{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:24:24Z","timestamp":1743121464802,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031243820"},{"type":"electronic","value":"9783031243837"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-24383-7_27","type":"book-chapter","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T16:18:49Z","timestamp":1674577129000},"page":"494-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Update Method of CP-ABE Access Control Strategy Based on Smart Contract"],"prefix":"10.1007","author":[{"given":"Yu","family":"Hao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Cui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ru","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tingting","family":"Song","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenhan","family":"Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,1,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07), pp. 321\u2013334. Berkeley, California (2007)","key":"27_CR1","DOI":"10.1109\/SP.2007.11"},{"unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Consulted (2008)","key":"27_CR2"},{"doi-asserted-by":"crossref","unstructured":"Wen, Q., Gao, Y., Chen, Z., Wu, D.: A blockchain-based data sharing scheme in the supply chain by IIoT. In: 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), pp. 695\u2013700. Taipei, China (2019)","key":"27_CR3","DOI":"10.1109\/ICPHYS.2019.8780161"},{"doi-asserted-by":"crossref","unstructured":"Huang, D., Chung, C.J., Dong, Q., Luo J., Kang, M.: Building private blockchains over public blockchains (PoP) an attribute-based access control approach. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, pp. 355\u2013363. Limassol, Cyprus (2019)","key":"27_CR4","DOI":"10.1145\/3297280.3297317"},{"doi-asserted-by":"crossref","unstructured":"Yan, B., Yu, J., Wang, Y., Guo, Q., Chai B., Liu, S.: Blockchain-based service recommendation supporting data sharing. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 580\u2013589. Qingdao, China (2020)","key":"27_CR5","DOI":"10.1007\/978-3-030-59016-1_48"},{"issue":"11","key":"27_CR6","first-page":"79","volume":"28","author":"S Huang","year":"2019","unstructured":"Huang, S., Chen, L.W., Fam, B.B.: Data security sharing method based on CP-ABE and blockchain. Comput. Syst. App. 28(11), 79\u201386 (2019)","journal-title":"Comput. Syst. App."},{"issue":"3","key":"27_CR7","first-page":"88","volume":"6","author":"YX Qiu","year":"2020","unstructured":"Qiu, Y.X., Zhang, H.X., Cao, Q., Zhang, J.C., Chen, X.S., Jin, H.J.: Blockchain data access control scheme based on CP-ABE algorithm. Chinese J. Netw. Inf. Secur. 6(3), 88\u201398 (2020)","journal-title":"Chinese J. Netw. Inf. Secur."},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"101854","DOI":"10.1016\/j.sysarc.2020.101854","volume":"112","author":"X Qin","year":"2021","unstructured":"Qin, X., Huang, Y., Yang, Z., Li, X.: A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Architect. 112, 101854 (2021)","journal-title":"J. Syst. Architect."},{"issue":"4","key":"27_CR9","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1109\/TEM.2020.2966643","volume":"67","author":"G Yu","year":"2020","unstructured":"Yu, G., et al.: Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans. Eng. Manage. 67(4), 1213\u20131230 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"11","key":"27_CR10","first-page":"101","volume":"40","author":"YL Tian","year":"2019","unstructured":"Tian, Y.L., Yang, K.D., Wang, Z., Feng, T.: Algorithm of blockchain data provenance based on ABE. J. Commun. 40(11), 101\u2013111 (2019)","journal-title":"J. Commun."},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., He, D., Choo, K.K.R.: BaDS: blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. In: Wireless Communications and Mobile Computing, pp. 1\u20139 (2018)","key":"27_CR11","DOI":"10.1155\/2018\/2783658"},{"doi-asserted-by":"crossref","unstructured":"Gao, H., Ma, Z., Luo, S., Xu, Y., Wu, Z.: BSSPD: a blockchain-based security sharing scheme for personal data with fine-grained access control. In: Wireless Communications and Mobile Computing, pp. 1\u201320 (2021)","key":"27_CR12","DOI":"10.1155\/2021\/6658920"},{"unstructured":"Benet, J.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). arXiv preprint arXiv:1407.3561 (2014)","key":"27_CR13"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.1109\/ACCESS.2017.2669940","volume":"5","author":"V Odelu","year":"2017","unstructured":"Odelu, V., Das, A.K., Khan, M.K., Choo, K.K.R., Jo, M.: Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access 5, 3273\u20133283 (2017)","journal-title":"IEEE Access"},{"unstructured":"Khandla, D., Shahy, H., Bz, M.K., Pais, A.R., Raj, N.: Expressive CP-ABE scheme satisfying constant-size keys and ciphertexts. In: IACR Cryptol. ePrint Arch, p. 1257 (2019)","key":"27_CR15"},{"doi-asserted-by":"crossref","unstructured":"Jiang, S., Liu, J., Wang, L., Yoo, S.M.: Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In: ICC 2019\u20132019 IEEE International Conference on Communications (ICC), pp. 1\u20136. Tokio, Japan (2019)","key":"27_CR16","DOI":"10.1109\/ICC.2019.8761146"},{"issue":"2","key":"27_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/info12020047","volume":"12","author":"S Sun","year":"2021","unstructured":"Sun, S., Du, R., Chen, S.: A secure and computable blockchain-based data sharing scheme in IoT system. Information 12(2), 47 (2021)","journal-title":"Information"},{"issue":"1","key":"27_CR18","volume":"1757","author":"X Li","year":"2021","unstructured":"Li, X., Tan, M.: Electronic certificate sharing scheme with searchable attribute-based encryption on blockchain. J. Phys: Conf. Ser. 1757(1), 012161 (2021)","journal-title":"J. Phys: Conf. Ser."},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"59389","DOI":"10.1109\/ACCESS.2020.2982964","volume":"8","author":"J Sun","year":"2020","unstructured":"Sun, J., Yao, X., Wang, S., Wu, Y.: Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 8, 59389\u201359401 (2020)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Pham, V.D., et al.: B-Box-a decentralized storage system using IPFS, attributed-based encryption, and blockchain. In: 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 1\u20136. Ho Chi Minh City, Vietnam (2020)","key":"27_CR20","DOI":"10.1109\/RIVF48685.2020.9140747"},{"issue":"9","key":"27_CR21","first-page":"2620","volume":"30","author":"HB Tan","year":"2019","unstructured":"Tan, H.B., et al.: Archival data protection and sharing method based on blockchain. J. Softw. 