{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:19:36Z","timestamp":1743153576284,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030371098"},{"type":"electronic","value":"9783030371104"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37110-4_4","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T14:04:03Z","timestamp":1581602643000},"page":"45-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Sharing of Encrypted Files in Blockchain Made Simpler"],"prefix":"10.1007","author":[{"given":"S. Sharmila Deva","family":"Selvi","sequence":"first","affiliation":[]},{"given":"Arinjita","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Siva","family":"Dirisala","sequence":"additional","affiliation":[]},{"given":"Saswata","family":"Basu","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"unstructured":"0box application by 0chain: \nhttps:\/\/0chain.net\/zerobox","key":"4_CR1"},{"unstructured":"Ochain website: \nhttps:\/\/0chain.net","key":"4_CR2"},{"doi-asserted-by":"crossref","unstructured":"Selvi, S.S.D., Paul, A., Pandu Rangan, C.: A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model. In: CANS, Lecture Notes in Computer Science, vol. 11261, pp. 459\u2013469. Springer (2017)","key":"4_CR3","DOI":"10.1007\/978-3-030-02641-7_21"},{"unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Advances in Cryptology\u2014EUROCRYPT$$^{\\prime }$$98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 127\u2013144 (1998)","key":"4_CR4"},{"unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the Network and Distributed System Security Symposium, p. 2005. NDSS, San Diego, California, USA (2005)","key":"4_CR5"},{"unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","key":"4_CR6"},{"unstructured":"Selvi, S.S.D., Paul, A., Pandu Rangan, C.: An efficient non-transferable proxy re-encryption scheme. In: Proceedings of the 8th International Conference on Applications and Techniques in Information Security\u2014ATIS 2017, Auckland, New Zealand, July 6-7, 2017, pp. 35\u201347 (2017)","key":"4_CR7"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jnca.2017.03.005","volume":"87","author":"D Nu\u00f1ez","year":"2017","unstructured":"Nu\u00f1ez, D., Agudo, I., L\u00f3pez, J.: Proxy re-encryption: Analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87, 193\u2013209 (2017)","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"IAgudo, I., Nuez, D., Lopez, J.: A parametric family of attack models for proxy re-encryption. Cryptology ePrint Archive, Report 2016\/293 (2016). \nhttps:\/\/eprint.iacr.org\/2016\/293","key":"4_CR9"},{"unstructured":"Bernstein, D.J.: The GO programming language. \nhttps:\/\/golang.org\/","key":"4_CR10"},{"unstructured":"Bernstein, D.J.: Curve25519: new diffie-hellman speed records. In: Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography\u2014PKC 2006, New York, NY, USA, April 24-26, 2006, pp. 207\u2013228 (2006)","key":"4_CR11"},{"unstructured":"Mayer, H.: Ecdsa security in bitcoin and ethereum: a research survey. CoinFaabrik, June 28 (2016)","key":"4_CR12"},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Gamal El","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37110-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:31:00Z","timestamp":1581640260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37110-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030371098","9783030371104"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37110-4_4","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"type":"print","value":"2198-7246"},{"type":"electronic","value":"2198-7254"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}