{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:21:55Z","timestamp":1742952115257,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953874"},{"type":"electronic","value":"9783030953881"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95388-1_41","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"617-631","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Non-interactive Zero Knowledge Proof Based Access Control in Information-Centric Internet of\u00a0Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1085-9877","authenticated-orcid":false,"given":"Han","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8861-5461","authenticated-orcid":false,"given":"Dezhi","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"41_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2012.6231276","volume":"50","author":"B Ahlgren","year":"2012","unstructured":"Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50, 26\u201336 (2012)","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference (2018)","key":"41_CR2","DOI":"10.1145\/3190508.3190538"},{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334 (2007)","key":"41_CR3","DOI":"10.1109\/SP.2007.11"},{"doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: STOC \u201988 (1988)","key":"41_CR4","DOI":"10.1145\/62212.62222"},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"15815","DOI":"10.1109\/TVT.2020.3036631","volume":"69","author":"M Cui","year":"2020","unstructured":"Cui, M., Han, D., Wang, J., Li, K.C., Chan, C.C.: ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Trans. Veh. Technol. 69, 15815\u201315827 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"41_CR6","doi-asserted-by":"publisher","first-page":"9076","DOI":"10.1109\/JIOT.2019.2927497","volume":"6","author":"M Cui","year":"2019","unstructured":"Cui, M., Han, D., Wang, J.: An efficient and safe road condition monitoring authentication scheme based on fog computing. IEEE Internet Things J. 6, 9076\u20139084 (2019)","journal-title":"IEEE Internet Things J."},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","volume":"6","author":"S Ding","year":"2018","unstructured":"Ding, S., Li, C., Li, H.: A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access 6, 27336\u201327345 (2018)","journal-title":"IEEE Access"},{"key":"41_CR8","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.3390\/s17071695","volume":"17","author":"K Fan","year":"2017","unstructured":"Fan, K., Wang, J., Wang, X., Li, H., Yang, Y.: A secure and verifiable outsourced access control scheme in fog-cloud computing. Sensors (Basel, Switzerland) 17, 1695 (2017)","journal-title":"Sensors (Basel, Switzerland)"},{"doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: STOC \u201985 (1985)","key":"41_CR9","DOI":"10.1145\/22145.22178"},{"key":"41_CR10","first-page":"309","volume":"2006","author":"V Goyal","year":"2006","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. IACR Cryptol. ePrint Arch. 2006, 309 (2006)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"41_CR11","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo, F., Mu, Y., Susilo, W., Wong, D., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. For. Secur. 9, 763\u2013771 (2014)","journal-title":"IEEE Trans. Inf. For. Secur."},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","volume":"19","author":"D Han","year":"2020","unstructured":"Han, D., Pan, N., Li, K.C.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans. Depend. Secure Comput. 19, 316\u2013327 (2020)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"doi-asserted-by":"publisher","unstructured":"Han, D., Zhu, Y., Li, D., Liang, W., Souri, A., Li, K.C.: A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Trans. Ind. Inf., 1 (2021). https:\/\/doi.org\/10.1109\/TII.2021.3114621","key":"41_CR13","DOI":"10.1109\/TII.2021.3114621"},{"key":"41_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2019.02.008","volume":"153","author":"J Hao","year":"2019","unstructured":"Hao, J., Huang, C., Ni, J., Rong, H., Xian, M., Shen, X.: Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Netw. 153, 1\u201310 (2019)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Li, H., Han, D., Tang, M.: A privacy-preserving storage scheme for logistics data with assistance of blockchain. IEEE Internet Things J. (2021)","key":"41_CR15","DOI":"10.1109\/JIOT.2021.3107846"},{"key":"41_CR16","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/JIOT.2017.2666799","volume":"4","author":"R Li","year":"2017","unstructured":"Li, R., Asaeda, H., Li, J.: A distributed publisher-driven secure data sharing scheme for information-centric IoT. IEEE Internet Things J. 4, 791\u2013803 (2017)","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Li, R., Asaeda, H., Li, J., Fu, X.: A verifiable and flexible data sharing mechanism for information-centric IoT. In: 2017 IEEE International Conference on Communications (ICC), pp. 1\u20137 (2017)","key":"41_CR17","DOI":"10.1109\/ICC.2017.7996804"},{"key":"41_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3391297","volume":"17","author":"W Liang","year":"2021","unstructured":"Liang, W., Long, J., Li, K.C., Xu, J., Ma, N., Lei, X.: A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 17, 1\u201316 (2021)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)"},{"key":"41_CR19","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1016\/j.ins.2021.08.035","volume":"579","author":"W Liang","year":"2021","unstructured":"Liang, W., Ning, Z., Xie, S., Hu, Y., Lu, S., Zhang, D.: Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inf. Sci. 579, 468\u2013482 (2021)","journal-title":"Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Liang, W., Xiao, L., Zhang, K., Tang, M., He, D., Li, K.C.: Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J., 1 (2021)","key":"41_CR20","DOI":"10.1109\/JIOT.2021.3053842"},{"doi-asserted-by":"crossref","unstructured":"Liang, W., et al.: Deep neural network security collaborative filtering scheme for service recommendation in intelligent cyber-physical systems. IEEE Internet of Things J., 1 (2021)","key":"41_CR21","DOI":"10.1109\/JIOT.2021.3086845"},{"key":"41_CR22","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1109\/TETC.2020.2993032","volume":"9","author":"W Liang","year":"2021","unstructured":"Liang, W., Zhang, D., Lei, X., Tang, M., Li, K.C., Zomaya, A.: Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 9, 1410\u20131420 (2021)","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"41_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.jpdc.2021.02.011","volume":"151","author":"H Liu","year":"2021","unstructured":"Liu, H., Han, D., Li, D.: Behavior analysis and blockchain based trust management in vanets. J. Para. Distrib. Comput. 151, 61\u201369 (2021)","journal-title":"J. Para. Distrib. Comput."},{"unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009)","key":"41_CR24"},{"key":"41_CR25","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.comcom.2019.05.010","volume":"142\u2013143","author":"B Nour","year":"2019","unstructured":"Nour, B., Sharif, K., Li, F., Biswas, S., Moungla, H., Guizani, M., Wang, Y.: A survey of internet of things communication using ICN: a use case perspective. Comput. Commun. 142\u2013143, 95\u2013123 (2019)","journal-title":"Comput. Commun."},{"key":"41_CR26","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.1109\/ACCESS.2017.2669940","volume":"5","author":"V Odelu","year":"2017","unstructured":"Odelu, V., Das, A., Khan, M.K., Choo, K.K.R., Jo, M.: Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access 5, 3273\u20133283 (2017)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"P\u00e9rez, S., Rotondi, D., Pedone, D., Straniero, L., Nu\u00f1ez, M., Gigante, F.: Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts. In: IMIS (2017)","key":"41_CR27","DOI":"10.1007\/978-3-319-61542-4_93"},{"key":"41_CR28","first-page":"86","volume":"2004","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. IACR Cryptol. ePrint Arch. 2004, 86 (2005)","journal-title":"IACR Cryptol. ePrint Arch."},{"doi-asserted-by":"crossref","unstructured":"Touati, L., Challal, Y.: Batch-based CP-ABE with attribute revocation mechanism for the Internet of Things. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 1044\u20131049 (2015)","key":"41_CR29","DOI":"10.1109\/ICCNC.2015.7069492"},{"doi-asserted-by":"crossref","unstructured":"Touati, L., Challal, Y.: Efficient CP-ABE attribute\/key management for IoT applications. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 343\u2013350 (2015)","key":"41_CR30","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.49"},{"key":"41_CR31","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"SR Wang","year":"2018","unstructured":"Wang, S.R., Zhang, Y., Zhang, Y.: A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6, 38437\u201338450 (2018)","journal-title":"IEEE Access"},{"key":"41_CR32","first-page":"4467","volume":"56","author":"S Wang","year":"2020","unstructured":"Wang, S., Wang, H., Li, J., Wang, H., Chaudhry, J., Alazab, M., Song, H.: A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network. IEEE Trans. Ind. Appl. 56, 4467\u20134477 (2020)","journal-title":"IEEE Trans. Ind. Appl."},{"unstructured":"Wood, D.D.: Ethereum: a secure decentralised generalised transaction ledger (2014)","key":"41_CR33"},{"key":"41_CR34","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/09540091.2020.1753175","volume":"33","author":"T Xiao","year":"2021","unstructured":"Xiao, T., Han, D., He, J., Li, K.C., de Mello, R.F.: Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connect. Sci. 33, 95\u2013112 (2021)","journal-title":"Connect. Sci."},{"key":"41_CR35","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1109\/TIFS.2018.2809679","volume":"13","author":"K Xue","year":"2018","unstructured":"Xue, K., Chen, W., Li, W., Hong, J., Hong, P.: Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans. Inf. For. Secur. 13, 2062\u20132074 (2018)","journal-title":"IEEE Trans. Inf. For. Secur."},{"doi-asserted-by":"crossref","unstructured":"Yuan, C., Xu, M., Si, X., Li, B.: Blockchain with accountable CP-ABE: how to effectively protect the electronic documents. In: 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), pp. 800\u2013803 (2017)","key":"41_CR36","DOI":"10.1109\/ICPADS.2017.00111"},{"key":"41_CR37","first-page":"2783658:1","volume":"2018","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., He, D., Choo, K.K.R.: Bads: blockchain-based architecture for data sharing with abs and CP-ABE in IoT. Wirel. Commun. Mob. Comput. 2018, 2783658:1-2783658:9 (2018)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"41_CR38","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-018-0637-2","volume":"101","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Ren, M., Jiang, S., Zhu, G., Xiong, H.: An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing 101, 1041\u20131065 (2018)","journal-title":"Computing"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95388-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:32:35Z","timestamp":1645518755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95388-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953874","9783030953881"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95388-1_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}