{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:27:49Z","timestamp":1773480469454,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71972165"],"award-info":[{"award-number":["71972165"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Projects of Basic Research for Science and Technology Foundation of Yunnan Province","award":["202001AS070031"],"award-info":[{"award-number":["202001AS070031"]}]},{"name":"The Central Government\u2019s Special Program for Guiding Local Science and Technology Development","award":["202307AB110009"],"award-info":[{"award-number":["202307AB110009"]}]},{"name":"Science and Technology Foundation of Yunnan Province Education Department","award":["2023J0657"],"award-info":[{"award-number":["2023J0657"]}]},{"name":"The Postgraduate Innovation Foundation of Yunnan University of Finance and Economics","award":["2024YUFEYC012"],"award-info":[{"award-number":["2024YUFEYC012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-024-06884-2","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T11:25:28Z","timestamp":1737113128000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An on-chain and off-chain collaborative data sharing and access control model for electronic medical records"],"prefix":"10.1007","volume":"81","author":[{"given":"Bo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Rong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xuetao","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Hejiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"6884_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TIFS.2019.2946476","volume":"17","author":"Y Liu","year":"2019","unstructured":"Liu Y, Ma Z, Liu X, Ma S, Ren K (2019) Privacy-preserving object detection for medical images with faster R-CNN. IEEE Trans Inf Forensics Secur 17:69\u201384","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"04","key":"6884_CR2","doi-asserted-by":"publisher","first-page":"320","DOI":"10.3414\/ME10-01-0038","volume":"49","author":"A Hoerbst","year":"2010","unstructured":"Hoerbst A, Ammenwerth E (2010) Electronic health records. Method Inf Med 49(04):320\u2013336","journal-title":"Method Inf Med"},{"key":"6884_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2023.120054","volume":"658","author":"R Jiang","year":"2024","unstructured":"Jiang R, Liu R, Zhang T, Ding W, Tian S (2024) An electronic medical record access control model based on intuitionistic fuzzy trust. Inf Sci 658:1\u201319","journal-title":"Inf Sci"},{"key":"6884_CR4","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B ( 2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"6884_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.csi.2016.05.002","volume":"54","author":"V Odelu","year":"2017","unstructured":"Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo K-KR (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3\u20139","journal-title":"Comput Stand Interfaces"},{"key":"6884_CR6","doi-asserted-by":"crossref","unstructured":"Chen R, Li Z ( 2021) Blockchain-based mechanism for electronic healthy records sharing using fine-grained authorization. In: 2021 7th International Conference on Computer and Communications (ICCC), pp. 1557\u20131564. IEEE","DOI":"10.1109\/ICCC54389.2021.9674391"},{"issue":"10","key":"6884_CR7","first-page":"2391","volume":"46","author":"Z Zhao","year":"2018","unstructured":"Zhao Z, Zhu Z, Wang J et al (2018) Attribute-based encryption with attribute revocation and constant-size ciphertext. Acta Electronic Sin 46(10):2391\u20132399","journal-title":"Acta Electronic Sin"},{"issue":"5","key":"6884_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5449-9","volume":"60","author":"S Qiu","year":"2017","unstructured":"Qiu S, Liu J, Shi Y, Zhang R (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci China Inf Sci 60(5):1\u201312","journal-title":"Sci China Inf Sci"},{"issue":"3","key":"6884_CR9","first-page":"683","volume":"40","author":"Z Liu","year":"2018","unstructured":"Liu Z, Zhou P, Duan S (2018) Attribute-based proxy re-encryption scheme with keyword search. J Electron Inf Technol 40(3):683\u2013689","journal-title":"J Electron Inf Technol"},{"issue":"1","key":"6884_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/sec.519","volume":"2021","author":"K Zhang","year":"2021","unstructured":"Zhang K, Li Y, Lu L (2021) Privacy-preserving attribute-based keyword search with traceability and revocation for cloud-assisted IOT. Secur Commun Netw 2021(1):1\u201313","journal-title":"Secur Commun Netw"},{"key":"6884_CR11","doi-asserted-by":"crossref","unstructured":"Emura K, Miyaji A, Nomura A, Omote K, Soshi M ( 2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Information Security Practice and Experience: 5th International Conference, ISPEC 2009 