{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:36:17Z","timestamp":1767314177071,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819535507","type":"print"},{"value":"9789819535514","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3551-4_12","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:32:41Z","timestamp":1767313961000},"page":"168-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-KGC Certificateless Anonymous Cloud Sharing Scheme with\u00a0Threshold-Based Traceability"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7566-4819","authenticated-orcid":false,"given":"Lei","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8300-4404","authenticated-orcid":false,"given":"Chunfei","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8633-5001","authenticated-orcid":false,"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6094-5995","authenticated-orcid":false,"given":"Zhenzhu","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2837-4760","authenticated-orcid":false,"given":"Xiao","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1632-5737","authenticated-orcid":false,"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-030-37352-8_38","volume-title":"Cyberspace Safety and Security","author":"F Wang","year":"2019","unstructured":"Wang, F., Qin, Z., Yin, H.: A fine-grained authorized keyword secure search scheme in the cloud computing. In: Vaidya, J., Zhang, X., Li, J. (eds.) CSS 2019. LNCS, vol. 11983, pp. 432\u2013447. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37352-8_38"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609. ACM, New York (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2009","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4), 1\u201329 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"12","key":"12_CR4","doi-asserted-by":"publisher","first-page":"3772","DOI":"10.1109\/TPDS.2022.3170305","volume":"33","author":"T Wang","year":"2022","unstructured":"Wang, T., Zhou, J., Li, L., Zhang, G., Li, K., Hu, X.S.: Deadline and reliability aware multiserver configuration optimization for maximizing profit. IEEE Trans. Parallel Distrib. Syst. 33(12), 3772\u20133786 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.08.003","volume":"122","author":"L Zhou","year":"2018","unstructured":"Zhou, L., Fu, A., Yu, S., Su, M., Kuang, B.: Data integrity verification of the outsourced big data in the cloud environment: a survey. J. Netw. Comput. Appl. 122, 1\u201315 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"12556","DOI":"10.1109\/TEM.2023.3262678","volume":"71","author":"Y Li","year":"2024","unstructured":"Li, Y., Shen, J., Ji, S., Lai, Y.-H.: Blockchain-based data integrity verification scheme in AIoT cloud-edge computing environment. IEEE Trans. Eng. Manage. 71, 12556\u201312565 (2024)","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"5","key":"12_CR7","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceedings of the 20th ACM Symposium on Applied Computing, pp. 1550\u20131557. ACM, New York (2011)","DOI":"10.1145\/1982185.1982514"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"BY Wang","year":"2014","unstructured":"Wang, B.Y., Li, B.C., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43\u201356 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TBDATA.2017.2701347","volume":"8","author":"A Fu","year":"2017","unstructured":"Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data 8(1), 14\u201324 (2017)","journal-title":"IEEE Trans. Big Data"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TC.2023.3325668","volume":"73","author":"J Yu","year":"2024","unstructured":"Yu, J., Yan, B., Qi, H., Wang, S., Cheng, W.: An efficient and secure data sharing scheme for edge-enabled IoT. IEEE Trans. Comput. 73(1), 178\u2013191 (2024)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"12_CR12","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2018","unstructured":"Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912\u2013925 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1109\/TIFS.2025.3534563","volume":"20","author":"Y Wang","year":"2025","unstructured":"Wang, Y., Zhang, Y., Ye, A., Shen, J., Wang, D., Xiang, Y.: Anonymous and efficient (t, n)-threshold ownership transfer for cloud EMRs auditing. IEEE Trans. Inf. Forensics Secur. 20, 1710\u20131723 (2025)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110623","volume":"251","author":"Q Zhang","year":"2024","unstructured":"Zhang, Q., Yuan, L., Xie, T., Chen, H.: Auditable and dynamic access control scheme with behavior and identity tracing. Comput. Netw. 251, 110623 (2024)","journal-title":"Comput. Netw."},{"issue":"5","key":"12_CR15","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TSC.2016.2633260","volume":"12","author":"H Wang","year":"2019","unstructured":"Wang, H., He, D., Yu, J., Wang, Z.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput. 12(5), 824\u2013835 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"12_CR16","first-page":"608","volume":"17","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608\u2013619 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"12_CR17","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/JSYST.2020.2978146","volume":"15","author":"J Li","year":"2021","unstructured":"Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15(1), 577\u2013585 (2021)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"12_CR18","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TCC.2019.2929045","volume":"10","author":"J Li","year":"2022","unstructured":"Li, J., Yan, H., Zhang, Y.: Efficient identity-based provable multi-copy data possession in multi-cloud storage. IEEE Trans. Cloud Comput. 10(1), 356\u2013365 (2022)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29"},{"issue":"1","key":"12_CR20","first-page":"71","volume":"14","author":"J Li","year":"2021","unstructured":"Li, J., Yan, H., Zhang, Y.: Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 14(1), 71\u201381 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"12_CR21","first-page":"1118","volume":"19","author":"L Zhou","year":"2022","unstructured":"Zhou, L., Fu, A., Yang, G., Wang, H., Zhang, Y.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secure Comput. 19(2), 1118\u20131132 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"12_CR22","doi-asserted-by":"publisher","first-page":"9630","DOI":"10.1109\/JIOT.2023.3323359","volume":"11","author":"J Chang","year":"2024","unstructured":"Chang, J., Hao, X.: Certificateless dynamic data sharing scheme with file recommendation and integrity auditing functions in cloud-fog environment. IEEE Internet Things J. 11(6), 9630\u20139644 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"12_CR23","doi-asserted-by":"publisher","first-page":"33247","DOI":"10.1109\/JIOT.2024.3425450","volume":"11","author":"J Feng","year":"2024","unstructured":"Feng, J., Li, Y., Wang, T., Liu, S.: A certificateless threshold proxy re-encrypted data-sharing scheme with cloud-chain collaboration in industrial Internet environments. IEEE Internet Things J. 11(20), 33247\u201333268 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"12_CR24","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1109\/TNSM.2025.3525462","volume":"22","author":"X Zhang","year":"2025","unstructured":"Zhang, X., Liu, Q., Liu, B., Zhang, Y., Xue, J.: Dynamic certificateless outsourced data auditing mechanism supporting multi-ownership transfer via blockchain systems. IEEE Trans. Netw. Serv. Manage. 22(2), 2017\u20132030 (2025)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"4","key":"12_CR25","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TEM.2019.2909529","volume":"67","author":"H Wang","year":"2020","unstructured":"Wang, H., He, D., Liu, Z., Guo, R.: Blockchain-based anonymous reporting scheme with anonymous rewarding. IEEE Trans. Eng. Manage. 67(4), 1514\u20131524 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"3","key":"12_CR26","doi-asserted-by":"publisher","first-page":"4477","DOI":"10.1109\/JSYST.2021.3125835","volume":"16","author":"J Zhao","year":"2022","unstructured":"Zhao, J., Huang, H., Gu, C., Hua, Z., Zhang, X.: Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism. IEEE Syst. J. 16(3), 4477\u20134488 (2022)","journal-title":"IEEE Syst. J."},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"4664","DOI":"10.1109\/TIFS.2025.3565372","volume":"20","author":"X Liu","year":"2025","unstructured":"Liu, X., et al.: BAST: blockchain-assisted secure and traceable data sharing scheme for vehicular networks. IEEE Trans. Inf. Forensics Secur. 20, 4664\u20134678 (2025)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR28","unstructured":"The Pairing-Based Cryptography Library (PBC). http:\/\/crypto.stanford.edu\/pbc\/howto.html"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3551-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:32:43Z","timestamp":1767313963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3551-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819535507","9789819535514"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3551-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/css2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}