{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:38:40Z","timestamp":1775666320569,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772403"],"award-info":[{"award-number":["61772403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836203"],"award-info":[{"award-number":["U1836203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2019ZDLGY12-02"],"award-info":[{"award-number":["2019ZDLGY12-02"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Innovation Team Project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"name":"Xi&#x0027;an Science and technology innovation plan","award":["201809168CX9JC10"],"award-info":[{"award-number":["201809168CX9JC10"]}]},{"name":"National 111 Program of China","award":["B16037"],"award-info":[{"award-number":["B16037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/tvt.2020.2968094","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T21:49:21Z","timestamp":1579729761000},"page":"5826-5835","source":"Crossref","is-referenced-by-count":149,"title":["A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5952-973X","authenticated-orcid":false,"given":"Qiang","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4262-153X","authenticated-orcid":false,"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuhan","family":"Bai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2833-1122","authenticated-orcid":false,"given":"Shili","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-5404","authenticated-orcid":false,"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"24","article-title":"Fully Secure Ciphertext-Policy Hiding CP-ABE","author":"lai","year":"2011","journal-title":"Proc Int Conf Inf Secur Pract Exper"},{"key":"ref38","article-title":"Attribute-based encryption with partially hidden encryptor-specified access structure","author":"nishide","year":"0","journal-title":"Intl Conf Applied Cryptography and Network Security"},{"key":"ref33","first-page":"1","article-title":"User collision avoidance CP-ABE with efficient attribute revocation for cloud storage","author":"li","year":"2017","journal-title":"IEEE Syst J"},{"key":"ref32","article-title":"An enhanced CP-ABE based access control algorithm for Point to multi-point communication in cloud computing","author":"shynu","year":"2017","journal-title":"J Inf Sci Eng"},{"key":"ref31","first-page":"3273","article-title":"Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts","author":"minho","year":"2017","journal-title":"IEEE Access"},{"key":"ref30","first-page":"3","article-title":"Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment","volume":"54","author":"vanga","year":"2016","journal-title":"Comput Standards Interfaces"},{"key":"ref37","first-page":"1","article-title":"Location privacy in usage-based automotive insurance: attack and countermeasures","author":"lu","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2685583"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682697"},{"key":"ref34","first-page":"1","article-title":"Privacy-Preserving data processing with flexible access control","author":"ding","year":"2017","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2769645"},{"key":"ref27","first-page":"1","article-title":"Design on data access control scheme for cloud storage based on CP-ABE algorithm","volume":"16","author":"cheng","year":"2016","journal-title":"Netinfo Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2511457"},{"key":"ref2","article-title":"FCSS: Fog computing based content-aware filtering for security services in information-centric social network","author":"wu","year":"2017"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2007.912927"},{"key":"ref20","article-title":"PPLS: A privacy-preserving location-sharing scheme in vehicular social networks","author":"xu","year":"2018","journal-title":"arXiv 1804 02431"},{"key":"ref22","article-title":"Fuzzy identity-based encryption","author":"amit","year":"2005","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2891417"},{"key":"ref24","article-title":"Outsourcing the decryption of ABE ciphertexts","author":"matthew","year":"0","journal-title":"Proc Usenix Conf Secur USENIX Assoc"},{"key":"ref23","article-title":"Multi-authority attribute based encryption","author":"melissa","year":"0","journal-title":"Proc TCC"},{"key":"ref26","first-page":"2394","article-title":"A key-Insulated CP-ABE with key exposure accountability for secure data sharing in the cloud","volume":"10","author":"sun","year":"2016","journal-title":"KSII Trans Int Inf Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.42"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/s17071695"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: A framework for rapidly prototyping cryptosystems","volume":"3","author":"joseph","year":"2013","journal-title":"J Cryptographic Eng"},{"key":"ref56","article-title":"Attribute-Based encryption with Non-Monotonic access structures","author":"rafail","year":"0","journal-title":"Proc CCS"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2018.00196"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863956"},{"key":"ref53","first-page":"11","article-title":"Secret-sharing schemes: A survey","author":"amos","year":"2011","journal-title":"Proc Int Workshop DBLP"},{"key":"ref52","article-title":"Secure schemes for secret sharing and key distribution","author":"beimel","year":"1996","journal-title":"Phd Thesis Israel Institute of Technology Technion"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895834"},{"key":"ref40","first-page":"1","article-title":"Multi-Authority attribute-based encryption access control scheme with policy hidden for cloud storage","volume":"22","author":"hong","year":"2016","journal-title":"Soft Comput"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref13","first-page":"481","article-title":"Blockchain: The state of the art and future trends","volume":"42","author":"yong","year":"2016","journal-title":"ACTA Automatica Sinica"},{"key":"ref14","first-page":"4011","article-title":"Blockchain technique in the energy internet: Preliminary research framework and typical applications","volume":"36","author":"zhang","year":"2016","journal-title":"Proc CSEE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.246"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621973"},{"key":"ref17","article-title":"Managing social networks in vehicular networks using trust rules","author":"noor","year":"2011","journal-title":"Wireless Technol Appl"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308200"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962214"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700374"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2626288"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.02.023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2686451"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800225"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900091"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.026"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868162"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.2018.1700863","article-title":"Secure and energy-efficient handover in fog networks using blockchain-based DMM","volume":"56","author":"vishal","year":"2018","journal-title":"IEEE Commun Mag"},{"key":"ref45","article-title":"Blockchain technology in healthcare: The revolution starts here","author":"matthias","year":"2016","journal-title":"Proc IEEE Int Conf e-Health Netw"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.007"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref42","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"satoshi","year":"2008","journal-title":"Satoshi Nakamoto Institute"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.003"},{"key":"ref44","article-title":"Blockchain for IoT Security and Privacy: The case study of a smart home","author":"ali","year":"0","journal-title":"Proc IEEE Int Conf Pervasive Comput Commun Workshops"},{"key":"ref43","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/9119895\/08966381.pdf?arnumber=8966381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T13:43:43Z","timestamp":1651067023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8966381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":57,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2020.2968094","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}