{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:25Z","timestamp":1750220005858,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["Grant No. 62072035"],"award-info":[{"award-number":["Grant No. 62072035"]}]},{"name":"Open Research Projects of Zhejiang Lab","award":["Grant No. 2020KE0AB04"],"award-info":[{"award-number":["Grant No. 2020KE0AB04"]}]},{"name":"National Key R&D Program of China","award":["Grant No. 2020YFB1707900"],"award-info":[{"award-number":["Grant No. 2020YFB1707900"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,25]]},"DOI":"10.1145\/3532640.3532644","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T14:04:53Z","timestamp":1657202693000},"page":"22-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Authentication Processing for Spatial Keyword Queries in Hybrid Storage Blockchain"],"prefix":"10.1145","author":[{"given":"Xu","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"given":"Xiaochun","family":"Yang","sequence":"additional","affiliation":[{"name":"Northeastern University, China"}]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"given":"Aoqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"given":"George","family":"Yuan","sequence":"additional","affiliation":[{"name":"Thinvent Digital Technology Co.,Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"S.","year":"2009","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system . 2009 . http:\/\/www.bitcoin.org\/ bitcoin.pdf Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2009. http:\/\/www.bitcoin.org\/ bitcoin.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"Ethereum Project Yellow Paper","author":"Wood G.","year":"2014","unstructured":"G. Wood , \u201c Ethereum: A secure decentralised generalised transaction ledger ,\u201d Ethereum Project Yellow Paper , 2014 . G. Wood, \u201cEthereum: A secure decentralised generalised transaction ledger,\u201d Ethereum Project Yellow Paper, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the 4th Int'l Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2018","author":"O.","year":"2018","unstructured":"Berger C, Penzenstadler B, Drogehorn O. On using blockchains for safety-critical systems . In: Proc. of the 4th Int'l Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2018 ). New York : ACM, 2018 . 30\u221236. Berger C, Penzenstadler B, Drogehorn O. On using blockchains for safety-critical systems. In: Proc. of the 4th Int'l Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS 2018). New York: ACM, 2018. 30\u221236."},{"key":"e_1_3_2_1_4_1","first-page":"367","article-title":"Security provenance model for RFID big data based on blockchain","volume":"45","year":"2018","unstructured":"Liu YZ, Liu YH . Security provenance model for RFID big data based on blockchain . Computer Science , 2018 , 45 (11A): 367 \u2212 368 ,381. Liu YZ, Liu YH. Security provenance model for RFID big data based on blockchain. Computer Science, 2018,45(11A): 367\u2212368,381.","journal-title":"Computer Science"},{"key":"e_1_3_2_1_5_1","volume-title":"Towards global asset management in blockchain systems. CoRR","author":"A.","year":"2019","unstructured":"Zakhary V, Amiri MJ, Maiyya S, Agrawal D, El Abbadi A. Towards global asset management in blockchain systems. CoRR , vol. abs\/ 1905 .09359, 2019 . Zakhary V, Amiri MJ, Maiyya S, Agrawal D, El Abbadi A. Towards global asset management in blockchain systems. CoRR, vol. abs\/1905.09359, 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 2nd Int'l Conf. on Open and Big Data (OBD 2016","author":"Medrec A.","year":"2016","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A. Medrec : Using blockchain for medical data access and permission management . In: Proc. of the 2nd Int'l Conf. on Open and Big Data (OBD 2016 ). Vienna , 2016 . 25\u221230. Azaria A, Ekblaw A, Vieira T, Lippman A. Medrec: Using blockchain for medical data access and permission management. In: Proc. of the 2nd Int'l Conf. on Open and Big Data (OBD 2016). Vienna, 2016. 25\u221230."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of the 3rd Int'l Conf. on Cryptography, Security and Privacy (ICCSP 2019","author":"J.","year":"2019","unstructured":"Wu S, Du J. Electronic medical record security sharing model based on blockchain . In: Proc. of the 3rd Int'l Conf. on Cryptography, Security and Privacy (ICCSP 2019 ). New York : ACM, 2019 . 13\u221217. Wu S, Du J. Electronic medical record security sharing model based on blockchain. In: Proc. of the 3rd Int'l Conf. on Cryptography, Security and Privacy (ICCSP 2019). New York: ACM, 2019. 13\u221217."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00183"},{"key":"e_1_3_2_1_11_1","volume-title":"Blockchain Based Data Integrity Service Framework for IoT Data. IEEE International Conference on Web Services. IEEE","author":"L Y","year":"2017","unstructured":"Liu B, Xiao L Y , Chen S , Blockchain Based Data Integrity Service Framework for IoT Data. IEEE International Conference on Web Services. IEEE , 2017 . Liu B, Xiao L Y, Chen S, Blockchain Based Data Integrity Service Framework for IoT Data. IEEE International Conference on Web Services. IEEE, 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE ICDE","author":"Zhang C.","year":"2019","unstructured":"C. Zhang , C. Xu , J. Xu , Y. Tang , and B. Choi , \u201c GEM2 -Tree: A gas efficient structure for authenticated range queries in blockchain ,\u201d in IEEE ICDE , 2019 . C. Zhang, C. Xu, J. Xu, Y. Tang, and B. Choi, \u201cGEM2 -Tree: A gas efficient structure for authenticated range queries in blockchain,\u201d in IEEE ICDE, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"Crete","author":"C.","year":"2021","unstructured":"C. Zhang*, C. Xu*, H. Wang , J. Xu , and B. Choi . \" Authenticated Keyword Search in Scalable Hybrid-Storage Blockchains.\" Proc. the 37th IEEE International Conference on Data Engineering (ICDE '21) , Crete , Greece , 2021 . C. Zhang*, C. Xu*, H. Wang, J. Xu, and B. Choi. \"Authenticated Keyword Search in Scalable Hybrid-Storage Blockchains.\" Proc. the 37th IEEE International Conference on Data Engineering (ICDE '21), Crete, Greece, 2021."},{"key":"e_1_3_2_1_14_1","first-page":"238","volume-title":"CRYPTO","author":"Merkle R. C.","year":"1989","unstructured":"R. C. Merkle . A certified digital signature . In CRYPTO , pages 218\u2013 238 , 1989 . R. C. Merkle. A certified digital signature. In CRYPTO, pages 218\u2013238, 1989."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687666"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497474"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-012-0271-0"},{"issue":"4","key":"e_1_3_2_1_18_1","first-page":"585","article-title":"Ir-tree: An efficient index for geographic document search","volume":"23","author":"Li Z.","year":"2011","unstructured":"Z. Li , K. C. K. Lee , B. Zheng , W.-C. Lee , D. L. Lee , and X. Wang . Ir-tree: An efficient index for geographic document search . IEEE TKDE , 23 ( 4 ): 585 \u2013 599 , 2011 . Z. Li, K. C. K. Lee, B. Zheng, W.-C. Lee, D. L. Lee, and X. Wang. Ir-tree: An efficient index for geographic document search. IEEE TKDE, 23(4):585\u2013599, 2011.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22922-0_13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342636"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319883"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342632"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389693"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3397230.3397231"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761146"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559849"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453875"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300083"}],"event":{"name":"ICBCT'22: The 2022 4th International Conference on Blockchain Technology","acronym":"ICBCT'22","location":"Shanghai China"},"container-title":["The 2022 4th International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532640.3532644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:04Z","timestamp":1750182664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":31,"alternative-id":["10.1145\/3532640.3532644","10.1145\/3532640"],"URL":"https:\/\/doi.org\/10.1145\/3532640.3532644","relation":{},"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}