{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:17:11Z","timestamp":1743031031758,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031600364"},{"type":"electronic","value":"9783031600371"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60037-1_8","type":"book-chapter","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:02:12Z","timestamp":1714633332000},"page":"135-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Hierarchical Access Control with\u00a0Efficient Revocation in\u00a0mHealth System"],"prefix":"10.1007","author":[{"given":"Ting","family":"Liang","sequence":"first","affiliation":[]},{"given":"Yaorui","family":"He","sequence":"additional","affiliation":[]},{"given":"Pei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/JBHI.2021.3100871","volume":"26","author":"Y Bao","year":"2021","unstructured":"Bao, Y., Qiu, W., Tang, P., Cheng, X.: Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical iot system. IEEE J. Biomed. Health Inform. 26(5), 2041\u20132051 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"issue":"10","key":"8_CR4","doi-asserted-by":"publisher","first-page":"2960","DOI":"10.1109\/JBHI.2020.2973713","volume":"24","author":"K Edemacu","year":"2020","unstructured":"Edemacu, K., Jang, B., Kim, J.W.: Collaborative ehealth privacy and security: An access control with attribute revocation based on OBDD access structure. IEEE J. Biomed. Health Inform. 24(10), 2960\u20132972 (2020)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"36218","DOI":"10.1109\/ACCESS.2019.2905346","volume":"7","author":"J Fu","year":"2019","unstructured":"Fu, J., Wang, N.: A practical attribute-based document collection hierarchical encryption scheme in cloud computing. IEEE Access 7, 36218\u201336232 (2019)","journal-title":"IEEE Access"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"8_CR7","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of $$\\{$$ABE$$\\}$$ ciphertexts. In: 20th USENIX Security Symposium (USENIX Security 11) (2011)"},{"issue":"11","key":"8_CR8","doi-asserted-by":"publisher","first-page":"8949","DOI":"10.1109\/JIOT.2021.3055541","volume":"8","author":"R Guo","year":"2021","unstructured":"Guo, R., Yang, G., Shi, H., Zhang, Y., Zheng, D.: O 3-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted iomt system. IEEE Internet Things J. 8(11), 8949\u20138963 (2021)","journal-title":"IEEE Internet Things J."},{"key":"8_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102211","volume":"104","author":"MS Hajar","year":"2021","unstructured":"Hajar, M.S., Al-Kadri, M.O., Kalutarage, H.K.: A survey on wireless body area networks: architecture, security challenges and research opportunities. Comput. Secur. 104, 102211 (2021)","journal-title":"Comput. Secur."},{"key":"8_CR10","unstructured":"Han, D., Pan, N., Li, K.C.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing (2020)"},{"issue":"7","key":"8_CR11","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-42033-7_13","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"K Lee","year":"2013","unstructured":"Lee, K., Choi, S.G., Lee, D.H., Park, J.H., Yung, M.: Self-updatable encryption: time constrained access control with hidden attributes and better efficiency. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology - ASIACRYPT 2013, pp. 235\u2013254. Springer Berlin Heidelberg, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42033-7_13"},{"issue":"5","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/JBHI.2021.3075995","volume":"26","author":"H Li","year":"2021","unstructured":"Li, H., Yu, K., Liu, B., Feng, C., Qin, Z., Srivastava, G.: An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE J. Biomed. Health Inform. 26(5), 1949\u20131960 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2019.01.052","volume":"484","author":"J Li","year":"2019","unstructured":"Li, J., Yu, Q., Zhang, Y.: Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484, 113\u2013134 (2019)","journal-title":"Inf. Sci."