{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:12:05Z","timestamp":1742983925848,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756056"},{"type":"electronic","value":"9789819756063"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5606-3_39","type":"book-chapter","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:03:33Z","timestamp":1722243813000},"page":"458-467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attribute-Based Encryption Method for Data Privacy Security Protection"],"prefix":"10.1007","author":[{"given":"Ziqian","family":"Li","sequence":"first","affiliation":[]},{"given":"Yeshen","family":"He","sequence":"additional","affiliation":[]},{"given":"Yiying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiankun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"issue":"2","key":"39_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/cryptography7020016","volume":"7","author":"B He","year":"2023","unstructured":"He, B., Feng, T.: Encryption scheme of verifiable search based on blockchain in cloud environment. Cryptography 7(2), 16 (2023)","journal-title":"Cryptography"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Di Silvestre, M.L., Gallo, P., Guerrero, J.M., et al.: Blockchain for power systems: current trends and future applications. Renew. Sustain. Energy Rev. 119, 109585 (2020)","DOI":"10.1016\/j.rser.2019.109585"},{"issue":"04","key":"39_CR3","first-page":"961","volume":"45","author":"Y Wang","year":"2024","unstructured":"Wang, Y., Wang, R., Zhang, J.: Fabric privacy protection model based on CP-ABE algorithm. Comput. Eng. Des. 45(04), 961\u2013966 (2024)","journal-title":"Comput. Eng. Des."},{"key":"39_CR4","unstructured":"Chen, L.: Research on access control encryption scheme for edge cloud computing. Beijing University of Posts and Telecommunications (2024)"},{"issue":"11","key":"39_CR5","first-page":"116","volume":"39","author":"Z Li","year":"2023","unstructured":"Li, Z., Chen, Y., Wang, W.: Searchable encryption scheme based on count bloom filter. Telecommun. Sci. 39(11), 116\u2013127 (2023)","journal-title":"Telecommun. Sci."},{"key":"39_CR6","unstructured":"Gan, T.: Research on policy-hidden attribute-based encryption. University of Electronic Science and Technology of China (2023)"},{"issue":"13","key":"39_CR7","doi-asserted-by":"publisher","first-page":"7765","DOI":"10.3390\/app13137765","volume":"13","author":"T Chen","year":"2023","unstructured":"Chen, T., Ren, Z., Yu, Y., et al.: Lattices-inspired CP-ABE from LWE scheme for data access and sharing based on blockchain. Appl. Sci. 13(13), 7765 (2023)","journal-title":"Appl. Sci."},{"issue":"10","key":"39_CR8","first-page":"471","volume":"39","author":"F Wang","year":"2022","unstructured":"Wang, F., Wang, H., Guo, Q., et al.: Research on dynamic access control of cloud storage data based on CP-ABE. Comput. Simul. 39(10), 471\u2013475 (2022)","journal-title":"Comput. Simul."},{"key":"39_CR9","unstructured":"Wu, Z.X.: Research on big data security sharing technology based on blockchain and CP-ABE. Inner Mongolia University of Science and Technology (2023)"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.future.2022.11.006","volume":"141","author":"N Wu","year":"2023","unstructured":"Wu, N., Xu, L., Zhu, L.: A blockchain based access control scheme with hidden policy and attribute. Futur. Gener. Comput. Syst. 141, 186\u2013196 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"39_CR11","unstructured":"Qiu, J.B., Hu, Y.: An attribute revocation CP-ABE scheme based on different-or operation. J. Sichuan Univ. (Nat. Sci. Edn.), 1\u20137 (2023)"},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/JIOT.2023.3290975","volume":"11","author":"K Zhang","year":"2023","unstructured":"Zhang, K., et al.: A blockchain-based anonymous attribute-based searchable encryption scheme for data sharing. IEEE Internet Things J. 11, 1685\u20131697 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"39_CR13","first-page":"21","volume":"48","author":"YB Yang","year":"2021","unstructured":"Yang, Y.B., Zhang, J.W., Ma, J.F.: Method forusing the blockchain to protect data privacy of IoV. J. Xidian Univ. 48(3), 21\u201330 (2021)","journal-title":"J. Xidian Univ."},{"key":"39_CR14","unstructured":"Cui, G.H., Liu, Y.: Blockchain-based certificate-less aggregated signature scheme for VANET. Comput. Technol. Dev. 33(10), 66\u201372+127 (2023)"},{"key":"39_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103818","volume":"89","author":"C Wang","year":"2024","unstructured":"Wang, C., Xu, J., Tan, S., et al.: Secure decision tree classification with decentralized authorization and access control. Comput. Stand. Interfaces 89, 103818 (2024)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1","key":"39_CR16","first-page":"33","volume":"20","author":"SW Xu","year":"2020","unstructured":"Xu, S.W., Wang, F.J.: Attribute-based encryption scheme traced under multi-authority. Netinfo Secur. 20(1), 33\u201339 (2020). (in Chinese)","journal-title":"Netinfo Secur."},{"issue":"2","key":"39_CR17","first-page":"767","volume":"12","author":"W Yao","year":"2021","unstructured":"Yao, W., Han, J., Li, J., et al.: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst. J. 12(2), 767\u20131777 (2021)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5606-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:13:20Z","timestamp":1722244400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5606-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756056","9789819756063"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5606-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}