{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T14:11:28Z","timestamp":1717942288525},"reference-count":30,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872194","62072252"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2022,1,10]]},"abstract":"The implementation of immunity passport has been hampered by the controversies over vaccines in various countries, the privacy of vaccinators, and the forgery of passports. While some existing schemes have been devoted to accelerating this effort, the problems above are not well solved in existing schemes. In this paper, we present an immunity passport scheme based on the dual-blockchain architecture, which frees people from the cumbersome epidemic prevention process while traveling abroad. Specially, the dual-blockchain architecture is established to fit with the scenarios of immunity passport. Searchable encryption and anonymous authentication are utilized to ensure users\u2019 privacy. In addition, the performance and security evaluations show that our scheme achieves the proposed security goals and surpasses other authentication schemes in communicational and computational overheads.<\/jats:p>","DOI":"10.1155\/2022\/5721212","type":"journal-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T02:35:07Z","timestamp":1641868507000},"page":"1-11","source":"Crossref","is-referenced-by-count":6,"title":["An Immunity Passport Scheme Based on the Dual-Blockchain Architecture for International Travel"],"prefix":"10.1155","volume":"2022","author":[{"given":"Hancheng","family":"Gao","sequence":"first","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing 210023, China"}]},{"given":"Haoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing 210023, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4392-3599","authenticated-orcid":true,"given":"Haiping","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing 210023, China"}]},{"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"},{"name":"High Technology Research Key Laboratory of Wireless Sensor Network of Jiangsu Province, Nanjing 210023, China"}]},{"given":"Luo","family":"Jian","sequence":"additional","affiliation":[{"name":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.32861\/ijwpds.64.38.43"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1111\/tmi.13383"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eap.2021.02.012"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1038\/s41577-021-00592-1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-020-1124-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3390\/vaccines9020160"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajp.2021.102758"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1126\/science.abi5245"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1136\/medethics-2020-106814"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010026"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare7020056"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010043"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025953"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020513"},{"key":"16","article-title":"Blockchain meets COVID-19: a framework for contact information sharing and risk notification system","author":"J. Song","year":"2020"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1080\/25741292.2020.1850404"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2147\/PPA.S276183"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.2196\/25245"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043350"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80129-8_9"},{"key":"22","article-title":"DHP framework: digital health passports using blockchain--use case on international tourism during the COVID-19 pandemic","author":"C. M. Angelopoulos","year":"2020"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.004"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2896064"},{"key":"25","first-page":"1","article-title":"A user authentication scheme of IoT devices using blockchain-enabled fog nodes","author":"R. Almadhoun"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2969648"},{"key":"27","doi-asserted-by":"crossref","first-page":"225","DOI":"10.4337\/9781784717766.00019","article-title":"Blockchain technology: principles and applications","volume-title":"Research Handbook on Digital Transformations","author":"M. Pilkington","year":"2016"},{"key":"28","first-page":"277","article-title":"An efficient signature scheme from bilinear pairings and its applications","volume":"2947","author":"F. Zhang","year":"2004","journal-title":"International Workshop on Public Key Cryptography"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2022\/5721212.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2022\/5721212.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2022\/5721212.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T02:35:13Z","timestamp":1641868513000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/wcmc\/2022\/5721212\/"}},"subtitle":[],"editor":[{"given":"Jinguang","family":"Han","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":30,"alternative-id":["5721212","5721212"],"URL":"https:\/\/doi.org\/10.1155\/2022\/5721212","relation":{},"ISSN":["1530-8677","1530-8669"],"issn-type":[{"value":"1530-8677","type":"electronic"},{"value":"1530-8669","type":"print"}],"subject":[],"published":{"date-parts":[[2022,1,10]]}}}