{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:22:27Z","timestamp":1777044147539,"version":"3.51.4"},"reference-count":29,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067968","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T08:47:26Z","timestamp":1757580446000},"page":"5117-5134","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Efficient Storage Consistency Verification Technology for On-Chain and Off-Chain Data"],"prefix":"10.32604","volume":"85","author":[{"given":"Wei","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yi","family":"Sun","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system [Internet]; 2008 [cited 2025 Aug 1]. Available from: https:\/\/bitcoin.org\/.pdf."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/978-3-642-38348-9_22","author":"Papamanthou","year":"2013","journal-title":"Advances in cryptology\u2014EUROCRYPT 2013"},{"key":"ref3","series-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; 2015 Oct 12\u201316","first-page":"1693","article-title":"POSTER: lightweight streaming authenticated data structures","author":"Yu","year":"2015"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1016\/j.future.2018.04.018","article-title":"Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system","volume":"108","author":"Xu","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.jnca.2018.01.014","article-title":"Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures","volume":"107","author":"Xu","year":"2018","journal-title":"J Netw Comput Appl"},{"key":"ref6","series-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security; 2012 Oct 16\u201318","first-page":"953","article-title":"Verifiable data streaming","author":"Schroeder","year":"2012"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/978-3-662-47854-7_34","author":"Sch\u00f6der","year":"2015","journal-title":"Financial cryptography and data security"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/978-3-662-49384-7_16","author":"Krupp","year":"2016","journal-title":"Public-key cryptography\u2014PKC 2016"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.14778\/2733085.2733100","article-title":"Fast range query processing with strong privacy protection for cloud computing","volume":"7","author":"Li","year":"2014","journal-title":"Proc VLDB Endow"},{"key":"ref10","series-title":"Proceedings of the IEEE INFOCOM 2018\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2018 Apr 15\u201319","first-page":"160","article-title":"VENUS: verifiable range query in data streaming","author":"Tsai","year":"2018"},{"key":"ref11","first-page":"337","article-title":"Dynamic authenticated method for outsourcing data stream with access control in cloud","volume":"40","author":"Sun","year":"2017","journal-title":"Chin J Comput"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"11342","DOI":"10.1002\/int.23045","article-title":"Verifiable data streaming protocol supporting update history queries","volume":"37","author":"Miao","year":"2022","journal-title":"Int J Intell Syst"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3295","DOI":"10.1109\/TIFS.2020.2986879","article-title":"An adaptive authenticated data structure with privacy-preserving for big data stream in cloud","volume":"15","author":"Sun","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/s12243-018-0687-7","article-title":"New efficient constructions of verifiable data streaming with accountability","volume":"74","author":"Zhang","year":"2019","journal-title":"Ann Telecommun"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/978-3-030-88428-4_15","author":"Wei","year":"2021","journal-title":"Computer security\u2014ESORICS 2021"},{"key":"ref16","first-page":"438","article-title":"MedShare: a privacy-preserving medical data sharing system by using blockchain","volume":"16","author":"Wang","year":"2021","journal-title":"IEEE Trans Serv Comput"},{"key":"ref17","series-title":"Proceedings of the 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS); 2023 Jul 18\u201321","first-page":"794","article-title":"Secure collaborative learning in mining pool via robust and efficient verification","author":"Zhang","year":"2023"},{"key":"ref18","first-page":"14","article-title":"BlockShare: a blockchain empowered system for privacy-preserving verifiable data sharing","volume":"45","author":"Peng","year":"2022","journal-title":"IEEE Data Eng Bull"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2437","DOI":"10.1109\/TSC.2022.3216659","article-title":"An efficient and secure trading framework for shared charging service based on multiple consortium blockchains","volume":"16","author":"Sun","year":"2022","journal-title":"IEEE Trans Serv Comput"},{"key":"ref20","series-title":"Proceedings of the 2021 IEEE 37th International Conference on Data Engineering (ICDE); 2021 Apr 19\u201322","first-page":"996","article-title":"Authenticated keyword search in scalable hybrid-storage blockchains","author":"Zhang","year":"2021"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2445","DOI":"10.1109\/TKDE.2023.3324128","article-title":"Enabling efficient, verifiable, and secure conjunctive keyword search in hybrid-storage blockchains","volume":"36","author":"Cui","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref22","series-title":"Proceedings of the 2024 IEEE 40th International Conference on Data Engineering (ICDE); 2024 May 13\u201316","first-page":"1986","article-title":"Authenticated subgraph matching in hybrid-storage blockchains","author":"Li","year":"2024"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"e2179","DOI":"10.1002\/nem.2179","article-title":"Truthful decentralized blockchain oracles","volume":"32","author":"Cai","year":"2022","journal-title":"Int J Netw Mgmt"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"95","DOI":"10.4236\/jcc.2021.93007","article-title":"Trusted blockchain oracle scheme based on aggregate signature","volume":"9","author":"Liu","year":"2021","journal-title":"J Comput Commun"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2699909","article-title":"Dynamic provable data possession","volume":"17","author":"Erway","year":"2015","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2165","DOI":"10.1007\/s10586-023-04078-8","article-title":"A collusion-resistant certificateless provable data possession scheme for shared data with user revocation","volume":"27","author":"Yang","year":"2024","journal-title":"Clust Comput"},{"key":"ref27","first-page":"5312","article-title":"SMT: efficient authenticated data structure for streaming data on block-chain","volume":"34","author":"Sun","year":"2023","journal-title":"J Softw"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"3297","DOI":"10.1109\/TKDE.2024.3359173","article-title":"MPV: enabling fine-grained query authentication in hybrid-storage blockchain","volume":"36","author":"Liu","year":"2024","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref29","series-title":"Proceedings of the 2014 Network and Distributed System Security Symposium; 2014 Feb 23\u201326","article-title":"Decentralized anonymous credentials","author":"Garman"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_67968\/TSP_CMC_67968.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:21:33Z","timestamp":1763346093000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067968","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}