{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:25Z","timestamp":1750220005096,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62136006, 62073215 and 61873166"],"award-info":[{"award-number":["62136006, 62073215 and 61873166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,25]]},"DOI":"10.1145\/3532640.3532655","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T14:04:53Z","timestamp":1657202693000},"page":"110-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Secure and Efficient Blockchain-Based Data Sharing Scheme for Location Data"],"prefix":"10.1145","author":[{"given":"Zirui","family":"Hu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Yuhan","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Jing","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Chengnian","family":"Long","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Dobre C. & Xhafa F. 2014. Intelligent services for big data science.\u00a0Future generation computer systems \u00a037 267-281. https:\/\/doi.org\/10.1016\/j.future.2013.07.014  Dobre C. & Xhafa F. 2014. Intelligent services for big data science.\u00a0Future generation computer systems \u00a037 267-281. https:\/\/doi.org\/10.1016\/j.future.2013.07.014","DOI":"10.1016\/j.future.2013.07.014"},{"key":"e_1_3_2_1_2_1","first-page":"201","volume-title":"MIS Quarterly Executive","author":"Lacity M C","year":"2018","unstructured":"Lacity M C . 2018 . Addressing key challenges to making enterprise blockchain applications a reality[J] . MIS Quarterly Executive , 2018, 17(3): 201 - 222 . Lacity M C. 2018. Addressing key challenges to making enterprise blockchain applications a reality[J]. MIS Quarterly Executive, 2018, 17(3): 201-222."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Liang X. Zhao J. Shetty S. Liu J. & Li D. 2017. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In\u00a02017 IEEE 28th annual international symposium on personal indoor and mobile radio communications (PIMRC)\u00a0(pp. 1-5). IEEE. https:\/\/doi.org\/10.1109\/PIMRC.2017.8292361  Liang X. Zhao J. Shetty S. Liu J. & Li D. 2017. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In\u00a02017 IEEE 28th annual international symposium on personal indoor and mobile radio communications (PIMRC)\u00a0(pp. 1-5). IEEE. https:\/\/doi.org\/10.1109\/PIMRC.2017.8292361","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Kang J. Yu R. Huang X. Wu M. Maharjan S. Xie S. & Zhang Y. 2018. Blockchain for secure and efficient data sharing in vehicular edge computing and networks.\u00a0IEEE Internet of Things Journal \u00a06(3) 4660-4670. https:\/\/doi.org\/10.1109\/JIOT.2018.2875542  Kang J. Yu R. Huang X. Wu M. Maharjan S. Xie S. & Zhang Y. 2018. Blockchain for secure and efficient data sharing in vehicular edge computing and networks.\u00a0IEEE Internet of Things Journal \u00a06(3) 4660-4670. https:\/\/doi.org\/10.1109\/JIOT.2018.2875542","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"e_1_3_2_1_5_1","first-page":"1749","volume":"2018","author":"Archer D W","unstructured":"Archer D W , Bogdanov D , Lindell Y , 2018. From keys to databases\u2014real-world applications of secure multi-party computation[J]. The Computer Journal , 2018 , 61(12): 1749 - 1771 . https:\/\/doi.org\/10.1093\/comjnl\/bxy090 Archer D W, Bogdanov D, Lindell Y, 2018. From keys to databases\u2014real-world applications of secure multi-party computation[J]. The Computer Journal, 2018, 61(12): 1749-1771. https:\/\/doi.org\/10.1093\/comjnl\/bxy090","journal-title":"The Computer Journal"},{"key":"e_1_3_2_1_6_1","volume-title":"Mona: Secure multi-owner data sharing for dynamic groups in the cloud.\u00a0IEEE transactions on parallel and distributed systems,\u00a024(6), 1182-1191. https:\/\/doi.org\/10.1109\/TPDS.2012.331","author":"Liu X.","year":"2012","unstructured":"Liu , X. , Zhang , Y. , Wang , B. , & Yan , J. 2012 . Mona: Secure multi-owner data sharing for dynamic groups in the cloud.