{"id":"https://openalex.org/W4320009796","doi":"https://doi.org/10.1109/jiot.2023.3242959","title":"Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol","display_name":"Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol","publication_year":2023,"publication_date":"2023-02-07","ids":{"openalex":"https://openalex.org/W4320009796","doi":"https://doi.org/10.1109/jiot.2023.3242959"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3242959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3242959","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023297521","display_name":"Zhiwei Wang","orcid":"https://orcid.org/0000-0003-2932-890X"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiwei Wang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, Guizhou University, Guizhou, China","School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","Yunan Key Laboratory of Blockchain Application Technology, Yunnan Innovation Research Institute of Beijing University of Aeronautics and Astronautics, Kunming, China","Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu University of Information Engineering, Chengdu, China","State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guizhou, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Yunan Key Laboratory of Blockchain Application Technology, Yunnan Innovation Research Institute of Beijing University of Aeronautics and Astronautics, Kunming, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu University of Information Engineering, Chengdu, China","institution_ids":["https://openalex.org/I4210125143"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100738365","display_name":"Qingqing Chen","orcid":"https://orcid.org/0000-0003-2268-1938"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingqing Chen","raw_affiliation_strings":["School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100349530","display_name":"Lei Liu","orcid":"https://orcid.org/0009-0003-3674-7237"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023297521"],"corresponding_institution_ids":["https://openalex.org/I178232147","https://openalex.org/I19820366","https://openalex.org/I41198531","https://openalex.org/I4210125143","https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":4.5231,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.95614121,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"12","first_page":"10698","last_page":"10707"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8329544067382812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7139669060707092},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.6363471150398254},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5564447641372681},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5457016229629517},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5169012546539307},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.47945964336395264},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47484949231147766},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45364663004875183},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42697805166244507},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4140147566795349},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.37182846665382385},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3694177269935608},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3628184199333191}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8329544067382812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7139669060707092},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.6363471150398254},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5564447641372681},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5457016229629517},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5169012546539307},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.47945964336395264},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47484949231147766},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45364663004875183},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42697805166244507},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4140147566795349},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.37182846665382385},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3694177269935608},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3628184199333191},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3242959","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3242959","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1811930942","display_name":null,"funder_award_id":"202103AN080001-001","funder_id":"https://openalex.org/F4320336602","funder_display_name":"Major Science and Technology Projects in Yunnan Province"}],"funders":[{"id":"https://openalex.org/F4320336602","display_name":"Major Science and Technology Projects in Yunnan Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W827005847","https://openalex.org/W1888254701","https://openalex.org/W2013686252","https://openalex.org/W2096210558","https://openalex.org/W2108834246","https://openalex.org/W2111619626","https://openalex.org/W2284345771","https://openalex.org/W2292275324","https://openalex.org/W2293540181","https://openalex.org/W2394843291","https://openalex.org/W2470694705","https://openalex.org/W2486460265","https://openalex.org/W2616854319","https://openalex.org/W2785733381","https://openalex.org/W2789397092","https://openalex.org/W2811112224","https://openalex.org/W2876503617","https://openalex.org/W2980126319","https://openalex.org/W3005766641","https://openalex.org/W3013097088","https://openalex.org/W3023180901","https://openalex.org/W3116406931","https://openalex.org/W3187997040","https://openalex.org/W3196662786","https://openalex.org/W4312543091","https://openalex.org/W6636797535","https://openalex.org/W6719987976"],"related_works":["https://openalex.org/W2186398450","https://openalex.org/W2167029309","https://openalex.org/W2369414339","https://openalex.org/W1577059718","https://openalex.org/W2884819388","https://openalex.org/W1993515019","https://openalex.org/W2223135139","https://openalex.org/W2363815311","https://openalex.org/W4387407403","https://openalex.org/W2896571552"],"abstract_inverted_index":{"In":[0,19],"this":[1,20],"Internet":[2],"of":[3,10,61,74,98,134,182],"Things":[4],"era,":[5],"privacy":[6,96],"preserving":[7],"is":[8,123,161],"one":[9],"the":[11,32,39,44,48,54,59,65,71,80,87,91,99,111,115,131,135,140,149,165,172,179,183,190,192,195,199,203,206],"most":[12],"vital":[13],"barriers":[14],"for":[15,57],"personal":[16],"data":[17,28,75,100,121,136,141,166],"sharing.":[18],"article,":[21],"we":[22,102],"present":[23],"a":[24,120],"secure":[25,92],"and":[26,64,95,114,138,153,171,198,202],"privacy-preserving":[27],"sharing":[29],"protocol":[30,85,188],"over":[31,189],"permissioned":[33,62],"blockchains":[34],"which":[35,109,175],"require":[36],"to":[37,52,118,163,177],"certificate":[38],"users":[40],"before":[41],"they":[42],"submit":[43],"transactions.":[45],"We":[46,77,185],"use":[47],"structure-preserving":[49],"Groth":[50],"signature":[51],"construct":[53],"anonymous":[55,66,81,106],"credentials":[56,67],"satisfying":[58],"requirement":[60],"blockchains,":[63],"does":[68,143],"not":[69,144],"disclose":[70],"real":[72,132],"identities":[73],"owners.":[76],"prove":[78],"that":[79],"credential":[82],"in":[83,148],"our":[84,187],"achieves":[86],"ideal":[88],"functionality.":[89],"For":[90],"access":[93,150,168],"control":[94,151,169],"protection":[97],"accessors,":[101],"propose":[103],"an":[104],"efficiently":[105],"authentication":[107],"scheme":[108],"utilizes":[110],"ElGamal":[112],"commitment":[113],"one-out-of-many":[116],"proof":[117],"ensure":[119],"accessor":[122],"authorized,":[124],"but":[125],"any":[126],"unauthorized":[127],"entities":[128],"cannot":[129],"learn":[130],"identity":[133],"accessor,":[137],"even":[139],"owner":[142],"know":[145],"who":[146],"(although":[147],"list)":[152],"when":[154],"downloads":[155],"his/her":[156],"data.":[157],"The":[158],"blockchain":[159],"platform":[160],"used":[162],"record":[164],"storing,":[167],"list,":[170],"storage":[173],"addresses,":[174],"helps":[176],"enhance":[178],"security":[180],"level":[181],"protocol.":[184],"implement":[186],"ThinkPad,":[191],"RaspBerry":[193],"Pi,":[194],"Huawei":[196],"cloud,":[197],"Hyperledger":[200],"Fabric,":[201],"experiments":[204],"show":[205],"good":[207],"performances.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
