{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:57:42Z","timestamp":1765486662028,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662639573"},{"type":"electronic","value":"9783662639580"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-63958-0_37","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T14:04:04Z","timestamp":1631801044000},"page":"482-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Resource Sharing Using Permissioned Blockchains"],"prefix":"10.1007","author":[{"given":"Sepideh","family":"Avizheh","sequence":"first","affiliation":[]},{"given":"Mahmudun","family":"Nabi","sequence":"additional","affiliation":[]},{"given":"Saoreen","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Setareh","family":"Sharifian","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"37_CR1","unstructured":"Airbnb, Inc.: Vacation rental company (2020). https:\/\/www.airbnb.com"},{"key":"37_CR2","unstructured":"Uber Technologies, Inc.: Transport company (2020). https:\/\/www.uber.com"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-3-030-54455-3_39","volume-title":"Financial Cryptography and Data Security","author":"K Muni Venkateswarlu","year":"2020","unstructured":"Muni Venkateswarlu, K., Avizheh, S., Safavi-Naini, R.: A blockchain based approach to resource sharing in smart neighbourhoods. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 550\u2013567. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_39"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32"},{"key":"37_CR6","unstructured":"Ganache: Ganache one click blockchain (2019). https:\/\/www.trufflesuite.com\/ganache"},{"key":"37_CR7","unstructured":"Remix: Remix-solidity ide (2019). https:\/\/remix.ethereum.org"},{"key":"37_CR8","unstructured":"Daemen, J., Rijmen, V.: Announcing the advanced encryption standard (AES). In: Federal Information Processing Standards Publication 197, pp. 1\u201351, 3 (2001)"},{"issue":"8","key":"37_CR9","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.cose.2005.07.008","volume":"24","author":"F Baiardi","year":"2005","unstructured":"Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., Vaccarelli, A.: SEAS, a secure e-voting protocol: design and implementation. Comput. Secur. 24(8), 642\u2013652 (2005)","journal-title":"Comput. Secur."},{"issue":"2","key":"37_CR10","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Xie, Q., Hengartner, U.: Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: 2011 9th Annual International Conference on Privacy, Security and Trust, pp. 252\u2013259. IEEE (2011)","DOI":"10.1109\/PST.2011.5971991"},{"issue":"9","key":"37_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Role-based access control. In: Advances in Computers, vol. 46, pp. 237\u2013286. Elsevier (1998)","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication 800-162 (2013)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Sandhu, R., Park, J.: Classifying and comparing attribute-based and relationship-based access control. In: Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, pp. 59\u201370 (2017)","DOI":"10.1145\/3029806.3029828"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"37_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440\u2013456. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_26"},{"key":"37_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"V Shoup","year":"1997","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256\u2013266. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_18"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u00e9, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 47\u201352 (2010)","DOI":"10.1145\/1866835.1866845"},{"issue":"2","key":"37_CR21","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2011","unstructured":"Wan, Z., Deng, R.H., et al.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Jung, T., Li, X.-Y., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: 2013 Proceedings IEEE INFOCOM, pp. 2625\u20132633. IEEE (2013)","DOI":"10.1109\/INFCOM.2013.6567070"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Jemai, A., Laurent, M., Attia, R.: PAbAC: a privacy preserving attribute based framework for fine grained access control in clouds. In: 13th International Conference on Security and Cryptography, SECRYPT 2016, vol. 4, pp. 133\u2013146. SciTePress (2016)","DOI":"10.5220\/0005968201330146"},{"key":"37_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180\u2013184. IEEE (2015)","DOI":"10.1109\/SPW.2015.27"},{"key":"37_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-319-59665-5_15","volume-title":"Distributed Applications and Interoperable Systems","author":"D Di Francesco Maesa","year":"2017","unstructured":"Di Francesco Maesa, D., Mori, P., Ricci, L.: Blockchain based access control. In: Chen, L.Y., Reiser, H.P. (eds.) DAIS 2017. LNCS, vol. 10320, pp. 206\u2013220. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59665-5_15"},{"issue":"18","key":"37_CR27","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: FairAccess: a new blockchain-based access control framework for the internet of things. Secur. Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"37_CR28","first-page":"1594","volume":"6","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., Wan, J.: Smart contract-based access control for the internet of things. IEEE IoT J. 6(2), 1594\u20131605 (2018)","journal-title":"IEEE IoT J."},{"key":"37_CR29","doi-asserted-by":"publisher","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","volume":"6","author":"JP Cruz","year":"2018","unstructured":"Cruz, J.P., Kaji, Y., Yanai, N.: RBAC-SC: role-based access control using smart contract. IEEE Access 6, 12240\u201312251 (2018)","journal-title":"IEEE Access"},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Xu, R., Chen, Y., Blasch, E., Chen, G.: BlendCAC: a blockchain-enabled decentralized capability-based access control for IoTs. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1027\u20131034. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00191"},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"Guo, H., Meamari, E., Shen, C.-C.: Multi-authority attribute-based access control with smart contract. In: Proceedings of the 2019 International Conference on Blockchain Technology, pp. 6\u201311 (2019)","DOI":"10.1145\/3320154.3320164"},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"Maesa, D.D.F., Mori, P., Ricci, L.: Blockchain based access control services. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1379\u20131386. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00237"},{"key":"37_CR33","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.cose.2019.03.016","volume":"84","author":"DDF Maesa","year":"2019","unstructured":"Maesa, D.D.F., Mori, P., Ricci, L.: A blockchain based approach for the definition of auditable access control systems. Comput. Secur. 84, 93\u2013119 (2019)","journal-title":"Comput. Secur."},{"key":"37_CR34","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.future.2020.04.020","volume":"111","author":"N Tapas","year":"2020","unstructured":"Tapas, N., Longo, F., Merlino, G., Puliafito, A.: Experimenting with smart contracts for access control and delegation in IoT. Fut. Gener. Comput. Syst. 111, 324\u2013338 (2020)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"37_CR35","doi-asserted-by":"publisher","first-page":"148550","DOI":"10.1109\/ACCESS.2019.2946983","volume":"7","author":"M Raikwar","year":"2019","unstructured":"Raikwar, M., Gligoroski, D., Kralevska, K.: SoK of used cryptography in blockchain. IEEE Access 7, 148550\u2013148575 (2019)","journal-title":"IEEE Access"},{"key":"37_CR36","unstructured":"Buterin, V., et al.: A next-generation smart contract and decentralized application platform, white paper (2014)"},{"key":"37_CR37","unstructured":"Wood, G., et al.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, pp. 1\u201332 (2014)"},{"key":"37_CR38","first-page":"1015","volume":"2015","author":"J Bonneau","year":"2015","unstructured":"Bonneau, J., Clark, J., Goldfeder, S.: On bitcoin as a public randomness source. IACR Cryptol. ePrint Arch. 2015, 1015 (2015)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"37_CR39","unstructured":"Kelsey, J., Brand\u00e3o, L.T., Peralta, R., Booth, H.: A reference for randomness beacons: format and protocol version 2, Technical report, National Institute of Standards and Technology (2019)"},{"key":"37_CR40","unstructured":"Code: Privacy-preserving resource sharing (2021). https:\/\/github.com\/mnr-18\/Privacy-preserving-Resource-Sharing"},{"key":"37_CR41","unstructured":"The OpenSSL Project: OpenSSL: The open source toolkit for SSL\/TLS. www.openssl.org. Accessed April 2003"},{"key":"37_CR42","unstructured":"Bethencourt, J.: Advanced Crypto Software Collection. http:\/\/acsc.cs.utexas.edu\/cpabe\/. Accessed December 2006"},{"key":"37_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M Chase","year":"2007","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515\u2013534. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_28"},{"key":"37_CR44","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 121\u2013130 (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"37_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/11681878_4","volume-title":"Theory of Cryptography","author":"A Bender","year":"2006","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without Random Oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60\u201379. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_4"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2021 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-63958-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:17:24Z","timestamp":1725801444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-63958-0_37"}},"subtitle":["(The Case of Smart Neighbourhood)"],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662639573","9783662639580"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-63958-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}