{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:54Z","timestamp":1742914254315,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031192074"},{"type":"electronic","value":"9783031192081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19208-1_30","type":"book-chapter","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:03:45Z","timestamp":1668643425000},"page":"364-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain-Aided Hierarchical Attribute-Based Encryption for\u00a0Data Sharing"],"prefix":"10.1007","author":[{"given":"Jiaxu","family":"Ding","sequence":"first","affiliation":[]},{"given":"Biwei","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Guijuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yubing","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766\u2013775 (2020). https:\/\/doi.org\/10.1109\/TNSE.2018.2830307","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in Industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968\u2013979 (2020). https:\/\/doi.org\/10.1109\/JSAC.2020.2980802","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"30_CR3","doi-asserted-by":"publisher","unstructured":"Zhu, L., Dong, H., Shen, M., Gai, K.: An incentive mechanism using shapley value for blockchain-based medical data sharing. In: 2019 IEEE 5th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), pp. 113\u2013118 (2019). https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS.2019.00030","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00030"},{"key":"30_CR4","doi-asserted-by":"publisher","unstructured":"Cao, S., Wang, J., Du, X., Zhang, X., Qin, X.: CEPS: a cross-blockchain based electronic health records privacy-preserving scheme. In: ICC 2020\u20132020 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICC40277.2020.9149326","DOI":"10.1109\/ICC40277.2020.9149326"},{"issue":"10","key":"30_CR5","doi-asserted-by":"publisher","first-page":"7139","DOI":"10.1109\/TII.2022.3145851","volume":"18","author":"J Zhang","year":"2022","unstructured":"Zhang, J., Yang, Y., Liu, X., Ma, J.: An efficient blockchain-based hierarchical data sharing for healthcare Internet of Things. IEEE Trans. Ind. Inform. 18(10), 7139\u20137150 (2022). https:\/\/doi.org\/10.1109\/TII.2022.3145851","journal-title":"IEEE Trans. Ind. Inform."},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"30_CR7","unstructured":"Roy, S., Chuah, M.: Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical report, Citeseer (2009)"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"30_CR9","doi-asserted-by":"publisher","unstructured":"Alatawi, S., Alhasani, A., Alfaidi, S., Albalawi, M., Almutairi, S.M.: A survey on cloud security issues and solution. In: 2020 International Conference on Computing and Information Technology (ICCIT-1441), pp. 1\u20135 (2020). https:\/\/doi.org\/10.1109\/ICCIT-144147971.2020.9214397","DOI":"10.1109\/ICCIT-144147971.2020.9214397"},{"key":"30_CR10","doi-asserted-by":"publisher","unstructured":"Zhang, H., Fang, L., Jiang, K., Zhang, W., Li, M., Zhou, L.: Secure door on cloud: a secure data transmission scheme to protect Kafka\u2019s data. In: 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), pp. 406\u2013413 (2020). https:\/\/doi.org\/10.1109\/ICPADS51040.2020.00061","DOI":"10.1109\/ICPADS51040.2020.00061"},{"key":"30_CR11","doi-asserted-by":"publisher","unstructured":"Yan, B., Yang, Z., Ren, Y., Tan, X., Liu, E.: Microblog sentiment classification using parallel SVM in apache spark. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 282\u2013288 (2017). https:\/\/doi.org\/10.1109\/BigDataCongress.2017.43","DOI":"10.1109\/BigDataCongress.2017.43"},{"issue":"5","key":"30_CR12","doi-asserted-by":"publisher","first-page":"4000","DOI":"10.1109\/JIOT.2019.2960526","volume":"7","author":"M Zhaofeng","year":"2019","unstructured":"Zhaofeng, M., Lingyun, W., Xiaochang, W., Zhen, W., Weizhe, Z.: Blockchain-enabled decentralized trust management and secure usage control of IoT big data. IEEE Internet Things J. 7(5), 4000\u20134015 (2019)","journal-title":"IEEE Internet Things J."},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.jpdc.2020.08.012","volume":"147","author":"Z Guan","year":"2021","unstructured":"Guan, Z., Lu, X., Yang, W., Wu, L., Wang, N., Zhang, Z.: Achieving efficient and privacy-preserving energy trading based on blockchain and ABE in smart grid. J. Parallel Distrib. Comput. 147, 34\u201345 (2021)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"6","key":"30_CR14","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JSAC.2020.2986619","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen, M., Duan, J., Zhu, L., Zhang, J., Du, X., Guizani, M.: Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 38(6), 1229\u20131241 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"30_CR15","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1109\/JSYST.2021.3077236","volume":"16","author":"F Wang","year":"2021","unstructured":"Wang, F., Wang, J., Shi, S.: Efficient data sharing with privacy preservation over lattices for secure cloud storage. IEEE Syst. J. 16(2), 2507\u20132517 (2021). https:\/\/doi.org\/10.1109\/JSYST.2021.3077236","journal-title":"IEEE Syst. J."},{"key":"30_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45539-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"R Cramer","year":"2000","unstructured":"Cramer, R., Damg\u00e5rd, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316\u2013334. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_22"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-1-4614-7873-7_3","volume-title":"Security for cloud storage systems","author":"K Yang","year":"2014","unstructured":"Yang, K., Jia, X.: ABAC: attribute-based access control. In: Yang, K., Jia, X. (eds.) Security for cloud storage systems, pp. 39\u201358. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4614-7873-7_3"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"30444","DOI":"10.1109\/ACCESS.2018.2846037","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhang, D., Zhang, Y., Liu, L.: Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage. IEEE Access 6, 30444\u201330457 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"30_CR19","first-page":"1158","volume":"36","author":"C Yanli","year":"2019","unstructured":"Yanli, C., Minhui, Z.: Privacy protection attribute-based ciphertext search scheme. Appl. Res. Comput. 36(4), 1158\u20131164 (2019)","journal-title":"Appl. Res. Comput."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19208-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:35:45Z","timestamp":1668645345000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19208-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031192074","9783031192081"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19208-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"265","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}