{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:01:06Z","timestamp":1776290466447,"version":"3.50.1"},"reference-count":36,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61922045"],"award-info":[{"award-number":["61922045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20465"],"award-info":[{"award-number":["U21A20465"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172292"],"award-info":[{"award-number":["62172292"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008043","name":"Science Foundation of Zhejiang Sci-Tech University","doi-asserted-by":"publisher","award":["22222266-Y"],"award-info":[{"award-number":["22222266-Y"]}],"id":[{"id":"10.13039\/501100008043","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2023,12,31]]},"DOI":"10.1080\/09540091.2023.2174081","type":"journal-article","created":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T16:54:31Z","timestamp":1676134471000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain-assisted data sharing supports deduplication for cloud storage"],"prefix":"10.1080","volume":"35","author":[{"given":"Tao","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Information Science &amp; Technology, Nanjing, People's Republic of China"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, People's Republic of China"}]},{"given":"Mulmediyage Imantha Udana","family":"Chandrasena","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Information Science &amp; Technology, Nanjing, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,2,11]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"crossref","unstructured":"Bethencourt J. Sahai A. & Waters B. (2007 May 20\u201323). Ciphertext-policy attribute-based encryption . 2007 IEEE Symposium on Security and Privacy (SP\u201907) Berkeley CA USA.","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_3_1","doi-asserted-by":"crossref","unstructured":"Cheung L. & Newport C. (2007 November 2). Provably secure ciphertext policy ABE . 14th ACM Conference on Computer and Communications Security 2007 Alexandria Virginia USA.","DOI":"10.1145\/1315245.1315302"},{"key":"e_1_3_2_4_1","doi-asserted-by":"crossref","unstructured":"Cui H. Deng R. H. Li Y. & Qin B. (2016 September 26\u201330). Server-aided revocable attribute-based encryption . Computer Security\u2013ESORICS 2016: 21st European Symposium on Research in Computer Security Heraklion Greece.","DOI":"10.1007\/978-3-319-45741-3_29"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3152546"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3065999"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076580"},{"key":"e_1_3_2_8_1","unstructured":"Green M. Hohenberger S. & Waters B. (2011 August 8\u201312). Outsourcing the decryption of abe ciphertexts . USENIX security symposium San Francisco CA."},{"key":"e_1_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Hohenberger S. & Waters B. (2014 March 26\u201328). Online\/offline attribute-based encryption . Public-Key Cryptography\u2013PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography Buenos Aires Argentina.","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2124957"},{"key":"e_1_3_2_11_1","doi-asserted-by":"crossref","unstructured":"Li J. Jia C. Li J. & Chen X. (2012 October 29\u201331). Outsourcing encryption of attribute-based encryption with mapreduce . Information and Communications Security: 14th International Conference Hong Kong China.","DOI":"10.1007\/978-3-642-34129-8_17"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3596205"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.6488907"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050802"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2410137"},{"key":"e_1_3_2_18_1","doi-asserted-by":"crossref","unstructured":"Rahulamathavan Y. Phan R. C. W. Rajarajan M. Misra S. & Kondoz A. (2017 December 17\u201320). Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption . 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) Bhubaneswar India.","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"e_1_3_2_19_1","doi-asserted-by":"crossref","unstructured":"Rouselakis Y. & Waters B. (2013 November 4\u20138). Practical constructions and new proof methods for large universe attribute-based encryption . Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security Berlin.","DOI":"10.1145\/2508859.2516672"},{"key":"e_1_3_2_20_1","unstructured":"Sahai A. & Waters B. (2005 May 22\u201326). Fuzzy identity-based encryption . Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Aarhus Denmark."},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108196"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2978866"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.012"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0994-6"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213306"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2090514"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3173412"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.8858"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5781354"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/app122110812"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3073740"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2022.05.012"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.031"},{"key":"e_1_3_2_34_1","doi-asserted-by":"crossref","unstructured":"Zhang T. Wang C. & Chandrasena M. I. U. (2022 October 16\u201318). Efficient attribute-based proxy re-encryption for secure deduplication . Security and Privacy in Social Networks and Big Data: 8th International Symposium Xi\u2019an China.","DOI":"10.1007\/978-981-19-7242-3_4"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00918-1"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"e_1_3_2_37_1","unstructured":"Zhou Z. & Huang D. (2012 October 22\u201326). Efficient and secure data storage operations for mobile cloud computing . 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) Las Vegas NV USA."}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2023.2174081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T07:50:32Z","timestamp":1703749832000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2023.2174081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,11]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,12,31]]}},"alternative-id":["10.1080\/09540091.2023.2174081"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2023.2174081","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"value":"0954-0091","type":"print"},{"value":"1360-0494","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-11-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2174081"}}