{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:21Z","timestamp":1775913021602,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T00:00:00Z","timestamp":1581379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11432-019-9893-2","type":"journal-article","created":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T03:02:24Z","timestamp":1581735744000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system"],"prefix":"10.1007","volume":"63","author":[{"given":"Chao","family":"Lin","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"key":"9893_CR1","first-page":"1028","volume-title":"Proceedings of International Conference on Electronics, Ningbo","author":"K Su","year":"2011","unstructured":"Su K, Jie L, Fu H. Smart city and the applications. In: Proceedings of International Conference on Electronics, Ningbo, 2011. 1028\u20131031"},{"key":"9893_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella A, Bui N, Castellani A, et al. Internet of things for smart cities. IEEE Internet Things J, 2014, 1: 22\u201332","journal-title":"IEEE Internet Things J"},{"key":"9893_CR3","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1109\/TPDS.2018.2881735","volume":"30","author":"M Li","year":"2019","unstructured":"Li M, Weng J, Yang A, et al. CrowdBC: a blockchain-based decentralized framework for crowdsourcing. IEEE Trans Parallel Distrib Syst, 2019, 30: 1251\u20131266","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"9893_CR4","first-page":"853","volume-title":"Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, Vienna","author":"Y Lu","year":"2018","unstructured":"Lu Y, Tang Q, Wang G. Zebralancer: private and anonymous crowdsourcing system atop open blockchain. In: Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, Vienna, 2018. 853\u2013865"},{"key":"9893_CR5","first-page":"386","volume-title":"Proceedings of the 17th International Conference on Web Engineering, Rome","author":"F Buccafurri","year":"2017","unstructured":"Buccafurri F, Lax G, Nicolazzo S, et al. Tweetchain: an alternative to blockchain for crowd-based applications. In: Proceedings of the 17th International Conference on Web Engineering, Rome, 2017. 386\u2013393"},{"key":"9893_CR6","first-page":"90","volume-title":"Proceedings of Advances in Cryptology-CRYPTO, California","author":"E Ben-Sasson","year":"2013","unstructured":"Ben-Sasson E, Chiesa A, Genkin D, et al. Snarks for C: verifying program executions succinctly and in zero knowledge. In: Proceedings of Advances in Cryptology-CRYPTO, California, 2013. 90\u2013108"},{"key":"9893_CR7","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1145\/2858036.2858539","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, California","author":"B McInnis","year":"2016","unstructured":"McInnis B, Cosley D, Nam C, et al. Taking a HIT: designing around rejection, mistrust, risk, and workers\u2019 experiences in amazon mechanical turk. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, California, 2016. 2271\u20132282"},{"key":"9893_CR8","first-page":"1621","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul","author":"N Salehi","year":"2015","unstructured":"Salehi N, Irani L C, Bernstein M S, et al. We are dynamo: overcoming stalling and friction in collective action for crowd workers. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, 2015. 1621\u20131630"},{"key":"9893_CR9","first-page":"208","volume-title":"Proceedings of IEEE 34th International Conference on Distributed Computing Systems, Madrid","author":"Q Li","year":"2014","unstructured":"Li Q, Cao G. Providing efficient privacy-aware incentives for mobile sensing. In: Proceedings of IEEE 34th International Conference on Distributed Computing Systems, Madrid, 2014. 208\u2013217"},{"key":"9893_CR10","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1515\/popets-2017-0055","volume":"2017","author":"S Rahaman","year":"2017","unstructured":"Rahaman S, Cheng L, Yao D D, et al. Provably secure anonymous-yet-accountable crowdsensing with scalable sublinear revocation. Proc Privacy Enhancing Technol, 2017, 2017: 384\u2013403","journal-title":"Proc Privacy Enhancing Technol"},{"key":"9893_CR11","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/JIOT.2016.2560768","volume":"3","author":"S Gisdakis","year":"2016","unstructured":"Gisdakis S, Giannetsos T, Papadimitratos P. Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J, 2016, 3: 839\u2013853","journal-title":"IEEE Internet Things J"},{"key":"9893_CR12","first-page":"83","volume-title":"Proceedings of the 10th International Workshop and the 4th International Workshop, Vienna","author":"C Tanas","year":"2015","unstructured":"Tanas C, Delgado-Segura S, Herrera-Joancomart\u00ed J. An integrated reward and reputation mechanism for MCS preserving users\u2019 privacy. In: Proceedings of the 10th International Workshop and the 4th International Workshop, Vienna, 2015. 83\u201399"},{"key":"9893_CR13","volume-title":"ArXiv: 1710.11597","author":"A Muehlemann","year":"2017","unstructured":"Muehlemann A. Sentiment protocol: a decentralized protocol leveraging crowd sourced wisdom. 2017. ArXiv: 1710.11597"},{"key":"9893_CR14","doi-asserted-by":"publisher","first-page":"28203","DOI":"10.1109\/ACCESS.2018.2837650","volume":"6","author":"C Lin","year":"2018","unstructured":"Lin C, He D B, Huang X, et al. A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems. IEEE Access, 2018, 6: 28203\u201328212","journal-title":"IEEE Access"},{"key":"9893_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D B, Zeadally S, et al. A survey on privacy protection in blockchain system. J Netw Comput Appl, 2019, 126: 45\u201358","journal-title":"J Netw Comput Appl"},{"key":"9893_CR16","volume-title":"Inf Sci","author":"C Lin","year":"2018","unstructured":"Lin C, He D B, Huang X Y, et al. Blockchain-based system for secure outsourcing of bilinear pairings. Inf Sci, 2018. doi: 10.1016\/j.ins.2018.12.043"},{"key":"9893_CR17","first-page":"21","volume-title":"Proceedings of the 9th International Conference on Cryptology, Senegal","author":"M Veeningen","year":"2017","unstructured":"Veeningen M. Pinocchio-based adaptive zk-SNARKs and secure\/correct adaptive function evaluation. In: Proceedings of the 9th International Conference on Cryptology, Senegal, 2017. 