{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:01:06Z","timestamp":1760576466932,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_14","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:25Z","timestamp":1760555845000},"page":"224-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["BCDAC: Efficient Blockchain-Based Cross Domain Access Control Scheme"],"prefix":"10.1007","author":[{"given":"Qinghe","family":"Duan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Haochen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"4","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398036","volume":"53","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Deng, R.H., Xu, S., et al.: Attribute-based encryption for cloud computing access control: a survey. ACM Comput. Surv. (CSUR) 53(4), 1\u201341 (2020). https:\/\/doi.org\/10.1145\/3398036","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27","DOI":"10.1007\/11426639_27"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006). https:\/\/doi.org\/10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334. IEEE (2007). https:\/\/doi.org\/10.1109\/SP.2007.11","DOI":"10.1109\/SP.2007.11"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"14_CR6","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: 20th USENIX Security Symposium (USENIX Security 2011) (2011)"},{"issue":"8","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai, J., Deng, R.H., Guan, C., et al.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343\u20131354 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2271848","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s12652-018-0967-0","volume":"10","author":"PK Premkamal","year":"2019","unstructured":"Premkamal, P.K., Pasupuleti, S.K., Alphonse, P.J.A.: A new verifiable outsourced ciphertext-policy attribute-based encryption for big data privacy and access control in cloud. J. Ambient. Intell. Humaniz. Comput. 10, 2693\u20132707 (2019). https:\/\/doi.org\/10.1007\/s12652-018-0967-0","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.future.2016.12.015","volume":"78","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Chen, Z., Liu, J.K., et al.: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Futur. Gener. Comput. Syst. 78, 753\u2013762 (2018). https:\/\/doi.org\/10.1016\/j.future.2016.12.015","journal-title":"Futur. Gener. Comput. Syst."},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jss.2017.10.020","volume":"135","author":"X Fu","year":"2018","unstructured":"Fu, X., Nie, X., Wu, T., et al.: Large universe attribute based access control with efficient decryption in cloud storage system. J. Syst. Softw. 135, 157\u2013164 (2018). https:\/\/doi.org\/10.1016\/j.jss.2017.10.020","journal-title":"J. Syst. Softw."},{"issue":"6","key":"14_CR11","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TDSC.2015.2499755","volume":"14","author":"H Ma","year":"2015","unstructured":"Ma, H., Zhang, R., Wan, Z., et al.: Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Dependable Secure Comput. 14(6), 679\u2013692 (2015). https:\/\/doi.org\/10.1109\/TDSC.2015.2499755","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.jss.2016.12.018","volume":"125","author":"R Zhang","year":"2017","unstructured":"Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344\u2013353 (2017). https:\/\/doi.org\/10.1016\/j.jss.2016.12.018","journal-title":"J. Syst. Softw."},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Xiang, G., Li, B., Fu, X., et al.: An attribute revocable CP-ABE scheme. In: 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD), pp. 198\u2013203. IEEE (2019). https:\/\/doi.org\/10.1109\/CBD.2019.00044","DOI":"10.1109\/CBD.2019.00044"},{"issue":"7","key":"14_CR14","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2010). https:\/\/doi.org\/10.1109\/TPDS.2010.203","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Lian, H., Wang, Q., Wang, G.: Large universe ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. Int. Arab J. Inf. Technol. 17(1), 107\u2013117 (2020). https:\/\/doi.org\/10.34028\/iajit\/17\/1\/13","DOI":"10.34028\/iajit\/17\/1\/13"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"13789","DOI":"10.1109\/ACCESS.2021.3052247","volume":"9","author":"J Zhao","year":"2021","unstructured":"Zhao, J., Zeng, P., Choo, K.R.: An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access 9, 13789\u201313799 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3052247","journal-title":"IEEE Access"},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","volume":"22","author":"H Zhong","year":"2018","unstructured":"Zhong, H., Zhu, W., Xu, Y., et al.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft. Comput. 22(1), 243\u2013251 (2018). https:\/\/doi.org\/10.1007\/s00500-016-2330-8","journal-title":"Soft. Comput."