{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T23:15:06Z","timestamp":1762643706263,"version":"build-2065373602"},"reference-count":22,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003213","name":"Beijing Municipal Education Commission","doi-asserted-by":"publisher","award":["JCKY2021208B036"],"award-info":[{"award-number":["JCKY2021208B036"]}],"id":[{"id":"10.13039\/501100003213","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1016\/j.hcc.2023.100132","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T12:30:44Z","timestamp":1684931444000},"page":"100132","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"title":["Blockchain data secure sharing protocol based on threshold Paillier algorithm"],"prefix":"10.1016","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4151-2881","authenticated-orcid":false,"given":"Likai","family":"Jia","sequence":"first","affiliation":[]},{"given":"Xiubo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Luxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoge","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2023.100132_b1","article-title":"Privacy and security in the big data paradigm","author":"Sun","year":"2018","journal-title":"Journal of computer information system"},{"key":"10.1016\/j.hcc.2023.100132_b2","series-title":"Cloud Computing\u2013CLOUD 2021: 14th International Conference, Held As Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10\u201314, 2021, Proceedings","first-page":"75","article-title":"Comparative analysis of cloud storage options for diverse application requirements","author":"Antu","year":"2022"},{"key":"10.1016\/j.hcc.2023.100132_b3","series-title":"International Conference on Financial Cryptography and Data Security","first-page":"136","article-title":"Cryptographic cloud storage","author":"Kamara","year":"2010"},{"issue":"4","key":"10.1016\/j.hcc.2023.100132_b4","first-page":"41","article-title":"Cloud storage security architecture for distributed storage","volume":"45","author":"Genqing","year":"2011","journal-title":"Journal of Xi\u2019an Jiaotong Univercity"},{"issue":"7","key":"10.1016\/j.hcc.2023.100132_b5","first-page":"1146","article-title":"A method for protecting user data privacy on cloud storage platforms","volume":"48","author":"Qinghua","year":"2011","journal-title":"Computer Research and Development"},{"issue":"1","key":"10.1016\/j.hcc.2023.100132_b6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","volume":"9","author":"Ateniese","year":"2006","journal-title":"ACM Transactions on Information and System Security(TISSEC)"},{"key":"10.1016\/j.hcc.2023.100132_b7","series-title":"International Conference on Information Security Practice and Experience","first-page":"13","article-title":"A ciphertext-policy attribute-based encryption scheme with constant ciphertext length","author":"Emura","year":"2009"},{"key":"10.1016\/j.hcc.2023.100132_b8","series-title":"A peer-to-peer electronic cash system","first-page":"2","author":"Nakamoto","year":"2008"},{"issue":"4","key":"10.1016\/j.hcc.2023.100132_b9","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng","year":"2018","journal-title":"Internation journal of web and grid services"},{"issue":"9","key":"10.1016\/j.hcc.2023.100132_b10","first-page":"1555","article-title":"A study on blockchain-based medical data sharing model","volume":"43","author":"Tengfei","year":"2017","journal-title":"Journal of Automation"},{"issue":"6","key":"10.1016\/j.hcc.2023.100132_b11","first-page":"1661","article-title":"A data access control and sharing model for applying blockchain","volume":"30","author":"XiuLi","year":"2019","journal-title":"Journal of Software"},{"key":"10.1016\/j.hcc.2023.100132_b12","series-title":"2018 Information Theory and Applications Workshop","first-page":"1","article-title":"Distributed storage meets secret sharing on the blockchain","author":"Raman","year":"2018"},{"key":"10.1016\/j.hcc.2023.100132_b13","series-title":"2018 IEEE International Symposium on Information Theory","first-page":"2619","article-title":"Dynamic distributed storage for blockchains","author":"Raman","year":"2018"},{"issue":"2","key":"10.1016\/j.hcc.2023.100132_b14","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/LCOMM.2018.2886016","article-title":"Efficient local secret sharing for distributed blockchain systems","volume":"23","author":"Kim","year":"2018","journal-title":"IEEE Communications Letters"},{"key":"10.1016\/j.hcc.2023.100132_b15","series-title":"2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing","first-page":"468","article-title":"Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability","author":"Liang","year":"2017"},{"issue":"3","key":"10.1016\/j.hcc.2023.100132_b16","first-page":"298","article-title":"Secure storage and retrieval of logs based on a combination of on-chain and off-chain","volume":"47","author":"Jianfu","year":"2020","journal-title":"Computer Science"},{"key":"10.1016\/j.hcc.2023.100132_b17","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11390-018-1840-5","article-title":"Scalable and privacy-preserving data sharing based on blockchain","volume":"33","author":"Zheng","year":"2018","journal-title":"Journal of Computer Science and Technology"},{"key":"10.1016\/j.hcc.2023.100132_b18","doi-asserted-by":"crossref","first-page":"61048","DOI":"10.1109\/ACCESS.2021.3072849","article-title":"A survey on blockchain technology: evolution, architecture and security","volume":"9","author":"Bhutta","year":"2021","journal-title":"IEEE Access"},{"issue":"11","key":"10.1016\/j.hcc.2023.100132_b19","first-page":"102","article-title":"Advances in blockchain-based cloud storage security research","volume":"48","author":"Kun","year":"2021","journal-title":"Computer Science"},{"issue":"11","key":"10.1016\/j.hcc.2023.100132_b20","first-page":"169","article-title":"On data banks and privacy homomorphisms found","volume":"4","author":"Rivest","year":"1978","journal-title":"Secure Comput"},{"key":"10.1016\/j.hcc.2023.100132_b21","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"Paillier","year":"1999"},{"year":"2009","series-title":"Foundations of Cryptography: Volume 2, Basic Applications","author":"Goldreich","key":"10.1016\/j.hcc.2023.100132_b22"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000302?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000302?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T23:09:00Z","timestamp":1762643340000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295223000302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["S2667295223000302"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100132","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Blockchain data secure sharing protocol based on threshold Paillier algorithm","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100132","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100132"}}