Xi\u2019an, China, April 13-15, 2009 Proceedings 5, pp. 13\u201323. Springer","DOI":"10.1007\/978-3-642-00843-6_2"},{"key":"6884_CR12","doi-asserted-by":"crossref","unstructured":"Sravan\u00a0Kumar G, Sri\u00a0Krishna A (2019) Privacy sustaining constant length ciphertext-policy attribute-based broadcast encryption. In: Soft Computing and Signal Processing: Proceedings of ICSCSP 2018, Vol. 1, pp. 313\u2013324. Springer","DOI":"10.1007\/978-981-13-3600-3_30"},{"issue":"4","key":"6884_CR13","first-page":"900","volume":"43","author":"X Yang","year":"2021","unstructured":"Yang X, Li T, Ma T, Chen G, Wang C (2021) Searchable encryption scheme supporting policy hiding and constant ciphertext length. J Electron Inf Technol 43(4):900\u2013907","journal-title":"J Electron Inf Technol"},{"key":"6884_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.ins.2017.11.037","volume":"429","author":"W Susilo","year":"2018","unstructured":"Susilo W, Yang G, Guo F, Huang Q (2018) Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf Sci 429:349\u2013360","journal-title":"Inf Sci"},{"issue":"5","key":"6884_CR15","doi-asserted-by":"publisher","first-page":"4229","DOI":"10.3934\/mbe.2019211","volume":"16","author":"Y Zhao","year":"2019","unstructured":"Zhao Y, Xie X, Zhang X, Ding Y (2019) A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage. Math Biosci Eng 16(5):4229\u20134249","journal-title":"Math Biosci Eng"},{"key":"6884_CR16","doi-asserted-by":"publisher","first-page":"47982","DOI":"10.1109\/ACCESS.2019.2909272","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Li J, Yan H (2019) Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure. IEEE Access 7:47982\u201347990","journal-title":"IEEE Access"},{"issue":"5","key":"6884_CR17","first-page":"831","volume":"46","author":"Y Yong","year":"2020","unstructured":"Yong Y, Fei-Yue W (2020) Editable blockchain: models, techniques and methods. Acta Autom Sin 46(5):831\u2013846","journal-title":"Acta Autom Sin"},{"key":"6884_CR18","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457\u2013473. Springer"},{"key":"6884_CR19","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"6884_CR20","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp. 321\u2013334. IEEE","DOI":"10.1109\/SP.2007.11"},{"issue":"2","key":"6884_CR21","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TCC.2017.2769645","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Yang Y, Dai Y, Yu S, Xiang Y (2020) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput 8(2):484\u2013494","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"6884_CR22","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1109\/TETC.2019.2905572","volume":"9","author":"L Xu","year":"2021","unstructured":"Xu L, Sun S, Yuan X, Liu JK, Zuo C, Xu C (2021) Enabling authorized encrypted search for multi-authority medical databases. IEEE Trans Emerg Top Comput 9(1):534\u2013546","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"6884_CR23","doi-asserted-by":"crossref","unstructured":"Wu Y, Li X, Liu Z (2022) Attribute-based keyword searchable encryption scheme for multi-authority in cloud storage. In: 2022 IEEE 22nd International Conference on Communication Technology (ICCT), pp. 933\u2013939. IEEE","DOI":"10.1109\/ICCT56141.2022.10073304"},{"issue":"6","key":"6884_CR24","first-page":"985","volume":"13","author":"Y Miao","year":"2020","unstructured":"Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2020) Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput 13(6):985\u2013998","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"6884_CR25","doi-asserted-by":"publisher","first-page":"4248","DOI":"10.1109\/TII.2020.3014168","volume":"17","author":"K Zhang","year":"2021","unstructured":"Zhang K, Long J, Wang X, Dai H-N, Liang K, Imran M (2021) Lightweight searchable encryption protocol for industrial internet of things. IEEE Trans Ind Inf 17(6):4248\u20134259","journal-title":"IEEE Trans Ind Inf"},{"issue":"19","key":"6884_CR26","doi-asserted-by":"publisher","first-page":"18650","DOI":"10.1109\/JIOT.2022.3163340","volume":"9","author":"J Liu","year":"2022","unstructured":"Liu J, Li Y, Sun R, Pei Q, Zhang N, Dong M, Leung VC (2022) EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination. IEEE Internet Things J 9(19):18650\u201318662","journal-title":"IEEE Internet Things J"},{"issue":"24","key":"6884_CR27","doi-asserted-by":"publisher","first-page":"21377","DOI":"10.1109\/JIOT.2023.3287636","volume":"10","author":"J Liu","year":"2023","unstructured":"Liu J, Fan Y, Sun R, Liu L, Wu C, Mumtaz S (2023) Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system. IEEE Internet Things J 10(24):21377\u201321388","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"6884_CR28","first-page":"1701874","volume":"2023","author":"X