},{"issue":"1","key":"14_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3233\/KES-190396","volume":"23","author":"K Dhal","year":"2019","unstructured":"Dhal, K., Pattnaik, P.K., Rai, S.C.: RACC: an efficient and revocable fine grained access control model for cloud storage. Int. J. Knowl.-Based Intell. Eng. Syst. 23(1), 21\u201332 (2019). https:\/\/doi.org\/10.3233\/KES-190396","journal-title":"Int. J. Knowl.-Based Intell. Eng. Syst."},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11227-021-03908-z","volume":"78","author":"K Dhal","year":"2022","unstructured":"Dhal, K., Rai, S.C., Pattnaik, P.K., et al.: CEMAR: a fine-grained access control with revocation mechanism for centralized multi-authority cloud storage. J. Supercomput. 78(1), 987\u20131009 (2022). https:\/\/doi.org\/10.1007\/s11227-021-03908-z","journal-title":"J. Supercomput."},{"issue":"8","key":"14_CR20","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-018-0637-2","volume":"101","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Ren, M., Jiang, S., et al.: An efficient and revocable storage CP-A scheme in the cloud computing. Computing 101(8), 1041\u20131065 (2019). https:\/\/doi.org\/10.1007\/s00607-018-0637-2","journal-title":"Computing"},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Ma, W., Ma, J., Zhang, Q., et al.: Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp. 1\u20137 (2020). https:\/\/doi.org\/10.1145\/3424978.3425019","DOI":"10.1145\/3424978.3425019"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TDSC.2018.2877332","volume":"18","author":"C Cai","year":"2018","unstructured":"Cai, C., Weng, J., Yuan, X., et al.: Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Trans. Dependable Secure Comput. 18(1), 131\u2013144 (2018). https:\/\/doi.org\/10.1109\/TDSC.2018.2877332","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Wang, S., Zhang, Y., Zhang, Y.: A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6, 38437\u201338450 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2851611","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ins.2019.09.052","volume":"511","author":"H Deng","year":"2020","unstructured":"Deng, H., Qin, Z., Wu, Q., et al.: Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511, 94\u2013113 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.09.052","journal-title":"Inf. Sci."},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Mounnan, O., El Mouatasim, A., Manad, O., et al.: A novel approach based on blockchain to enhance security with dynamic policy updating. In: 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/IOTSMS52051.2020.9340164","DOI":"10.1109\/IOTSMS52051.2020.9340164"},{"issue":"10","key":"14_CR26","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1587\/transinf.2016OFP0004","volume":"100","author":"K Nomura","year":"2017","unstructured":"Nomura, K., Mohri, M., Shiraishi, Y., et al.: Attribute revocable multi-authority attribute-based encryption with forward secrecy for cloud storage. IEICE Trans. Inf. Syst. 100(10), 2420\u20132431 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"4","key":"14_CR27","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1080\/09540091.2020.1841096","volume":"33","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Cheng, Z., Cheng, X., et al.: OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems. Connect. Sci. 33(4), 1060\u20131076 (2021). https:\/\/doi.org\/10.1080\/09540091.2020.1841096","journal-title":"Connect. Sci."},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"6617669","DOI":"10.1155\/2021\/6617669","volume":"1","author":"L Sheng","year":"2021","unstructured":"Sheng, L.: User privacy protection scheme based on verifiable outsourcing attribute-based encryption. Secur. Commun. Netw. 1, 6617669 (2021). https:\/\/doi.org\/10.1155\/2021\/6617669","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"14_CR29","doi-asserted-by":"publisher","first-page":"9153","DOI":"10.1109\/JIOT.2023.3322469","volume":"11","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Fu, Y.: A unified attribute-based encryption data sharing scheme matching industrial internet framework. IEEE Internet Things J. 11(5), 9153\u20139170 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3322469","journal-title":"IEEE Internet Things J."},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"102889","DOI":"10.1016\/j.sysarc.2023.102889","volume":"139","author":"S Niu","year":"2023","unstructured":"Niu, S., Hu, Y., Su, Y., et al.: Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things. J. Syst. Architect. 139, 102889 (2023). https:\/\/doi.org\/10.1016\/j.sysarc.2023.102889","journal-title":"J. Syst. Architect."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:26Z","timestamp":1760555846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}