{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T11:11:04Z","timestamp":1772536264109,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2018YFB08040505"],"award-info":[{"award-number":["2018YFB08040505"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872087"],"award-info":[{"award-number":["61872087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602092"],"award-info":[{"award-number":["61602092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Provincial Major Frontier Issues","award":["2016JY0007"],"award-info":[{"award-number":["2016JY0007"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/tii.2019.2943331","type":"journal-article","created":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T20:18:42Z","timestamp":1569442722000},"page":"2677-2686","source":"Crossref","is-referenced-by-count":49,"title":["Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5102-610X","authenticated-orcid":false,"given":"Ke","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-1412","authenticated-orcid":false,"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1637-845X","authenticated-orcid":false,"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1368-016X","authenticated-orcid":false,"given":"Fatemeh","family":"Rezaeibagha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4235-9671","authenticated-orcid":false,"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Nadra","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"406","article-title":"Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based","author":"david","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2901011"},{"key":"ref10","first-page":"1","article-title":"Metadisk a blockchain-based decentralized file storage application","author":"wilkinson","year":"2014"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","article-title":"Security in wireless sensor networks","volume":"15","author":"chen","year":"2008","journal-title":"IEEE Wireless Commun"},{"key":"ref12","first-page":"181","article-title":"Blockstack: A global naming and storage system secured by blockchains","author":"ali","year":"0","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref13","first-page":"111","article-title":"Redactable blockchain&#x2013; or&#x2013; rewriting history in bitcoin and friends","author":"ateniese","year":"0","journal-title":"Proc IEEE Symp Privacy Secur"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571064"},{"key":"ref15","article-title":"Chameleon hashing and signatures","author":"krawczyk","year":"2000"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref17","author":"nilsson","year":"2014","journal-title":"Principles of Artificial Intelligence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38033-4_9"},{"key":"ref19","first-page":"164","article-title":"Identity-based chameleon hash and applications","author":"ateniese","year":"0","journal-title":"Proc Int Conf Financial Cryptography"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21518-6_29"},{"key":"ref4","volume":"1","author":"agusti","year":"2009","journal-title":"Advances In Artificial Intelligence for Privacy Protection and Security"},{"key":"ref27","first-page":"11","article-title":"Chameleon-hashes with dual long-term trapdoors and their applications","author":"krenn","year":"0","journal-title":"Proc Int Conf Cryptology Africa"},{"key":"ref3","author":"russell","year":"2016","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for Internet of Things","volume":"42","author":"yan","year":"2014","journal-title":"J Netw Comput Appl"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9155-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref7","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref2","author":"mayer-sch\u00f6nberger","year":"2013","journal-title":"Big Data A Revolution That Will Transform How We Live Work and Think"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","first-page":"87","article-title":"Chameleon hashing without key exposure","author":"chen","year":"0","journal-title":"Proc Intl Conf Info Sec"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref21","first-page":"35","article-title":"Key-exposure free and signatures based on discrete logarithm systems","volume":"2009","author":"chen","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"ref23","first-page":"514","article-title":"Short signatures from the weil pairing","author":"boneh","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref26","first-page":"152","article-title":"Chameleon-hashes with ephemeral trapdoors","author":"camenisch","year":"0","journal-title":"Proc Int Assoc Cryptologic Res Int Workshop Public Key Cryptography"},{"key":"ref25","first-page":"165","article-title":"On the key exposure problem in chameleon hashes","author":"ateniese","year":"0","journal-title":"Proc Int Conf Secur Commun Netw"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8966383\/08848417.pdf?arnumber=8848417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:58:40Z","timestamp":1651078720000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8848417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tii.2019.2943331","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}