{"id":"https://openalex.org/W4416748465","doi":"https://doi.org/10.1109/tdsc.2025.3638157","title":"Blockchain-Enabled Efficient Deduplication and Mixed Auditing for Dynamic Cloud Data","display_name":"Blockchain-Enabled Efficient Deduplication and Mixed Auditing for Dynamic Cloud Data","publication_year":2025,"publication_date":"2025-11-27","ids":{"openalex":"https://openalex.org/W4416748465","doi":"https://doi.org/10.1109/tdsc.2025.3638157"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3638157","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3638157","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chunfei Pan","orcid":"https://orcid.org/0009-0002-8300-4404"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunfei Pan","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, PR China"],"raw_orcid":"https://orcid.org/0009-0002-8300-4404","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, PR China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083447692","display_name":"Lei Zhou","orcid":"https://orcid.org/0000-0002-7566-4819"},"institutions":[{"id":"https://openalex.org/I4387155285","display_name":"Suqian University","ror":"https://ror.org/00f93gn72","country_code":null,"type":"education","lineage":["https://openalex.org/I4387155285"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhou","raw_affiliation_strings":["School of Information Engineering, Suqian University, Suqian, China"],"raw_orcid":"https://orcid.org/0000-0002-7566-4819","affiliations":[{"raw_affiliation_string":"School of Information Engineering, Suqian University, Suqian, China","institution_ids":["https://openalex.org/I4387155285"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, PR China"],"raw_orcid":"https://orcid.org/0000-0002-1632-5737","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, PR China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000833104","display_name":"Zhenzhu Chen","orcid":"https://orcid.org/0000-0001-6094-5995"},"institutions":[{"id":"https://openalex.org/I204831749","display_name":"Southwestern University of Finance and Economics","ror":"https://ror.org/04ewct822","country_code":"CN","type":"education","lineage":["https://openalex.org/I204831749"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenzhu Chen","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwestern University of Finance and Economics, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-6094-5995","affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwestern University of Finance and Economics, Chengdu, China","institution_ids":["https://openalex.org/I204831749"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-7254-6465","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086945099","display_name":"Yifeng Zheng","orcid":"https://orcid.org/0000-0001-7852-6051"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yifeng Zheng","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, SAR, China","Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, China"],"raw_orcid":"https://orcid.org/0000-0001-7852-6051","affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, SAR, China","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067969908","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-6029-5064"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["Department of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia"],"raw_orcid":"https://orcid.org/0000-0001-6029-5064","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47511337,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"3554","last_page":"3570"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.003599999938160181,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.9085000157356262},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.6904000043869019},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6179999709129333},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6054999828338623},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5953999757766724},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5501000285148621},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5049999952316284},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4821000099182129},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4708999991416931},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4320000112056732}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.9085000157356262},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8388000130653381},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.6904000043869019},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6179999709129333},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6054999828338623},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5953999757766724},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5501000285148621},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5049999952316284},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4821000099182129},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4708999991416931},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4426000118255615},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4320000112056732},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.4242999851703644},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.39250001311302185},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.385699987411499},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37310001254081726},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.37220001220703125},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.36800000071525574},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.36480000615119934},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.33469998836517334},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3246000111103058},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.32030001282691956},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.288100004196167},{"id":"https://openalex.org/C4373008","wikidata":"https://www.wikidata.org/wiki/Q513349","display_name":"File