{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:15:13Z","timestamp":1763810113357,"version":"3.40.5"},"reference-count":35,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472310, U1536202, U1708262, 61672413, 61672415,"],"award-info":[{"award-number":["61472310, U1536202, U1708262, 61672413, 61672415,"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p> The crowdsourcing schemes which utilize the social network to solve complex tasks are an important part of open cooperation over the Internet. Although blockchain-based crowdsourcing schemes have considerable advantages in decentralization and data sharing, there is still a challenge to gurantee the security of crowdsourced-sensitive information and the fairness of crowdsourcing on the blockchain. To this end, this article investigates a crowdsourcing scheme based on blockchain. First, we define the basic requirements of blockchain-based crowdsourcing schemes including fairness, confidentiality, and integrity. And then, using secure hash, commitment, and homomorphic encryption, we propose a blockchain-based secure and fair crowdsourcing scheme, that is, BFC. The analysis results show that our scheme can satisfy the above requirements. Finally, the experimental results show that the computational overhead of the BFC scheme is acceptable to both the requester and the workers. In a word, our proposed crowdsourcing scheme has good expansibility in reality. <\/jats:p>","DOI":"10.1177\/1550147719864890","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T05:05:40Z","timestamp":1564635940000},"page":"155014771986489","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":18,"title":["Blockchain-based secure and fair crowdsourcing scheme"],"prefix":"10.1177","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1213-6031","authenticated-orcid":false,"given":"Junwei","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"given":"Wenxuan","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]}],"member":"179","published-online":{"date-parts":[[2019,8]]},"reference":[{"issue":"6","key":"bibr1-1550147719864890","first-page":"1","volume":"14","author":"Howe J","year":"2006","journal-title":"Wired Mag"},{"key":"bibr2-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084420"},{"key":"bibr3-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924442"},{"first-page":"766","volume-title":"Proceedings of IEEE third international conference on privacy, security, risk and trust and IEEE third international conference on social computing","author":"Yuen MC","key":"bibr4-1550147719864890"},{"key":"bibr5-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1177\/0165551512437638"},{"first-page":"10","volume-title":"Proceedings of the international conference on machine learning","author":"Shah N","key":"bibr6-1550147719864890"},{"first-page":"1231","volume-title":"Proceedings of IEEE INFOCOM 2014\u2014IEEE conference on computer communications","author":"Feng Z","key":"bibr7-1550147719864890"},{"key":"bibr8-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.016"},{"first-page":"187","volume-title":"Proceedings of the 36th international conference on software engineering","author":"Stol KJ","key":"bibr9-1550147719864890"},{"key":"bibr10-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7180511"},{"first-page":"1003","volume-title":"Proceedings of the ACM 2012 conference on computer supported cooperative work","author":"Kulkarni A","key":"bibr11-1550147719864890"},{"volume-title":"Blockchain: blueprint for a new economy","year":"2015","author":"Swan M","key":"bibr12-1550147719864890"},{"first-page":"101","volume-title":"Proceedings first international conference on peer-to-peer computing","author":"Schollmeier R","key":"bibr13-1550147719864890"},{"key":"bibr14-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0157-3"},{"key":"bibr15-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0998-2"},{"key":"bibr16-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2881735"},{"volume-title":"Proceedings of the 2018 IEEE 38th international conference on distributed computing systems (ICDCS)","author":"Lu Y","key":"bibr17-1550147719864890"},{"key":"bibr18-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"first-page":"1242","volume-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","author":"Wang D","key":"bibr19-1550147719864890"},{"key":"bibr20-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9436120"},{"key":"bibr21-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0056-2"},{"key":"bibr22-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2585121"},{"issue":"11","key":"bibr23-1550147719864890","volume":"11","author":"Liu X","year":"2016","journal-title":"IEEE Trans Inform Foren Secur"},{"issue":"11","key":"bibr24-1550147719864890","first-page":"1","volume":"58","author":"Zhang J","year":"2015","journal-title":"Sci China Inform Sci"},{"first-page":"169","volume-title":"Proceedings of the annual international conference on the theory and applications of cryptographic techniques","author":"Bendlin R","key":"bibr25-1550147719864890"},{"volume-title":"A fully homomorphic encryption scheme","year":"2009","author":"Gentry C","key":"bibr26-1550147719864890"},{"key":"bibr27-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"first-page":"371","volume-title":"Proceedings of the international workshop on fast software encryption","author":"Rogaway P","key":"bibr28-1550147719864890"},{"first-page":"28","volume-title":"Proceedings of the 6th ACM conference on computer and communications security, Kent Ridge Digital Labs","author":"Juels A","key":"bibr30-1550147719864890"},{"first-page":"238","volume-title":"Proceedings of the 24th international conference on World Wide Web, International World Wide Web Conferences Steering Committee","author":"Difallah DE","key":"bibr32-1550147719864890"},{"first-page":"7","volume-title":"Proceedings of the 2nd ACM SIGSPATIAL workshop on smart cities and urban analytics","author":"Rahimi S","key":"bibr34-1550147719864890"},{"key":"bibr35-1550147719864890","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2441031"},{"first-page":"2140","volume-title":"Proceedings IEEE INFOCOM","author":"Zhang Y","key":"bibr36-1550147719864890"},{"first-page":"386","volume-title":"Proceedings of the international conference on web engineering","author":"Buccafurri F","key":"bibr37-1550147719864890"},{"key":"bibr38-1550147719864890","first-page":"83","volume-title":"Data privacy management, and security assurance","author":"Tanas C","year":"2015"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719864890","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719864890","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719864890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T14:44:28Z","timestamp":1568904268000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719864890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":35,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2019,8]]},"published-print":{"date-parts":[[2019,7]]}},"alternative-id":["10.1177\/1550147719864890"],"URL":"https:\/\/doi.org\/10.1177\/1550147719864890","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}