{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T23:45:32Z","timestamp":1771631132895,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T00:00:00Z","timestamp":1639612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T00:00:00Z","timestamp":1639612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11432-020-2940-8","type":"journal-article","created":{"date-parts":[[2021,12,19]],"date-time":"2021-12-19T17:02:21Z","timestamp":1639933341000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy"],"prefix":"10.1007","volume":"65","author":[{"given":"Xiaojie","family":"Guo","sequence":"first","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zheli","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Changyu","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,16]]},"reference":[{"key":"2940_CR1","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1109\/TIFS.2018.2810065","volume":"13","author":"S M Xu","year":"2018","unstructured":"Xu S M, Yang G M, Mu Y, et al. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans Inform Forensic Secur, 2018, 13: 2101\u20132113","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2940_CR2","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2018","unstructured":"Shen J, Zhou T Q, Chen X F, et al. Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inform Forensic Secur, 2018, 13: 912\u2013925","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2940_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y H, Chen X F, et al. Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur, 2018, 72: 1\u201312","journal-title":"Comput Secur"},{"key":"2940_CR4","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TCC.2017.2649685","volume":"6","author":"R X Li","year":"2018","unstructured":"Li R X, Shen C L, He H, et al. A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans Cloud Comput, 2018, 6: 344\u2013357","journal-title":"IEEE Trans Cloud Comput"},{"key":"2940_CR5","doi-asserted-by":"crossref","unstructured":"Shao J, Lu R X, Lin X D. Fine-grained data sharing in cloud computing for mobile devices. In: Proceedings of International Conference on Computer Communications, Kowloon, 2015. 2677\u20132685","DOI":"10.1109\/INFOCOM.2015.7218659"},{"key":"2940_CR6","doi-asserted-by":"crossref","unstructured":"Yuan J W, Yu S C. Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of International Conference on Computer Communications, Toronto, 2014. 2121\u20132129","DOI":"10.1109\/INFOCOM.2014.6848154"},{"key":"2940_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theor, 2014, 6: 1\u201336","journal-title":"ACM Trans Comput Theor"},{"key":"2940_CR8","doi-asserted-by":"crossref","unstructured":"Smart N P, Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Proceedings of Public Key Cryptography, Paris, 2010. 420\u2013443","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"2940_CR9","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (Standard) LWE. In: Proceedings of IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, 2011. 97\u2013106","DOI":"10.1109\/FOCS.2011.12"},{"key":"2940_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2010","author":"M van Dijk","year":"2010","unstructured":"van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers. In: Advances in Cryptology\u2014EUROCRYPT 2010. Berlin: Springer, 2010. 24\u201343"},{"key":"2940_CR11","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-29011-4_28","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2012","author":"C Gentry","year":"2012","unstructured":"Gentry C, Halevi S, Smart N P. Fully homomorphic encryption with polylog overhead. In: Advances in Cryptology\u2014EUROCRYPT 2012. Berlin: Springer, 2012. 465\u2013482"},{"key":"2940_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-40041-4_5","volume-title":"Advances in Cryptology\u2014CRYPTO 2013","author":"C Gentry","year":"2013","unstructured":"Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology\u2014CRYPTO 2013. Berlin: Springer, 2013. 75\u201392"},{"key":"2940_CR13","unstructured":"Fan J F, Vercauteren F. Somewhat practical fully homomorphic encryption. IACR Cryptol ePrint Archive, 2012. https:\/\/eprint.iacr.org\/2012\/144"},{"key":"2940_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2018.07.054","volume":"468","author":"Y Liu","year":"2018","unstructured":"Liu Y, Luo Y, Zhu Y W, et al. Secure multi-label data classification in cloud by additionally homomorphic encryption. Inf Sci, 2018, 468: 89\u2013102","journal-title":"Inf Sci"},{"key":"2940_CR15","doi-asserted-by":"crossref","unstructured":"Chen H, Laine K, Rindal P. Fast private set intersection from homomorphic encryption. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Dallas, 2017. 1243\u20131255","DOI":"10.1145\/3133956.3134061"},{"key":"2940_CR16","doi-asserted-by":"crossref","unstructured":"Lu W J, Kawasaki S, Sakuma J. Using fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data. In: Proceedings of the 24th Annual Network and Distributed System Security Symposium, San Diego, 2017","DOI":"10.14722\/ndss.2017.23119"},{"key":"2940_CR17","doi-asserted-by":"crossref","unstructured":"Zhang L, Li X-Y, Liu Y H, et al. Verifiable private multi-party computation: ranging and ranking. In: Proceedings of International Conference on Computer Communications, Turin, 2013. 