{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:43:12Z","timestamp":1742913792049,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811659423"},{"type":"electronic","value":"9789811659430"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-5943-0_19","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T23:04:08Z","timestamp":1631228648000},"page":"229-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK"],"prefix":"10.1007","author":[{"given":"Yang","family":"Li","sequence":"first","affiliation":[]},{"given":"Guangzong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-319-96878-0_22","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"S Agrawal","year":"2018","unstructured":"Agrawal, S., Ganesh, C., Mohassel, P.: Non-interactive zero-knowledge proofs for composite statements. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 643\u2013673. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_22"},{"key":"19_CR2","first-page":"1","volume":"693423","author":"E Ben-Sasson","year":"2018","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. Eprint. Iacr. Org. 693423, 1\u201383 (2018)","journal-title":"Eprint. Iacr. Org."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 459\u2013474 (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53\u201370 (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: Proceedings - IEEE Symposium on Security and Privacy, 2018-May, pp. 315\u2013334 (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-642-32928-9_31","volume-title":"Security and Cryptography for Networks","author":"J Camenisch","year":"2012","unstructured":"Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Neven, G.: Oblivious transfer with hidden access control from attribute-based encryption. In: Visconti, I., Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 559\u2013579. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32928-9_31"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/978-3-030-03329-3_23","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"J Chen","year":"2018","unstructured":"Chen, J., Gong, J., Wee, H.: Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 673\u2013702. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_23"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.comnet.2018.01.034","volume":"133","author":"H Cui","year":"2018","unstructured":"Cui, H., Deng, R.H., Lai, J., Yi, X., Nepal, S.: An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Netw. 133, 157\u2013165 (2018)","journal-title":"Comput. Netw."},{"key":"19_CR9","unstructured":"Fu, Y.: Research on supply chain information sharing mechanism and management mode based on blockchain. Doctor level of thesis. Central University of Finance and Economics (2018)"},{"key":"19_CR10","unstructured":"Gabizon, A., Williamson, Z.J., Ciobotaru, O.: PLONK: permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. In: Stanford Blockchain Conference, pp. 1\u201333 (2020)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1007\/978-3-319-96878-0_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"J Groth","year":"2018","unstructured":"Groth, J., Kohlweiss, M., Maller, M., Meiklejohn, S., Miers, I.: Updatable and Universal Common Reference Strings with Applications to\u00a0zk-SNARKs. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 698\u2013728. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_24"},{"key":"19_CR13","unstructured":"Guan, Z.: Efficient Privacy-Preserving Account-Model Blockchain Based on Zero-Knowledge Proof. Master level of thesis. ShanDong University (2020)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4965 LNCS (2006), 146\u2013162 (2008)","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"19_CR15","unstructured":"Khalil, R., Zamyatin, A., Felley, G., Gervais, A., Moreno-sanchez, P.: Commit-Chains: Secure, Scalable Off-Chain Payments. IACR Cryptology EPrint Archive (2018)"},{"key":"19_CR16","unstructured":"Li, G., He, D., Guo, B., Lu, S.: Blockchain privacy protection algorithms based on zero knowledge proof. J. Huazhong Univ. Sci. Technol. (Natural Science Edition), 48(7) (2020)"},{"key":"19_CR17","unstructured":"Petkus, M.: Why and How zk-SNARK Works. 1\u201365. http:\/\/arxiv.org\/abs\/1906.07221 (2019)"},{"key":"19_CR18","unstructured":"Sahai, A., Waters, B.R.: Fuzzy identity based encryption. In: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 1\u20139 (2005)"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"S436","DOI":"10.14309\/00000434-200809001-01117","volume":"103","author":"W Sandborn","year":"2008","unstructured":"Sandborn, W., et al.: Sonic. Am. J. Gastroenterol. 103, S436 (2008)","journal-title":"Am. J. Gastroenterol."},{"issue":"6","key":"19_CR20","first-page":"1661","volume":"30","author":"X Wang","year":"2019","unstructured":"Wang, X., Jiang, X., Li, Y.: Model for data access control and sharing based on blockchain. J. Softw. 30(6), 1661\u20131669 (2019)","journal-title":"J. Softw."},{"issue":"10","key":"19_CR21","first-page":"2151","volume":"56","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Fan, K.: Effective CP-ABE with hidden access policy. J. Comput. Res. Develop. 56(10), 2151\u20132159 (2019)","journal-title":"J. Comput. Res. Develop."},{"key":"19_CR22","unstructured":"Wei, X.: Research and Implementation of Anonymous Electronic Survey System Based on Non-Interactive Zero Knowledge. Master level of thesis. Northeastern University (2015)"},{"key":"19_CR23","unstructured":"Zhang, S., Ling, J., Chen, J.: Traceable blockchain ledger privacy protection scheme. Comput. Eng. Appl. (2020)"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-5943-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:52:01Z","timestamp":1710348721000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-5943-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811659423","9789811659430"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-5943-0_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"256","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}