":"10.1109\/JIOT.2023.3330580","volume":"11","author":"Z Qiao","year":"2024","unstructured":"Qiao Z, Ma K, Zhou Y, Yang Q, Xia Z, Yang B, Zhang M (2024) An anonymous and efficient certificate-based identity authentication protocol for VANET. IEEE Internet Things J 11(7):11232\u201311245. https:\/\/doi.org\/10.1109\/JIOT.2023.3330580","journal-title":"IEEE Internet Things J"},{"key":"355_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107520","volume":"163","author":"PK Roy","year":"2025","unstructured":"Roy PK, Kumar P, Bhattacharya A (2025) Zerovcs: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems. Future Gener Comput Syst 163:107520. https:\/\/doi.org\/10.1016\/j.future.2024.107520","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"355_CR34","doi-asserted-by":"publisher","first-page":"7866","DOI":"10.1109\/TVT.2024.3355711","volume":"73","author":"H Shen","year":"2024","unstructured":"Shen H, Wang T, Chen J, Tao Y, Chen F (2024) Blockchain-based batch authentication scheme for internet of vehicles. IEEE Trans Veh Technol 73(6):7866\u20137879. https:\/\/doi.org\/10.1109\/TVT.2024.3355711","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"355_CR35","doi-asserted-by":"publisher","first-page":"3751","DOI":"10.1109\/TSC.2023.3280914","volume":"16","author":"R Shi","year":"2023","unstructured":"Shi R, Feng H, Yang Y, Yuan F, Li Y, Pang HH, Deng RH (2023) Threshold attribute-based credentials with redactable signature. IEEE Trans Serv Comput 16(5):3751\u20133765. https:\/\/doi.org\/10.1109\/TSC.2023.3280914","journal-title":"IEEE Trans Serv Comput"},{"key":"355_CR36","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1016\/j.future.2017.04.037","volume":"107","author":"M Usman","year":"2020","unstructured":"Usman M, Knapen L, Yasar A-U-H, Bellemans T, Janssens D, Wets G (2020) Optimal recharging framework and simulation for electric vehicle fleet. Future Gener Comput Syst 107:745\u2013757. https:\/\/doi.org\/10.1016\/j.future.2017.04.037","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"355_CR37","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TITS.2021.3099488","volume":"23","author":"P Vijayakumar","year":"2022","unstructured":"Vijayakumar P, Azees M, Kozlov SA, Rodrigues JJPC (2022) An anonymous batch authentication and key exchange protocols for 6g enabled vanets. IEEE Trans Intell Transport Syst 23(2):1630\u20131638. https:\/\/doi.org\/10.1109\/TITS.2021.3099488","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"1","key":"355_CR38","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/TDSC.2020.2983022","volume":"19","author":"Z Wang","year":"2022","unstructured":"Wang Z, Lin J, Cai Q, Wang Q, Zha D, Jing J (2022) Blockchain-based certificate transparency and revocation transparency. IEEE Trans Depend Sec Comput 19(1):681\u2013697. https:\/\/doi.org\/10.1109\/TDSC.2020.2983022","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"355_CR47","doi-asserted-by":"publisher","unstructured":"Wang C, Xu X, Xiao K, He Y, Yang G (2024) Traffic anomaly detection algorithm for CAN bus using similarity analysis. High-Confidence Comput 4(3). https:\/\/doi.org\/10.1016\/j.hcc.2024.100207","DOI":"10.1016\/j.hcc.2024.100207"},{"issue":"11","key":"355_CR39","doi-asserted-by":"publisher","first-page":"8078","DOI":"10.1109\/JIOT.2021.3107443","volume":"9","author":"Y Yang","year":"2022","unstructured":"Yang Y, Wei L, Wu J, Long C, Li B (2022) A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet Things J 9(11):8078\u20138090. https:\/\/doi.org\/10.1109\/JIOT.2021.3107443","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"355_CR40","doi-asserted-by":"publisher","first-page":"3462","DOI":"10.1109\/JIOT.2020.2970092","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhong H, Cui J, Xu Y, Liu L (2020) An extensible and effective anonymous batch authentication scheme for smart vehicular networks. IEEE Internet Things J 7(4):3462\u20133473. https:\/\/doi.org\/10.1109\/JIOT.2020.2970092","journal-title":"IEEE Internet Things J"},{"key":"355_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2024.110323","author":"H Zhang","year":"2024","unstructured":"Zhang H, Lou Z, Hou F (2024) Incentive for blockchain technology adoption in an online platform-based co-opetitive supply chain. Comput Ind Eng. https:\/\/doi.org\/10.1016\/j.cie.2024.110323","journal-title":"Comput Ind Eng"},{"key":"355_CR42","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1109\/TIFS.2024.3349852","volume":"19","author":"X Zhang","year":"2024","unstructured":"Zhang X, Sun W, Xu Z, Cheng H, Cai C, Cui H, Li Q (2024a) Evm-shield: In-contract state access control for fast vulnerability detection and prevention. IEEE Trans Inf Forensics Secur 19:2517\u20132532. https:\/\/doi.org\/10.1109\/TIFS.2024.3349852","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"355_CR48","doi-asserted-by":"publisher","unstructured":"Zhang C, He Y, Wu B, Yang H, Xiao K, Li H (2024b) A verifiable and efficient cross-chain calculation model for charging pile reputation. High-Confidence Comput 4(2). https:\/\/doi.org\/10.1016\/j.hcc.2023.100180","DOI":"10.1016\/j.hcc.2023.100180"},{"issue":"10","key":"355_CR43","doi-asserted-by":"publisher","first-page":"14560","DOI":"10.1109\/TITS.2024.3386730","volume":"25","author":"Q Zhong","year":"2024","unstructured":"Zhong Q, Zhao X, Xia Y, Liu X (2024) Cd-basa: An efficient cross-domain batch authentication scheme based on blockchain with accumulator for vanets. IEEE Trans Intell Transport Syst 25(10):14560\u201314571. https:\/\/doi.org\/10.1109\/TITS.2024.3386730","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"10","key":"355_CR44","doi-asserted-by":"publisher","first-page":"10456","DOI":"10.1109\/TITS.2023.3275077","volume":"24","author":"F Zhu","year":"2023","unstructured":"Zhu F, Yi X, Abuadbba A, Khalil I, Huang X, Xu F (2023) A security-enhanced certificateless conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Intell Transport Syst 24(10):10456\u201310466. https:\/\/doi.org\/10.1109\/TITS.2023.3275077","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"10","key":"355_CR45","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"W Zou","year":"2021","unstructured":"Zou W, Lo D, Kochhar PS, Le X-BD, Xia X, Feng Y, Chen Z, Xu B (2021) Smart contract development: challenges and opportunities. IEEE Trans Softw Eng 47(10):2084\u20132106. https:\/\/doi.org\/10.1109\/TSE.2019.2942301","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00355-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00355-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00355-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T01:03:20Z","timestamp":1756343000000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00355-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,28]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["355"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00355-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,28]]},"assertion":[{"value":"22 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"We declare that we have no Conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"64"}}