{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:02:18Z","timestamp":1761998538699,"version":"build-2065373602"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People's Republic of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1804600"],"award-info":[{"award-number":["2020YFB1804600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["30918012204","30920041112"],"award-info":[{"award-number":["30918012204","30920041112"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1016\/j.jisa.2023.103477","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T17:46:46Z","timestamp":1680112006000},"page":"103477","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Secure multi-factor access control mechanism for pairing blockchains"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6447-6820","authenticated-orcid":false,"given":"Abigail Akosua","family":"Addobea","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0998-1517","authenticated-orcid":false,"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1642-0291","authenticated-orcid":false,"suffix":"Jr.","given":"Isaac Amankona","family":"Obiri","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Hou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103477_b1","doi-asserted-by":"crossref","DOI":"10.1155\/2021\/4145512","article-title":"SmartMedChain: a blockchain-based privacy-preserving smart healthcare framework","volume":"2021","author":"El Majdoubi","year":"2021","journal-title":"J Healthc Eng"},{"issue":"1","key":"10.1016\/j.jisa.2023.103477_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/cryptography2010001","article-title":"Multi-factor authentication: A survey","volume":"2","author":"Ometov","year":"2018","journal-title":"Cryptography"},{"key":"10.1016\/j.jisa.2023.103477_b3","series-title":"2019 international conference on information networking","first-page":"66","article-title":"Trustless two-factor authentication using smart contracts in blockchains","author":"Amrutiya","year":"2019"},{"key":"10.1016\/j.jisa.2023.103477_b4","doi-asserted-by":"crossref","first-page":"32677","DOI":"10.1109\/ACCESS.2018.2844548","article-title":"T2FA: Transparent two-factor authentication","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103477_b5","doi-asserted-by":"crossref","DOI":"10.1155\/2021\/3866006","article-title":"Blockchain-envisioned secure authentication approach in AIoT: applications, challenges, and future research","volume":"2021","author":"Wazid","year":"2021","journal-title":"Wirel Commun Mob Comput"},{"key":"10.1016\/j.jisa.2023.103477_b6","doi-asserted-by":"crossref","unstructured":"Akram J, Akram A, Jhaveri RH, Alazab M, Chi H. BC-IoDT: blockchain-based framework for authentication in internet of drone things. In: Proceedings of the 5th international ACM mobicom workshop on drone assisted wireless communications for 5G and beyond. 2022, p. 115\u201320.","DOI":"10.1145\/3555661.3560874"},{"issue":"3","key":"10.1016\/j.jisa.2023.103477_b7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.17706\/jsw.16.3.95-106","article-title":"Permissioned vs. permissionless blockchain: how and why there is only one right choice","volume":"16","author":"Solat","year":"2021","journal-title":"J Softw"},{"key":"10.1016\/j.jisa.2023.103477_b8","article-title":"Permissionless and permissioned blockchain diffusion","volume":"54","author":"Helliar","year":"2020","journal-title":"Int J Inf Manage"},{"issue":"2","key":"10.1016\/j.jisa.2023.103477_b9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJGC.2018070101","article-title":"Access control framework using multi-factor authentication in cloud computing","volume":"9","author":"Patel","year":"2018","journal-title":"Int J Green Comput"},{"key":"10.1016\/j.jisa.2023.103477_b10","doi-asserted-by":"crossref","unstructured":"Lonetti F, Marchetti E. Issues and Challenges of Access Control in the Cloud. In: WEBIST. 2018, p. 261\u20138.","DOI":"10.5220\/0006948702610268"},{"key":"10.1016\/j.jisa.2023.103477_b11","doi-asserted-by":"crossref","first-page":"18207","DOI":"10.1109\/ACCESS.2020.2968492","article-title":"Fabric-IoT: A blockchain-based access control system in IoT","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103477_b12","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/j.future.2020.05.009","article-title":"Indistinguishability and unextractablility of password-based authentication in blockchain","volume":"112","author":"Huang","year":"2020","journal-title":"Future Gener Comput