30(9), 2620\u20132635 (2019)","journal-title":"J. Softw."},{"doi-asserted-by":"crossref","unstructured":"Mounnan, O., Mouatasim, A.E., Manad, O., Outchakoucht, A., Es-samaali H., Boubchir, L.: A novel approach based on blockchain to enhance security with dynamic policy updating. In: 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1-6. Paris, France (2020)","key":"27_CR22","DOI":"10.1109\/IOTSMS52051.2020.9340164"},{"doi-asserted-by":"crossref","unstructured":"Ma, W., et al.: Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp. 1\u20137. Sanya, China (2020)","key":"27_CR23","DOI":"10.1145\/3424978.3425019"},{"issue":"11","key":"27_CR24","doi-asserted-by":"publisher","first-page":"8949","DOI":"10.1109\/JIOT.2021.3055541","volume":"8","author":"R Guo","year":"2021","unstructured":"Guo, R., Yang, G., Shi, H., Zhang, Y., Zheng, D.: O3-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet of Things J. 8(11), 8949\u20138963 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3055541","journal-title":"IEEE Internet of Things J."},{"key":"27_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-13013-7_2","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"J Herranz","year":"2010","unstructured":"Herranz, J., Laguillaumie, F., R\u00e0fols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) Public Key Cryptography \u2013 PKC 2010. LNCS, vol. 6056, pp. 19\u201334. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13013-7_2"},{"key":"27_CR26","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.ins.2017.11.037","volume":"429","author":"W Susilo","year":"2018","unstructured":"Susilo, W., Yang, G., Guo, F., Huang, Q.: Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429, 349\u2013360 (2018). https:\/\/doi.org\/10.1016\/j.ins.2017.11.037","journal-title":"Inf. Sci."},{"key":"27_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-31448-3_25","volume-title":"Information Security and Privacy","author":"A Ge","year":"2012","unstructured":"Ge, A., Zhang, R., Chen, C., Ma, C., Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: Susilo, W., Mu, Y., Seberry, J. (eds.) Information Security and Privacy. LNCS, vol. 7372, pp. 336\u2013349. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31448-3_25"},{"key":"27_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-00843-6_2","volume-title":"Information Security Practice and Experience","author":"K Emura","year":"2009","unstructured":"Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) Information Security Practice and Experience. LNCS, vol. 5451, pp. 13\u201323. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00843-6_2"},{"key":"27_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Lewko","year":"2010","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2010. LNCS, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_4"},{"key":"27_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Public Key Cryptography \u2013 PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"key":"27_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-32009-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A Lewko","year":"2012","unstructured":"Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology \u2013 CRYPTO 2012. LNCS, vol. 7417, pp. 180\u2013198. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_12"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, S., Chase, M.: FAME: fast attribute-based message encryption. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.665\u2013682. Dallas, TX, USA (2017)","key":"27_CR32","DOI":"10.1145\/3133956.3134014"},{"doi-asserted-by":"crossref","unstructured":"Malluhi, Q.M., Shikfa, A., Trinh, V.C.: A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 230\u2013240. United Arab Emirates, Dubai (2017)","key":"27_CR33","DOI":"10.1145\/3052973.3052987"},{"issue":"11","key":"27_CR34","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1002\/sec.913","volume":"7","author":"N Doshi","year":"2014","unstructured":"Doshi, N., Jinwala, D.C.: Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Sec. Commun. Netwv 7(11), 1988\u20132002 (2014)","journal-title":"Sec. Commun. Netwv"},{"key":"27_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-319-12475-9_18","volume-title":"Provable Security","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) Provable Security. LNCS, vol. 8782, pp. 259\u2013273. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12475-9_18"},{"doi-asserted-by":"crossref","unstructured":"Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 456\u2013465. New York, NY, USA (2007)","key":"27_CR36","DOI":"10.1145\/1315245.1315302"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Z.B., Huang, D.J.: On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 753\u2013755. New York, NY, USA (2010)","key":"27_CR37","DOI":"10.1145\/1866307.1866420"},{"issue":"5","key":"27_CR38","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763\u2013771 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"ang, W., Wang, R., Guan, Z., Wu, L., Du, X.J., Guizani, M.: A lightweight attribute based encryption scheme with constant size ciphertext for Internet of Things. In: ICC 2020 IEEE International Conference on Communications (ICC), pp. 1\u20136. Dublin, Ireland (2020)","key":"27_CR39","DOI":"10.1109\/ICC40277.2020.9149294"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24383-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T16:27:34Z","timestamp":1674577654000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24383-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031243820","9783031243837"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24383-7_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/collaboratecom.eai-conferences.org\/2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confyplus.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"171","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}