\u00a0IEEE transactions on parallel and distributed systems,\u00a024(6), 1182-1191. https:\/\/doi.org\/10.1109\/TPDS.2012.331 Liu, X., Zhang, Y., Wang, B., & Yan, J. 2012. Mona: Secure multi-owner data sharing for dynamic groups in the cloud.\u00a0IEEE transactions on parallel and distributed systems,\u00a024(6), 1182-1191. https:\/\/doi.org\/10.1109\/TPDS.2012.331"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508174"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Guo H. Zhang Z. Xu J. An N. & Lan X. 2018. Accountable proxy re-encryption for secure data sharing.\u00a0IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2018.2877601  Guo H. Zhang Z. Xu J. An N. & Lan X. 2018. Accountable proxy re-encryption for secure data sharing.\u00a0IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2018.2877601","DOI":"10.1109\/TDSC.2018.2877601"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yang Y. Zhu H. Lu H. Weng J. Zhang Y. & Choo K. K. R. 2016. Cloud based data sharing with fine-grained proxy re-encryption.\u00a0Pervasive and Mobile computing \u00a028 122-134. https:\/\/doi.org\/10.1016\/j.pmcj.2015.06.017  Yang Y. Zhu H. Lu H. Weng J. Zhang Y. & Choo K. K. R. 2016. Cloud based data sharing with fine-grained proxy re-encryption.\u00a0Pervasive and Mobile computing \u00a028 122-134. https:\/\/doi.org\/10.1016\/j.pmcj.2015.06.017","DOI":"10.1016\/j.pmcj.2015.06.017"},{"key":"e_1_3_2_1_10_1","unstructured":"Paul A. Selvi S. S. D. & Rangan C. P. 2019. A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing.\u00a0IACR Cryptol. ePrint Arch. \u00a02019 1135.  Paul A. Selvi S. S. D. & Rangan C. P. 2019. A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing.\u00a0IACR Cryptol. ePrint Arch. \u00a02019 1135."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Liang K. Au M. H. Liu J. K. Susilo W. Wong D. S. Yang G. ... & Xie Q. 2014. A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing.\u00a0IEEE Transactions on Information Forensics and Security \u00a09(10) 1667-1680. https:\/\/doi.org\/10.1109\/TIFS.2014.2346023  Liang K. Au M. H. Liu J. K. Susilo W. Wong D. S. Yang G. ... & Xie Q. 2014. A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing.\u00a0IEEE Transactions on Information Forensics and Security \u00a09(10) 1667-1680. https:\/\/doi.org\/10.1109\/TIFS.2014.2346023","DOI":"10.1109\/TIFS.2014.2346023"},{"key":"e_1_3_2_1_12_1","unstructured":"AIGISSINOVA A. LE H. H. & YOKOTA H. 2020. Evaluation of the performance of secure keyword search using bit-string signatures in the blockchain.  AIGISSINOVA A. LE H. H. & YOKOTA H. 2020. Evaluation of the performance of secure keyword search using bit-string signatures in the blockchain."},{"volume-title":"Transport consortium chain","year":"2021","key":"e_1_3_2_1_13_1","unstructured":"\u201c Transport consortium chain ,\u201d [EB\/OL], https:\/\/github.com\/SJTU-DISLab\/Transport-Consortium-Chain Accessed September 13, 2021 \u201cTransport consortium chain,\u201d [EB\/OL], https:\/\/github.com\/SJTU-DISLab\/Transport-Consortium-Chain Accessed September 13, 2021"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"}],"event":{"name":"ICBCT'22: The 2022 4th International Conference on Blockchain Technology","acronym":"ICBCT'22","location":"Shanghai China"},"container-title":["The 2022 4th International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532640.3532655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:04Z","timestamp":1750182664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":14,"alternative-id":["10.1145\/3532640.3532655","10.1145\/3532640"],"URL":"https:\/\/doi.org\/10.1145\/3532640.3532655","relation":{},"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}