},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51\u201358 (2010)","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"8_CR17","doi-asserted-by":"publisher","first-page":"3437","DOI":"10.1109\/TII.2021.3109090","volume":"18","author":"Q Li","year":"2021","unstructured":"Li, Q., Xia, B., Huang, H., Zhang, Y., Zhang, T.: Trac: traceable and revocable access control scheme for mhealth in 5G-enabled iiot. IEEE Trans. Industr. Inf. 18(5), 3437\u20133448 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"8_CR18","unstructured":"Liang, X., Lu, R., Lin, X., Shen, X.S.: Ciphertext policy attribute based encryption with efficient revocation. TechnicalReport, University of Waterloo 2(8) (2010)"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings","author":"T Nishide","year":"2008","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 111\u2013129. Springer Berlin Heidelberg, Berlin, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68914-0_7"},{"key":"8_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102633","volume":"160","author":"K Riad","year":"2020","unstructured":"Riad, K., Huang, T., Ke, L.: A dynamic and hierarchical access control for Iot in multi-authority cloud storage. J. Netw. Comput. Appl. 160, 102633 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"8_CR22","unstructured":"Shen, J., Gui, Z., Chen, X., Zhang, J., Xiang, Y.: Lightweight and certificateless multi-receiver secure data transmission protocol for wireless body area networks. IEEE Transactions on Dependable and Secure Computing (2020)"},{"issue":"7","key":"8_CR23","doi-asserted-by":"publisher","first-page":"6566","DOI":"10.1109\/JIOT.2020.2974257","volume":"7","author":"J Sun","year":"2020","unstructured":"Sun, J., Xiong, H., Liu, X., Zhang, Y., Nie, X., Deng, R.H.: Lightweight and privacy-aware fine-grained access control for Iot-oriented smart health. IEEE Internet Things J. 7(7), 6566\u20136575 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"8_CR24","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSE.2021.3101842","volume":"9","author":"L Tan","year":"2021","unstructured":"Tan, L., Yu, K., Shi, N., Yang, C., Wei, W., Lu, H.: Towards secure and privacy-preserving data sharing for Covid-19 medical records: a blockchain-empowered approach. IEEE Trans. Netw. Sci. Eng. 9(1), 271\u2013281 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Tang, W., Zhang, K., Ren, J., Zhang, Y., Shen, X.: Lightweight and privacy-preserving fog-assisted information sharing scheme for health big data. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/GLOCOM.2017.8254989"},{"issue":"4","key":"8_CR26","doi-asserted-by":"crossref","first-page":"4467","DOI":"10.1109\/TIA.2020.2983659","volume":"56","author":"S Wang","year":"2020","unstructured":"Wang, S., et al.: A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network. IEEE Trans. Ind. Appl. 56(4), 4467\u20134477 (2020)","journal-title":"IEEE Trans. Ind. Appl."},{"issue":"6","key":"8_CR27","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J.K., Yu, J., Chen, J., Xie, W.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265\u20131277 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Xiao, M., Li, H., Huang, Q., Yu, S., Susilo, W.: Attribute-based hierarchical access control with extendable policy. IEEE Transactions on Information Forensics and Security (2022)","DOI":"10.1109\/TIFS.2022.3173412"},{"key":"8_CR29","unstructured":"Xu, S., Li, Y., Deng, R., Zhang, Y., Luo, X., Liu, X.: Lightweight and expressive fine-grained access control for healthcare internet-of-things. IEEE Transactions on Cloud Computing (2019)"},{"issue":"1","key":"8_CR30","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TDSC.2017.2729556","volume":"17","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Liu, X., Deng, R.H., Li, Y.: Lightweight sharable and traceable secure mobile health system. IEEE Trans. Dependable Secure Comput. 17(1), 78\u201391 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102654","volume":"130","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Zhao, C., Wu, Q., Mu, Y., Rezaeibagha, F.: A traceable and revocable multi-authority access control scheme with privacy preserving for mhealth. J. Syst. Architect. 130, 102654 (2022)","journal-title":"J. Syst. Architect."},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/j.future.2020.09.021","volume":"115","author":"H Zhong","year":"2021","unstructured":"Zhong, H., Zhou, Y., Zhang, Q., Xu, Y., Cui, J.: An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Futur. Gener. Comput. Syst. 115, 486\u2013496 (2021)","journal-title":"Futur. Gener. Comput. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Blockchain Technology and Emerging Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60037-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T07:03:44Z","timestamp":1714633424000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60037-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031600364","9783031600371"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60037-1_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockTEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain Technology and Emerging Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocktea2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}