{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:47Z","timestamp":1774946567000,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272002"],"award-info":[{"award-number":["62272002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20308"],"award-info":[{"award-number":["U23A20308"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202005"],"award-info":[{"award-number":["62202005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Excellent Youth Foundation of Anhui Scientific Committee","award":["2108085J31"],"award-info":[{"award-number":["2108085J31"]}]},{"name":"Natural Science Foundation of Anhui Province, China","award":["2208085QF198"],"award-info":[{"award-number":["2208085QF198"]}]},{"name":"Open Fund of Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation","award":["CSSAE-2021-008"],"award-info":[{"award-number":["CSSAE-2021-008"]}]},{"name":"University Synergy Innovation Program of Anhui Province","award":["GXXT-2022-049"],"award-info":[{"award-number":["GXXT-2022-049"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/jiot.2023.3340567","type":"journal-article","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T19:32:13Z","timestamp":1702063933000},"page":"14115-14126","source":"Crossref","is-referenced-by-count":23,"title":["Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2465-7982","authenticated-orcid":false,"given":"Fengqun","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7258-3418","authenticated-orcid":false,"given":"Jie","family":"Cui","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2600-6748","authenticated-orcid":false,"given":"Qingyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6597-168X","authenticated-orcid":false,"given":"Chengjie","family":"Gu","sequence":"additional","affiliation":[{"name":"Security Research Institute, New H3C Group, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0392-9734","authenticated-orcid":false,"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3162722"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3009103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3285800"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2836937"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103855"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3239531"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.112"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3110193"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2982942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2016.2551238"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050517"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2810065"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2946933"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2956519"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025916"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2020.106895","article-title":"Supply chain transparency through blockchain-based traceability: An overview with demonstration","volume":"150","author":"Sunny","year":"2020","journal-title":"Comput. Ind. Eng."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2999721"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3112601"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102917","article-title":"Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain","volume":"176","author":"Manzoor","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2999551"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737556"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2885266"},{"issue":"3","key":"ref25","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102535","article-title":"hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design","volume":"58","author":"Miyachi","year":"2021","journal-title":"Inf. Process. Manage."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3241198"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2710190"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3011525"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3234210"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975184"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0602-5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414507"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076580"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.ins.2019.01.051","article-title":"PRTA: A proxy re-encryption based trusted authorization scheme for nodes on CloudIoT","volume":"527","author":"Su","year":"2020","journal-title":"Inf. Sci."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78618-2_14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3076759"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"ref39","article-title":"MIRACL core","year":"2023"},{"key":"ref40","article-title":"Hyperledger","year":"2023"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10495736\/10349123.pdf?arnumber=10349123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T18:27:35Z","timestamp":1712773655000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10349123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":40,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3340567","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,15]]}}}