Liu","year":"2023","unstructured":"Liu X, Huan L, Sun R, Wang J (2023) Lightweight fine-grained multiowner search over encrypted data in cloud-edge computing. Secur Commun Netw 2023(1):1701874","journal-title":"Secur Commun Netw"},{"issue":"9","key":"6884_CR29","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TSMC.2018.2854904","volume":"48","author":"Y Yuan","year":"2018","unstructured":"Yuan Y, Wang F-Y (2018) Blockchain and cryptocurrencies: model, techniques, and applications. IEEE Trans Syst Man Cybern Syst 48(9):1421\u20131428","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"6884_CR30","doi-asserted-by":"crossref","unstructured":"More N, Motwani D (2021) A blockchain-based decentralized framework for crowdsourcing. In: Image Processing and Capsule Networks: ICIPCN 2020, pp. 448\u2013460. Springer","DOI":"10.1007\/978-3-030-51859-2_41"},{"key":"6884_CR31","doi-asserted-by":"crossref","unstructured":"Peng Y, Du M, Li F, Cheng R, Song D (2020) Falcondb: Blockchain-based collaborative database. In: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, pp. 637\u2013652","DOI":"10.1145\/3318464.3380594"},{"key":"6884_CR32","doi-asserted-by":"crossref","unstructured":"Azaria, A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25\u201330. IEEE","DOI":"10.1109\/OBD.2016.11"},{"key":"6884_CR33","doi-asserted-by":"crossref","unstructured":"Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K ( 2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 792\u2013800. IEEE","DOI":"10.1109\/INFOCOM.2018.8485890"},{"issue":"1","key":"6884_CR34","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TDSC.2018.2877332","volume":"18","author":"C Cai","year":"2021","unstructured":"Cai C, Weng J, Yuan X, Wang C (2021) Enabling reliable keyword search in encrypted decentralized storage with fairness. IEEE Trans Depend Secure Comput 18(1):131\u2013144","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"6884_CR35","first-page":"438","volume":"16","author":"M Wang","year":"2021","unstructured":"Wang M, Guo Y, Zhang C, Wang C, Huang H, Jia X (2021) Medshare: a privacy-preserving medical data sharing system by using blockchain. IEEE Trans Serv Comput 16(1):438\u2013451","journal-title":"IEEE Trans Serv Comput"},{"key":"6884_CR36","doi-asserted-by":"crossref","unstructured":"Wu S, Du J (2019) Electronic medical record security sharing model based on blockchain. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 13\u201317","DOI":"10.1145\/3309074.3309079"},{"issue":"1","key":"6884_CR37","first-page":"93","volume":"8","author":"L Zhen","year":"2023","unstructured":"Zhen L, Liu J, Tao Y (2023) Medical information attribute encryption access control scheme based on blockchain. J Cyber Secur 8(1):93\u2013107","journal-title":"J Cyber Secur"},{"key":"6884_CR38","doi-asserted-by":"crossref","unstructured":"Ding X, Yang J (2019) An access control model and its application in blockchain. In: 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 163\u2013167. IEEE","DOI":"10.1109\/CISCE.2019.00044"},{"issue":"1","key":"6884_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/4132597","volume":"2021","author":"Y Ba","year":"2021","unstructured":"Ba Y, Hu X, Chen Y, Hao Z, Li X, Yan X (2021) A blockchain-based CP-ABE scheme with partially hidden access structures. Secur Commun Netw 2021(1):1\u201316","journal-title":"Secur Commun Netw"},{"key":"6884_CR40","doi-asserted-by":"crossref","unstructured":"Al\u00a0Omar A, Rahman MS, Basu A, Kiyomoto S (2017) Medibchain: A blockchain based privacy preserving platform for healthcare data. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings 10, pp. 534\u2013543. Springer","DOI":"10.1007\/978-3-319-72395-2_49"},{"key":"6884_CR41","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"6884_CR42","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2020.06.037","volume":"112","author":"E Politou","year":"2020","unstructured":"Politou E, Alepis E, Patsakis C, Casino F, Alazab M (2020) Delegated content erasure in IPFS. Future Gener Comput Syst 112:956\u2013964","journal-title":"Future Gener Comput Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06884-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06884-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06884-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T23:18:07Z","timestamp":1737155887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06884-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":42,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["6884"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06884-2","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,17]]},"assertion":[{"value":"22 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"396"}}