server","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.27709999680519104},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.2653999924659729},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.2599000036716461},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.257099986076355}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2025.3638157","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3638157","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/abd55ec6-4f46-459c-bdea-dd68cd6519fd","is_oa":false,"landing_page_url":"https://admin.research-repository.uwa.edu.au/en/publications/abd55ec6-4f46-459c-bdea-dd68cd6519fd","pdf_url":null,"source":{"id":"https://openalex.org/S4306402492","display_name":"UWA Profiles and Research Repository (UWA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Pan, C, Zhou, L, Fu, A, Chen, Z, Wang, H, Zheng, Y & Gao, Y 2026, 'Blockchain-Enabled Efficient Deduplication and Mixed Auditing for Dynamic Cloud Data', IEEE Transactions on Dependable and Secure Computing, vol. 23, no. 2, pp. 3554-3570. https://doi.org/10.1109/TDSC.2025.3638157","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G163067561","display_name":null,"funder_award_id":"62302330","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2080849955","display_name":null,"funder_award_id":"U23B2002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G453319297","display_name":null,"funder_award_id":"BK20230727","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G5697206064","display_name":null,"funder_award_id":"62402397","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G913869186","display_name":null,"funder_award_id":"62372236","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1675372141","https://openalex.org/W2078656587","https://openalex.org/W2102881299","https://openalex.org/W2123069643","https://openalex.org/W2165257856","https://openalex.org/W2169502896","https://openalex.org/W2518462489","https://openalex.org/W2611557754","https://openalex.org/W2782900518","https://openalex.org/W2886682270","https://openalex.org/W2900957219","https://openalex.org/W2961017266","https://openalex.org/W3011462710","https://openalex.org/W3039635909","https://openalex.org/W3166063951","https://openalex.org/W3193159056","https://openalex.org/W3201382077","https://openalex.org/W4205221992","https://openalex.org/W4206772848","https://openalex.org/W4316661034","https://openalex.org/W4318477538","https://openalex.org/W4321608034","https://openalex.org/W4379382407","https://openalex.org/W4379742024","https://openalex.org/W4387448089","https://openalex.org/W4389076267","https://openalex.org/W4389169178","https://openalex.org/W4389249903","https://openalex.org/W4389428405","https://openalex.org/W4392251686","https://openalex.org/W4392642224","https://openalex.org/W4393379899","https://openalex.org/W4399881623","https://openalex.org/W4400489329","https://openalex.org/W4401808785","https://openalex.org/W4404469306","https://openalex.org/W4406046969","https://openalex.org/W4407361674","https://openalex.org/W4407448628","https://openalex.org/W4408181913"],"related_works":[],"abstract_inverted_index":{"As":[0],"cloud":[1,16,190],"storage":[2,17],"is":[3],"extensively":[4],"utilized":[5],"in":[6,222],"the":[7,33,138,142,150,200,223],"contemporary":[8],"digital":[9],"age,":[10],"assuring":[11],"data":[12,41,50,58,116,122,146,178,191,224],"integrity":[13],"and":[14,39,71,101,124,136,187,202,207,213],"conserving":[15],"space":[18],"has":[19],"become":[20],"a":[21,45,66,163],"priority":[22],"for":[23],"all.":[24],"However,":[25],"existing":[26],"cross-user":[27],"deduplication":[28,70,88,97],"audit":[29],"schemes":[30],"conflict":[31],"with":[32,215],"pay-as-you-go":[34],"model,":[35],"causing":[36],"unnecessary":[37],"costs":[38],"violating":[40],"isolation.":[42],"Moreover,":[43,173],"retaining":[44],"single":[46],"copy":[47],"of":[48,152,204],"identical":[49],"across":[51],"multiple":[52],"users":[53],"introduces":[54],"maintenance":[55,120],"challenges":[56],"during":[57,121],"operations.":[59],"To":[60],"address":[61],"these":[62],"issues,":[63],"we":[64,144,160,198],"propose":[65],"new":[67],"blockchain-enabled":[68],"efficient":[69],"mixed":[72,108],"auditing":[73],"scheme":[74,94,175,206],"which":[75],"intricately":[76],"integrates":[77],"Message-Locked":[78],"Encryption":[79],"(MLE)":[80],"to":[81,118,133],"construct":[82],"Homomorphic":[83],"Verifiable":[84],"Tags":[85],"(HVTs),":[86],"enabling":[87],"without":[89],"exposing":[90],"confidential":[91],"data.":[92],"Our":[93],"supports":[95],"single-user":[96],"at":[98],"both":[99],"block":[100],"file":[102],"levels,":[103],"as":[104,106],"well":[105],"plaintext-ciphertext":[107],"auditing,":[109],"thereby":[110],"preventing":[111],"redundant":[112],"payments":[113],"while":[114,148],"preserving":[115],"isolation":[117],"simplify":[119],"operations":[123,179],"ownership":[125,192],"transfers.":[126],"By":[127],"employing":[128],"Elliptic":[129],"Curve":[130],"Cryptography":[131],"(ECC)":[132],"encrypt":[134],"keys":[135,140],"storing":[137],"encrypted":[139],"on":[141,169],"blockchain,":[143],"ensure":[145],"confidentiality":[147],"reducing":[149],"burden":[151],"local":[153],"key":[154],"management.":[155],"Leveraging":[156],"blockchain-based":[157],"smart":[158],"contracts,":[159],"further":[161],"design":[162],"self-auditing":[164],"mechanism":[165],"that":[166],"eliminates":[167],"reliance":[168],"trusted":[170],"third-party":[171],"auditors.":[172],"our":[174,205],"embraces":[176],"dynamic":[177],"through":[180,211],"an":[181],"optimized":[182],"Merkle":[183],"Hash":[184],"Tree":[185],"(MHT)":[186],"enables":[188],"secure":[189],"transfer":[193],"via":[194],"identity":[195],"verification.":[196],"Finally,":[197],"prove":[199],"correctness":[201],"security":[203],"evaluate":[208],"its":[209,219],"performance":[210],"experiments":[212],"comparisons":[214],"state-of-the-art":[216],"works,":[217],"demonstrating":[218],"efficiency,":[220],"particularly":[221],"upload":[225],"phase.":[226]},"counts_by_year":[],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-11-28T00:00:00"}
