{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:20:24Z","timestamp":1760710824672,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"],"award-info":[{"award-number":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"],"award-info":[{"award-number":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tai\u2019an Science and Technology Innovation Development Project","award":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"],"award-info":[{"award-number":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"]}]},{"name":"Shandong Federation of Social Sciences","award":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"],"award-info":[{"award-number":["ZR2021QF056","62071320","61771090","2020NS080","2021-YYGL-32"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,1,15]]},"abstract":"<jats:p>Blockchain provides new technologies and ideas for the construction of agricultural product traceability system (APTS). However, if data is stored, supervised, and distributed on a multiparty equal blockchain, it will face major security risks, such as data privacy leakage, unauthorized access, and trust issues. How to protect the privacy of shared data has become a key factor restricting the implementation of this technology. We propose a secure and trusted agricultural product traceability system (BCST-APTS), which is supported by blockchain and CP-ABE encryption technology. It can set access control policies through data attributes and encrypt data on the blockchain. This can not only ensure the confidentiality of the data stored in the blockchain, but also set flexible access control policies for the data. In addition, a whole-chain attribute management infrastructure has been constructed, which can provide personalized attribute encryption services. Furthermore, a reencryption scheme based on ciphertext-policy attribute encryption (RE-CP-ABE) is proposed, which can meet the needs of efficient supervision and sharing of ciphertext data. Finally, the system architecture of the BCST-APTS is designed to successfully solve the problems of mutual trust, privacy protection, fine-grained, and personalized access control between all parties.<\/jats:p>","DOI":"10.1155\/2022\/2958963","type":"journal-article","created":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T18:20:06Z","timestamp":1642270806000},"page":"1-11","source":"Crossref","is-referenced-by-count":14,"title":["BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2064-3172","authenticated-orcid":true,"given":"Guofeng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Taishan University, Taian, Shandong 271000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8293-9633","authenticated-orcid":true,"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Taishan University, Taian, Shandong 271000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6235-7054","authenticated-orcid":true,"given":"Bin","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Taishan University, Taian, Shandong 271000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6457-0534","authenticated-orcid":true,"given":"Xuchao","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Information and Electrical Engineering, China Agricultural University, Beijing 100083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6817-1779","authenticated-orcid":true,"given":"Xia","family":"Hao","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Shandong Agricultural University, Taian, Shandong 271000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0679-3892","authenticated-orcid":true,"given":"Henggang","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Taishan University, Taian, Shandong 271000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2695-1141","authenticated-orcid":true,"given":"Chunyan","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Taishan University, Taian, Shandong 271000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6759-9738","authenticated-orcid":true,"given":"Yanan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, University of Jinan, Jinan, Shandong 250022, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1287\/opre.46.3.s35"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1287\/mnsc.46.8.1032.12029"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1002\/1520-6297(199511\/12)11:6<493::aid-agr2720110602>3.0.co;2-g"},{"key":"4","first-page":"78","article-title":"Pricing strategy of closed-loop supply chain considering competition under uncertain demand","volume":"32","author":"J. Gao","year":"2017","journal-title":"Journal of Systems Engineering"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.12133\/j.smartag.2019.1.1.201812-SA015"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1002\/int.22428"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1002\/int.22656"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.19363\/j.cnki.cn10-1380\/tn.2018.05.03"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/icsssm.2016.7538424"},{"issue":"22","key":"10","first-page":"323","article-title":"Data storage and query method of agricultural products traceability information based on blockchain","volume":"35","author":"X. Yang","year":"2019","journal-title":"Transactions of the Chinese Society of Agricultural Engineering"},{"issue":"6","key":"11","first-page":"1594","article-title":"Distributed Framework of SWIFT system based on permissioned blockchain","volume":"30","author":"J. Zhu","year":"2019","journal-title":"Journal of Software"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.ijpharm.2021.120235"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1002\/int.22666"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.6041\/j.issn.1000-1298.2017.S0.059"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1007\/s11831-020-09426-0"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/access.2021.3099037"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.11897\/SP.J.1016.2018.01005"},{"issue":"2","key":"18","first-page":"1","article-title":"Traceability permissioned chain consensus mechanism based on double-layer architecture","volume":"5","author":"Q. Ding","year":"2019","journal-title":"Journal of Network and Information Security"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/sose.2016.66"},{"issue":"6","key":"20","first-page":"1661","article-title":"Model for data access control and sharing based on blockchain","volume":"30","author":"X. Wang","year":"2019","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/wimob.2019.8923232"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.3390\/electronics9020285"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/tifs.2016.2581147"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/3390566.3391688"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/icebe.2017.35"},{"issue":"11","key":"26","first-page":"79","article-title":"Data security sharing method based on CP-ABE and blockchain","volume":"28","author":"S. Huang","year":"2019","journal-title":"Computer Systems & Applications"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/mc.2015.33"},{"issue":"8","key":"28","first-page":"25","article-title":"The application of blockchain in edge computing and IoT","volume":"9","author":"Z. Huang","year":"2018","journal-title":"Cyberspace Security"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/tifs.2021.3127023"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1007\/11426639_27"},{"author":"V. Goyal","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","key":"31"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1109\/SP.2007.11"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/2958963.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/2958963.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/2958963.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T18:20:25Z","timestamp":1642270825000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/2958963\/"}},"subtitle":[],"editor":[{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,15]]},"references-count":32,"alternative-id":["2958963","2958963"],"URL":"https:\/\/doi.org\/10.1155\/2022\/2958963","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2022,1,15]]}}}