605\u2013609","DOI":"10.1109\/INFCOM.2013.6566844"},{"key":"2940_CR18","doi-asserted-by":"crossref","unstructured":"Fiore D, Gennaro R, Pastro V. Efficiently verifiable computation on encrypted data. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 844\u2013855","DOI":"10.1145\/2660267.2660366"},{"key":"2940_CR19","doi-asserted-by":"crossref","unstructured":"Elkhiyaoui K, \u00d6nen M, Azraoui M, et al. Efficient techniques for publicly verifiable delegation of computation. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi\u2019an, 2016. 119\u2013128","DOI":"10.1145\/2897845.2897910"},{"key":"2940_CR20","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/TIFS.2017.2705628","volume":"12","author":"W Song","year":"2017","unstructured":"Song W, Wang B, Wang Q, et al. Publicly verifiable computation of polynomials over outsourced data with multiple sources. IEEE Trans Inform Forensic Secur, 2017, 12: 2334\u20132347","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"2940_CR21","doi-asserted-by":"crossref","unstructured":"Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology\u2014CRYPTO 2010. Berlin: Springer, 2010. 465\u2013482","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"2940_CR22","doi-asserted-by":"crossref","unstructured":"Backes M, Fiore D, Reischuk R M. Verifiable delegation of computation on outsourced data. In: Proceedings of ACM SIGSAC Conference on Computer &amp; Communications Security, Berlin, 2013. 863\u2013874","DOI":"10.1145\/2508859.2516681"},{"key":"2940_CR23","doi-asserted-by":"crossref","unstructured":"Parno B, Howell J, Gentry C, et al. Pinocchio: nearly practical verifiable computation. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2013. 238\u2013252","DOI":"10.1109\/SP.2013.47"},{"key":"2940_CR24","doi-asserted-by":"crossref","unstructured":"Zhuo G Q, Jia Q, Guo L K, et al. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: Proceedings of International Conference on Computer Communications, San Francisco, 2016. 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524547"},{"key":"2940_CR25","doi-asserted-by":"crossref","unstructured":"Zheng Q J, Xu S H, Ateniese G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of International Conference on Computer Communications, Toronto, 2014. 522\u2013530","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"2940_CR26","doi-asserted-by":"crossref","unstructured":"Canetti R, Riva B, Rothblum G N. Practical delegation of computation using multiple servers. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, 2011. 445\u2013454","DOI":"10.1145\/2046707.2046759"},{"key":"2940_CR27","doi-asserted-by":"crossref","unstructured":"van den Hooff J, Kaashoek M F, Zeldovich N. VerSum: verifiable computations over large public logs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 1304\u20131316","DOI":"10.1145\/2660267.2660327"},{"key":"2940_CR28","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro M, Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 2002, 20: 398\u2013461","journal-title":"ACM Trans Comput Syst"},{"key":"2940_CR29","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00145-005-0318-0","volume":"18","author":"C Cachin","year":"2005","unstructured":"Cachin C, Kursawe K, Shoup V. Random oracles in Constantinople: practical asynchronous Byzantine agreement using cryptography. J Cryptol, 2005, 18: 219\u2013246","journal-title":"J Cryptol"},{"key":"2940_CR30","doi-asserted-by":"crossref","unstructured":"Dong C Y, Wang Y L, Aldweesh A, et al. Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Dallas, 2017. 211\u2013227","DOI":"10.1145\/3133956.3134032"},{"key":"2940_CR31","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah E B, Asamoah K O, et al. MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access, 2017, 5: 14757\u201314767","journal-title":"IEEE Access"},{"key":"2940_CR32","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah E B, Smahi A, et al. BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information, 2017, 8: 44","journal-title":"Information"},{"key":"2940_CR33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511794216","volume-title":"Game Theory","author":"M Maschler","year":"2013","unstructured":"Maschler M, Solan E, Zamir S. Game Theory. Cambridge: Cambridge University Press, 2013"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2940-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-2940-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2940-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T20:24:04Z","timestamp":1685910244000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-2940-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,16]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["2940"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-2940-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,16]]},"assertion":[{"value":"1 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"152106"}}