{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:23:06Z","timestamp":1747153386343,"version":"3.40.5"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031600364"},{"type":"electronic","value":"9783031600371"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60037-1_7","type":"book-chapter","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:02:12Z","timestamp":1714633332000},"page":"115-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable Attribute-Based Proxy Re-encryption with\u00a0Non-repudiation Based on\u00a0Blockchain"],"prefix":"10.1007","author":[{"given":"Yaorui","family":"He","sequence":"first","affiliation":[]},{"given":"Ting","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Pei","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4397-1248","authenticated-orcid":false,"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inform. Syst. Secur. (TISSEC)"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108676","volume":"203","author":"T Baker","year":"2022","unstructured":"Baker, T., Asim, M., Samwini, H., Shamim, N., Alani, M.M., Buyya, R.: A blockchain-based fog-oriented lightweight framework for smart public vehicular transportation systems. Comput. Netw. 203, 108676 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2021.108676","journal-title":"Comput. Netw."},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Bao, Y., Qiu, W., Cheng, X., Sun, J.: Fine-grained data sharing with enhanced privacy protection and dynamic users group service for the IoV. IEEE Trans. Intell. Transp. Syst. 1\u201315 (2022). https:\/\/doi.org\/10.1109\/TITS.2022.3187980","DOI":"10.1109\/TITS.2022.3187980"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"Matt Blaze","year":"1998","unstructured":"Blaze, Matt, Bleumer, Gerrit, Strauss, Martin: Divertible protocols and atomic proxy cryptography. In: Nyberg, Kaisa (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054122"},{"issue":"10","key":"7_CR5","doi-asserted-by":"publisher","first-page":"465","DOI":"10.3390\/info11100465","volume":"11","author":"V Elagin","year":"2020","unstructured":"Elagin, V., Spirkina, A., Buinevich, M., Vladyko, A.: Technological aspects of blockchain application for vehicle-to-network. Information 11(10), 465 (2020)","journal-title":"Information"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Feng, T., Wang, D., Gong, R.: A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme. Information 14(5) (2023). https:\/\/doi.org\/10.3390\/info14050281","DOI":"10.3390\/info14050281"},{"issue":"7","key":"7_CR7","doi-asserted-by":"publisher","first-page":"5041","DOI":"10.1109\/TII.2020.3012508","volume":"17","author":"Y Gao","year":"2021","unstructured":"Gao, Y., Chen, Y., Hu, X., Lin, H., Liu, Y., Nie, L.: Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing. IEEE Trans. Industr. Inf. 17(7), 5041\u20135049 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3012508","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TDSC.2019.2899300","volume":"18","author":"C Ge","year":"2021","unstructured":"Ge, C., Liu, Z., Xia, J., Fang, L.: Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 18(3), 1214\u20131226 (2021). https:\/\/doi.org\/10.1109\/TDSC.2019.2899300","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"7_CR9","doi-asserted-by":"publisher","first-page":"2907","DOI":"10.1109\/TDSC.2021.3076580","volume":"19","author":"C Ge","year":"2021","unstructured":"Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 19(5), 2907\u20132919 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security","author":"Matthew Green","year":"2007","unstructured":"Green, Matthew, Ateniese, Giuseppe: Identity-based proxy re-encryption. In: Katz, Jonathan, Yung, Moti (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288\u2013306. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72738-5_19"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-27954-6_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"G Hanaoka","year":"2012","unstructured":"Hanaoka, G., et al.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, Orr (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349\u2013364. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_22"},{"key":"7_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107995","volume":"101","author":"H Karthikeyan","year":"2022","unstructured":"Karthikeyan, H., Usha, G.: Real-time DDoS flooding attack detection in intelligent transportation systems. Comput. Electr. Eng. 101, 107995 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107995","journal-title":"Comput. Electr. Eng."},{"issue":"7","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"JB Kenney","year":"2011","unstructured":"Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162\u20131182 (2011)","journal-title":"Proc. IEEE"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications security, pp. 276\u2013286 (2009)","DOI":"10.1145\/1533057.1533094"},{"issue":"11","key":"7_CR15","doi-asserted-by":"publisher","first-page":"22630","DOI":"10.1109\/TITS.2022.3183379","volume":"23","author":"J Liu","year":"2022","unstructured":"Liu, J., Zhang, L., Li, C., Bai, J., Lv, H., Lv, Z.: Blockchain-based secure communication of intelligent transportation digital twins system. IEEE Trans. Intell. Transp. Syst. 23(11), 22630\u201322640 (2022). https:\/\/doi.org\/10.1109\/TITS.2022.3183379","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"7_CR16","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008)"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-319-16715-2_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2015","author":"S Ohata","year":"2015","unstructured":"Ohata, S., Kawai, Y., Matsuda, T., Hanaoka, G., Matsuura, K.: Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption. In: Nyberg, K. (ed.) Topics in Cryptology \u2013 CT-RSA 2015, pp. 410\u2013428. Springer, Cham (2015)"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"555","DOI":"10.3390\/s23010555","volume":"23","author":"SK Panigrahy","year":"2023","unstructured":"Panigrahy, S.K., Emany, H.: A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles. Sensors 23(1), 555 (2023)","journal-title":"Sensors"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Shao, J.: Anonymous id-based proxy re-encryption, pp. 364\u2013375 (2012). https:\/\/doi.org\/10.1007\/978-3-642-31448-3_27","DOI":"10.1007\/978-3-642-31448-3_27"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. pp. 87\u201388. ASIACCS 2012. Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2414456.2414507","DOI":"10.1145\/2414456.2414507"},{"key":"7_CR21","doi-asserted-by":"publisher","unstructured":"Zavvos, E., Gerding, E.H., Yazdanpanah, V., Maple, C., Stein, S., Schraefel, M.: Privacy and trust in the internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(8), 10126\u201310141 (2022). https:\/\/doi.org\/10.1109\/TITS.2021.3121125","DOI":"10.1109\/TITS.2021.3121125"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Blockchain Technology and Emerging Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60037-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:03:34Z","timestamp":1714633414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60037-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031600364","9783031600371"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60037-1_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockTEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain Technology and Emerging Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocktea2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}