{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T23:45:34Z","timestamp":1772322334681,"version":"3.50.1"},"reference-count":31,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002766","name":"Beijing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["CX2022218"],"award-info":[{"award-number":["CX2022218"]}],"id":[{"id":"10.13039\/501100002766","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2703400"],"award-info":[{"award-number":["2022YFB2703400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1016\/j.hcc.2024.100265","type":"journal-article","created":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T07:35:34Z","timestamp":1725089734000},"page":"100265","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"title":["Trusted access control mechanism for data with blockchain-assisted attribute encryption"],"prefix":"10.1016","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6472-9261","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Da","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shaoyong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2024.100265_b1","series-title":"Global Digital Economy White Paper (2023)","author":"Global Digital Economy Conference 2023","year":"2023"},{"issue":"7","key":"10.1016\/j.hcc.2024.100265_b2","doi-asserted-by":"crossref","first-page":"5080","DOI":"10.1109\/JIOT.2021.3110097","article-title":"LTSM: Lightweight and trusted sharing mechanism of IoT data in smart city","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.hcc.2024.100265_b3","doi-asserted-by":"crossref","first-page":"6372","DOI":"10.1109\/JIOT.2020.3033434","article-title":"Attribute-based access control for smart cities: A smart-contract-driven framework","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100265_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100199","article-title":"An attribute-based access control scheme using blockchain technology for IoT data protection","author":"Yang","year":"2024","journal-title":"High-Confid. Comput."},{"key":"10.1016\/j.hcc.2024.100265_b5","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.comcom.2024.04.006","article-title":"A dynamic data access control scheme for hierarchical structures in big data","volume":"220","author":"Deng","year":"2024","journal-title":"Comput. Commun."},{"key":"10.1016\/j.hcc.2024.100265_b6","series-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"Goyal","year":"2006"},{"issue":"11","key":"10.1016\/j.hcc.2024.100265_b7","doi-asserted-by":"crossref","first-page":"8143","DOI":"10.1109\/JIOT.2021.3111012","article-title":"Secure data sharing: Blockchain-enabled data access control framework for IoT","volume":"9","author":"Wei","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100265_b8","series-title":"2007 IEEE Symposium on Security and Privacy","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007"},{"key":"10.1016\/j.hcc.2024.100265_b9","series-title":"2013 International Conference on Advanced Cloud and Big Data","first-page":"51","article-title":"A tree-based CP-ABE scheme with hidden policy supporting secure data sharing in cloud computing","author":"Xu","year":"2013"},{"issue":"14","key":"10.1016\/j.hcc.2024.100265_b10","doi-asserted-by":"crossref","first-page":"2397","DOI":"10.1002\/sec.1509","article-title":"Anonymous attribute-based proxy re-encryption for access control in cloud computing","volume":"9","author":"Zhang","year":"2016","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"10.1016\/j.hcc.2024.100265_b11","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","article-title":"An efficient and fine-grained big data access control scheme with privacy-preserving policy","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.hcc.2024.100265_b12","doi-asserted-by":"crossref","first-page":"8681","DOI":"10.1109\/JIOT.2021.3117378","article-title":"An expressive fully policy-hidden ciphertext policy attribute-based encryption scheme with credible verification based on blockchain","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.hcc.2024.100265_b13","doi-asserted-by":"crossref","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","article-title":"Security and privacy in smart health: Efficient policy-hiding attribute-based access control","volume":"5","author":"Zhang","year":"2018","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.hcc.2024.100265_b14","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","article-title":"A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection","volume":"19","author":"Han","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.hcc.2024.100265_b15","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.future.2019.02.051","article-title":"A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance","volume":"97","author":"Xu","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"8","key":"10.1016\/j.hcc.2024.100265_b16","first-page":"779","article-title":"Adaptive time-bound access control for internet of things in fog computing architecture","volume":"44","author":"Noran\u00a0AboDoma","year":"2022","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"10.1016\/j.hcc.2024.100265_b17","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/TDSC.2023.3265979","article-title":"Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds","volume":"21","author":"Ge","year":"2024","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.hcc.2024.100265_b18","doi-asserted-by":"crossref","first-page":"11688","DOI":"10.1109\/ACCESS.2019.2890976","article-title":"Efficient CCA2 secure flexible and publicly-verifiable fine-grained access control in fog computing","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.hcc.2024.100265_b19","series-title":"2020 International Conference on Space-Air-Ground Computing","first-page":"76","article-title":"Multi-authority CP-ABE with dynamical revocation in space-air-ground integrated network","author":"Zhang","year":"2020"},{"issue":"11","key":"10.1016\/j.hcc.2024.100265_b20","doi-asserted-by":"crossref","first-page":"8949","DOI":"10.1109\/JIOT.2021.3055541","article-title":"O3-R-CP-ABE: An efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system","volume":"8","author":"Guo","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100265_b21","series-title":"Theory of Cryptography","first-page":"515","article-title":"Multi-authority attribute based encryption","author":"Chase","year":"2007"},{"issue":"1","key":"10.1016\/j.hcc.2024.100265_b22","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/TIFS.2014.2368352","article-title":"Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption","volume":"10","author":"Jung","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2024.100265_b23","doi-asserted-by":"crossref","first-page":"58955","DOI":"10.1109\/ACCESS.2018.2875070","article-title":"Generic construction of outsourced attribute-based encryption without key escrow","volume":"6","author":"Chen","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.hcc.2024.100265_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2021.102108","article-title":"A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems","volume":"117","author":"Sowjanya","year":"2021","journal-title":"J. Syst. Archit."},{"issue":"8","key":"10.1016\/j.hcc.2024.100265_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.jksuci.2023.101658","article-title":"Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain","volume":"35","author":"Hou","year":"2023","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"10.1016\/j.hcc.2024.100265_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110425","article-title":"Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT","volume":"246","author":"Xiang","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.hcc.2024.100265_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101220","article-title":"A blockchain-enabled decentralized access control scheme using multi-authority attribute-based encryption for edge-assisted internet of things","volume":"26","author":"Cheng","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.hcc.2024.100265_b28","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.future.2024.06.037","article-title":"Blockchain empowered access control for digital twin system with attribute-based encryption","volume":"160","author":"Dai","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.hcc.2024.100265_b29","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.comcom.2024.05.012","article-title":"A cross-chain access control mechanism based on blockchain and the threshold paillier cryptosystem","volume":"223","author":"Si","year":"2024","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.hcc.2024.100265_b30","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1016\/j.jksuci.2023.01.010","article-title":"Blockchain-based dynamic trust access control game mechanism","volume":"35","author":"Deng","year":"2023","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"10.1016\/j.hcc.2024.100265_b31","series-title":"Efficient generation of linear secret sharing scheme matrices from threshold access trees","author":"Liu","year":"2010"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000680?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000680?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T20:09:27Z","timestamp":1751400567000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295224000680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["S2667295224000680"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100265","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trusted access control mechanism for data with blockchain-assisted attribute encryption","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100265","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100265"}}