Syst"},{"issue":"18","key":"10.1016\/j.jisa.2023.103477_b13","doi-asserted-by":"crossref","first-page":"6018","DOI":"10.3390\/s21186018","article-title":"A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles","volume":"21","author":"Kebande","year":"2021","journal-title":"Sensors"},{"issue":"17","key":"10.1016\/j.jisa.2023.103477_b14","doi-asserted-by":"crossref","first-page":"3663","DOI":"10.3390\/s19173663","article-title":"An effective multifactor authentication mechanism based on combiners of hash function over internet of things","volume":"19","author":"Ahmed","year":"2019","journal-title":"Sensors"},{"issue":"24","key":"10.1016\/j.jisa.2023.103477_b15","doi-asserted-by":"crossref","first-page":"7136","DOI":"10.3390\/s20247136","article-title":"A secure and lightweight three-factor-based authentication scheme for smart healthcare systems","volume":"20","author":"Ryu","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.jisa.2023.103477_b16","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.ins.2020.12.035","article-title":"LBAC: A lightweight blockchain-based access control scheme for the internet of things","volume":"554","author":"Qin","year":"2021","journal-title":"Inform Sci"},{"year":"2018","series-title":"Eethereum improvement proposals (EIPs)","author":"Antonio Salazar Cardozo","key":"10.1016\/j.jisa.2023.103477_b17"},{"key":"10.1016\/j.jisa.2023.103477_b18","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2020.03.025","article-title":"IoT device location information storage system based on blockchain","volume":"109","author":"Li","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.jisa.2023.103477_b19","series-title":"2017 13th european dependable computing conference","first-page":"151","article-title":"A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database","author":"Aniello","year":"2017"},{"year":"2018","series-title":"PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain","author":"De Angelis","key":"10.1016\/j.jisa.2023.103477_b20"},{"issue":"1","key":"10.1016\/j.jisa.2023.103477_b21","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"Nguyen","year":"2018","journal-title":"J Inf Process Syst"},{"year":"2019","series-title":"A how-to-guide for multi-factor authentication","author":"CAREERS","key":"10.1016\/j.jisa.2023.103477_b22"},{"key":"10.1016\/j.jisa.2023.103477_b23","article-title":"Efficient and privacy-preserving blockchain-based multi-factor device authentication protocol for cross-domain IIoT","author":"Zhang","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.jisa.2023.103477_b24","series-title":"International conference on trust and privacy in digital business","first-page":"167","article-title":"Towards blockchain-based identity and access management for internet of things in enterprises","author":"Nuss","year":"2018"},{"year":"2020","series-title":"OAuth 2.0 authorization using blockchain-based tokens","author":"Fotiou","key":"10.1016\/j.jisa.2023.103477_b25"},{"issue":"3","key":"10.1016\/j.jisa.2023.103477_b26","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.icte.2021.08.003","article-title":"Securing biometric authentication system using blockchain","volume":"7","author":"Lee","year":"2021","journal-title":"ICT Express"},{"key":"10.1016\/j.jisa.2023.103477_b27","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.future.2020.03.034","article-title":"Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme","volume":"109","author":"Bian","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.jisa.2023.103477_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103177","article-title":"LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment","volume":"192","author":"Alsahlani","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"10.1016\/j.jisa.2023.103477_b29","series-title":"2017 15th annual conference on privacy, security and trust","first-page":"44","article-title":"An identity management system based on blockchain","author":"Liu","year":"2017"},{"issue":"3","key":"10.1016\/j.jisa.2023.103477_b30","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity-based encryption from the weil pairing","volume":"32","author":"Boneh","year":"2003","journal-title":"SIAM J Comput"},{"key":"10.1016\/j.jisa.2023.103477_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2022.04.036","article-title":"A survey on blockchain-based integrity auditing for cloud data","author":"Han","year":"2022","journal-title":"Digit Commun Netw"},{"issue":"2","key":"10.1016\/j.jisa.2023.103477_b32","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BF00124891","article-title":"Authentication and authenticated key exchanges","volume":"2","author":"Diffie","year":"1992","journal-title":"Des Codes Cryptogr"},{"year":"2015","series-title":"The elliptic curve diffie-hellman (ecdh)","author":"Haakegaard","key":"10.1016\/j.jisa.2023.103477_b33"},{"key":"10.1016\/j.jisa.2023.103477_b34","series-title":"International