{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:38:08Z","timestamp":1743050288502,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819708611"},{"type":"electronic","value":"9789819708628"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0862-8_15","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:03:04Z","timestamp":1709193784000},"page":"240-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FDRShare: A Fully Decentralized and\u00a0Redactable EHRs Sharing Scheme with\u00a0Constant-Size Ciphertexts"],"prefix":"10.1007","author":[{"given":"Zhichao","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhexi","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Lingshuai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Che","family":"Bian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, L.: Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing, pp. 268\u2013275. IEEE (2010)","DOI":"10.1109\/CLOUD.2010.62"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Hasan, M.Z., Hussain, M.Z., Mubarak, Z., Siddiqui, A.A., Qureshi, A.M., Ismail, I.: Data security and Integrity in Cloud Computing. In: 2023 International Conference for Advancement in Technology (ICONAT), pp. 1\u20135, January 2023","DOI":"10.1109\/ICONAT57137.2023.10080440"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Reedy, B.E., Ramu, G.: A secure framework for ensuring EHr\u2019s integrity using fine-grained auditing and CP-ABE. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 85\u201389 (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.32"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1109\/TCC.2020.3002553","volume":"10","author":"Y Su","year":"2020","unstructured":"Su, Y., Sun, J., Qin, J., Hu, J.: Publicly verifiable shared dynamic electronic health record databases with functional commitment supporting privacy-preserving integrity auditing. IEEE Trans. Cloud Comput. 10(3), 2050\u20132065 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"65635","DOI":"10.1109\/ACCESS.2019.2917628","volume":"7","author":"WI Khedr","year":"2019","unstructured":"Khedr, W.I., Khater, H.M., Mohamed, E.R.: Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access 7, 65635\u201365651 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Joshi, M., Joshi, K., Finin, T.: Attribute based encryption for secure access to cloud based EHR systems. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 932\u2013935 (2018)","DOI":"10.1109\/CLOUD.2018.00139"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"15_CR9","first-page":"2569","volume":"18","author":"S Hu","year":"2021","unstructured":"Hu, S., Cai, C., Wang, Q., Wang, C., Wang, Z., Ye, D.: Augmenting encrypted search: a decentralized service realization with enforced execution. IEEE Trans. Dependable Secure Comput. 18(6), 2569\u20132581 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M.: MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5, 14757\u201314767 (2017)","journal-title":"IEEE Access"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang, P., White, J., Schmidt, D.C., Lenz, G., Rosenbloom, S.T.: FHIRchain: applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16, 267\u2013278 (2018)","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhang, Y., Zhang, Y.: A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6, 38437\u201338450 (2018)","journal-title":"IEEE Access"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Wu, G., Zhu, B., Li, J.: BMKs: a blockchain based multi-keyword search scheme for medical data sharing. In: IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/ISCC55528.2022.9912935"},{"issue":"1","key":"15_CR14","first-page":"438","volume":"16","author":"M Wang","year":"2023","unstructured":"Wang, M., Guo, Y., Zhang, C., Wang, C., Huang, H., Jia, X.: MedShare: a privacy-preserving medical data sharing system by using blockchain. IEEE Trans. Serv. Comput. 16(1), 438\u2013451 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1109\/TEM.2020.2966643","volume":"67","author":"G Yu","year":"2020","unstructured":"Yu, G., et al.: Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans. Eng. Manage. 67(4), 1213\u20131230 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_20"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Nayak, S.K., Tripathy, S.: Privacy preserving provable data possession for cloud based electronic health record system. In: IEEE Trustcom\/BigDataSE\/ISPA 2016, pp. 860\u2013867 (2016)","DOI":"10.1109\/TrustCom.2016.0149"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara, S., Ahmed, K., Wang, H., Whittaker, F.: Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7, 74361\u201374382 (2019)","journal-title":"IEEE Access"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: 2nd International Conference on Open and Big Data (OBD) 2016, pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_31"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-319-12475-9_18","volume-title":"Provable Security","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 259\u2013273. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12475-9_18"},{"issue":"1","key":"15_CR23","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/TDSC.2020.2973633","volume":"19","author":"S-F Sun","year":"2022","unstructured":"Sun, S.-F., et al.: Non-interactive multi-client searchable encryption: realization and implementation. IEEE Trans. Dependable Secure Comput. 19(1), 452\u2013467 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0862-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:18:16Z","timestamp":1709194696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0862-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819708611","9789819708628"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0862-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}