{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:20:24Z","timestamp":1767986424080,"version":"3.49.0"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1006000"],"award-info":[{"award-number":["2020YFB1006000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072202"],"award-info":[{"award-number":["62072202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,12,15]]},"DOI":"10.1109\/jiot.2022.3197708","type":"journal-article","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T20:39:33Z","timestamp":1660077573000},"page":"25538-25550","source":"Crossref","is-referenced-by-count":22,"title":["HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0666-8231","authenticated-orcid":false,"given":"Weiqi","family":"Dai","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Shuyue","family":"Tuo","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Liangliang","family":"Yu","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security and the Department of Electrical and Computer Engineering, The University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923525"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923232"},{"key":"ref30","article-title":"HIBEChain: A hierarchical identity-based blockchain system for large-scale IoT","author":"wan","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991127"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00135"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045260"},{"key":"ref14","first-page":"1519","article-title":"JEDI: Many-to-many end-to-end encryption and key delegation for IoT","author":"kumar","year":"2019","journal-title":"Proc 28th USENIX Security Symp (USENIX Security)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2853167"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028189"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11427-019-1747-y"},{"key":"ref28","first-page":"106","article-title":"SyLPEnIoT: Symmetric lightweight predicate encryption for data privacy applications in IoT environments","author":"tran","year":"2021","journal-title":"Proc 26th Eur Symp Res Comput Security Comput Security (ESORICS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036811"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885287"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSC49826.2021.9346245"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2967099"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2957-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref2","first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von Neumann architecture","author":"ben-sasson","year":"2014","journal-title":"Proc 23rd USENIX Security Symp (USENIX Security)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2019CIP0014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00137"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035468"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s20143965"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3013892"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00190"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.03.081"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027413"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9973413\/09852734.pdf?arnumber=9852734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:32:46Z","timestamp":1672083166000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9852734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,15]]},"references-count":34,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3197708","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,15]]}}}