conference on the theory and application of cryptology and information security","first-page":"452","article-title":"Certificateless public key cryptography","author":"Al-Riyami","year":"2003"},{"issue":"6","key":"10.1016\/j.jisa.2023.103477_b35","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MIC.2014.126","article-title":"Transport layer security","volume":"18","author":"Turner","year":"2014","journal-title":"IEEE Internet Comput"},{"issue":"4","key":"10.1016\/j.jisa.2023.103477_b36","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MC.2006.138","article-title":"Secure sockets layer","volume":"39","author":"Weaver","year":"2006","journal-title":"Computer"},{"issue":"1","key":"10.1016\/j.jisa.2023.103477_b37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-020-01658-8","article-title":"An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) system","volume":"45","author":"Ullah","year":"2021","journal-title":"J Med Syst"},{"key":"10.1016\/j.jisa.2023.103477_b38","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108586","article-title":"Blockchain-based privacy preserving e-health system for healthcare data in cloud","volume":"203","author":"Zhang","year":"2022","journal-title":"Comput Netw"},{"key":"10.1016\/j.jisa.2023.103477_b39","article-title":"A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain","author":"Agyekum","year":"2021","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.jisa.2023.103477_b40","doi-asserted-by":"crossref","DOI":"10.1155\/2020\/6679022","article-title":"Research on multidomain authentication of IoT based on cross-chain technology","volume":"2020","author":"Li","year":"2020","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.jisa.2023.103477_b41","doi-asserted-by":"crossref","first-page":"118943","DOI":"10.1109\/ACCESS.2019.2937685","article-title":"A blockchain-based medical data sharing and protection scheme","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103477_b42","article-title":"A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection","volume":"2021","author":"Chen","year":"2021","journal-title":"Wirel Commun Mob Comput"},{"year":"2003","series-title":"Miracl-a multiprecision integer and rational arithmetic c\/c++ library","author":"Scott","key":"10.1016\/j.jisa.2023.103477_b43"},{"year":"2007","series-title":"On the implementation of pairing-based cryptosystems","author":"Lynn","key":"10.1016\/j.jisa.2023.103477_b44"},{"key":"10.1016\/j.jisa.2023.103477_b45","series-title":"2011 IEEE symposium on computers and communications","first-page":"850","article-title":"jPBC: Java pairing based cryptography","author":"De Caro","year":"2011"},{"year":"2020","series-title":"py-eth-pairing 0.1.4","author":"lucienoa","key":"10.1016\/j.jisa.2023.103477_b46"},{"key":"10.1016\/j.jisa.2023.103477_b47","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2022.102589","article-title":"A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing","author":"Zhang","year":"2022","journal-title":"J Syst Archit"},{"key":"10.1016\/j.jisa.2023.103477_b48","series-title":"2021 IEEE international conference on blockchain and cryptocurrency","first-page":"1","article-title":"Choice of ethereum clients for private blockchain: assessment from proof of authority perspective","author":"Samuel","year":"2021"},{"key":"10.1016\/j.jisa.2023.103477_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2021.107499","article-title":"Challenges of blockchain in new generation energy systems and future outlooks","volume":"135","author":"Wang","year":"2022","journal-title":"Int J Electr Power Energy Syst"},{"key":"10.1016\/j.jisa.2023.103477_b50","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2021.3078072","article-title":"The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial","author":"Ferrag","year":"2021","journal-title":"IEEE Internet Things J"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623000613?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623000613?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T11:59:04Z","timestamp":1761998344000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623000613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":50,"alternative-id":["S2214212623000613"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103477","relation":{},"ISSN":["2214-2126"],"issn-type":[{"type":"print","value":"2214-2126"}],"subject":[],"published":{"date-parts":[[2023,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure multi-factor access control mechanism for pairing blockchains","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103477","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"103477"}}