21\u201339"},{"key":"9893_CR18","first-page":"839","volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy, California","author":"A Kosba","year":"2016","unstructured":"Kosba A, Miller A, Shi E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of the 37th IEEE Symposium on Security and Privacy, California, 2016. 839\u2013858"},{"key":"9893_CR19","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M. Blockchains and smart contracts for the Internet of things. IEEE Access, 2016, 4: 2292\u20132303","journal-title":"IEEE Access"},{"key":"9893_CR20","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","volume":"10","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Wen J. The IoT electric business model: using blockchain technology for the Internet of things. Peer-to-Peer Netw Appl, 2017, 10: 983\u2013994","journal-title":"Peer-to-Peer Netw Appl"},{"key":"9893_CR21","first-page":"103","volume-title":"Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, Markham","author":"R M Parizi","year":"2018","unstructured":"Parizi R M, Dehghantanha A, Choo K K R, et al. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. In: Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, Markham, 2018. 103\u2013113"},{"key":"9893_CR22","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1145\/2976749.2978309","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York","author":"L Luu","year":"2016","unstructured":"Luu L, Chu D H, Olickel H, et al. Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, 2016. 254\u2013269"},{"key":"9893_CR23","volume-title":"ArXiv: 1711.09327","author":"A Mavridou","year":"2017","unstructured":"Mavridou A, Laszka A. Designing secure ethereum smart contracts: a finite state machine based approach. 2017. ArXiv: 1711.09327"},{"key":"9893_CR24","first-page":"75","volume-title":"Proceedings of the 1st International Conference on Blockchain Blockchain, Washington","author":"R M Parizi","year":"2018","unstructured":"Parizi R M, Singh A, Dehghantanha A. Smart contract programming languages on blockchains: an empirical evaluation of usability and security. In: Proceedings of the 1st International Conference on Blockchain Blockchain, Washington, 2018. 75\u201391"},{"key":"9893_CR25","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Proceedings of Advances in Cryptology-EUROCRYPT, Brighton","author":"D v Chaum","year":"1991","unstructured":"Chaum D, van Heyst E. Group signatures. In: Proceedings of Advances in Cryptology-EUROCRYPT, Brighton, 1991. 257\u2013265"},{"key":"9893_CR26","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1142\/S0129054115500343","volume":"26","author":"T H Ho","year":"2015","unstructured":"Ho T H, Yen L H, Tseng C C. Simple-yet-efficient construction and revocation of group signatures. Int J Found Comput Sci, 2015, 26: 611\u2013624","journal-title":"Int J Found Comput Sci"},{"key":"9893_CR27","first-page":"53","volume-title":"Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina","author":"B Waters","year":"2011","unstructured":"Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, 2011. 53\u201370"},{"key":"9893_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES \u2014 The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V. The Design of Rijndael: AES \u2014 The Advanced Encryption Standard. Berlin: Springer, 2002"},{"key":"9893_CR29","volume-title":"Trusted execution environment, millions of users have one, do you have yours?","author":"Poulpita.","year":"2017","unstructured":"Poulpita. Trusted execution environment, millions of users have one, do you have yours? 2017. https:\/\/poulpita.com\/2014\/02\/18\/trusted-execution-environment-do-you-have-yours\/"},{"key":"9893_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Huang X, et al. BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl, 2018, 116: 42\u201352","journal-title":"J Netw Comput Appl"},{"key":"9893_CR31","first-page":"173","volume-title":"Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation, Louisiana","author":"M Castro","year":"1999","unstructured":"Castro M, Liskov B. Practical byzantine fault tolerance. In: Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation, Louisiana, 1999. 173\u2013186"},{"key":"9893_CR32","first-page":"305","volume-title":"Proceedings of 2014 USENIX Annual Technical Conference, Philadelphia, Pennsylvania","author":"D Ongaro","year":"2014","unstructured":"Ongaro D, Ousterhout J. In search of an understandable consensus algorithm. In: Proceedings of 2014 USENIX Annual Technical Conference, Philadelphia, Pennsylvania, 2014. 305\u2013319"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-9893-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-019-9893-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-9893-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T07:33:48Z","timestamp":1612942428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-019-9893-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,11]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["9893"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-9893-2","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,11]]},"assertion":[{"value":"27 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"130102"}}