{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T02:35:57Z","timestamp":1779330957337,"version":"3.51.4"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010622","name":"Talent Research Fund Project of Hefei University","doi-asserted-by":"publisher","award":["21-22RC19"],"award-info":[{"award-number":["21-22RC19"]}],"id":[{"id":"10.13039\/501100010622","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009558","name":"University Natural Sciences Research Project of Anhui Province","doi-asserted-by":"publisher","award":["KJ2021ZD0118"],"award-info":[{"award-number":["KJ2021ZD0118"]}],"id":[{"id":"10.13039\/501100009558","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3296781","type":"journal-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T16:58:52Z","timestamp":1689785932000},"page":"82989-83003","source":"Crossref","is-referenced-by-count":14,"title":["A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3454-6245","authenticated-orcid":false,"given":"Caimei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4636-2375","authenticated-orcid":false,"given":"Jianhao","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3806-3993","authenticated-orcid":false,"given":"Xinlu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pei","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7822-9900","authenticated-orcid":false,"given":"Zijian","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qilue","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2783658"},{"key":"ref35","year":"2023","journal-title":"Amazon quantum ledger database"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00181"},{"key":"ref15","first-page":"7","article-title":"A trusted data access control scheme combining attribute based encryption and blockchain","volume":"21","author":"lu","year":"2021","journal-title":"Netinfo Security"},{"key":"ref37","first-page":"983","article-title":"SM3 cryptographic hash algorithm","volume":"2","author":"wang","year":"2016","journal-title":"Journal of Inf Sec Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102970"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730784"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2667679"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS210215037G"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/fi13080197"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108202"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.055"},{"key":"ref17","first-page":"90","article-title":"CP-ABE scheme supporting attribute revocation and outsourcing decryption","volume":"20","author":"liu","year":"2020","journal-title":"Netinfo Security"},{"key":"ref16","first-page":"325","article-title":"Study on crowdsourced testing intellectual property protection technology based on blockchain and improved CP-ABE","volume":"49","author":"yang","year":"2022","journal-title":"Comput Sci"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.02.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900433"},{"key":"ref24","first-page":"14","article-title":"A novel personal privacy data protection scheme based on blockchain and attribute-based encryption","volume":"8","author":"wang","year":"2021","journal-title":"Research in Cryptology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9620889"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2958963"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3241198"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1121-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3043950"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164081"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800512"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0270-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/17\/1\/13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14778\/3583140.3583152"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415540"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103801"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101854"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00027"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10188388.pdf?arnumber=10188388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T21:11:04Z","timestamp":1769029864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3296781","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}