{"id":"https://openalex.org/W4389474225","doi":"https://doi.org/10.1109/jiot.2023.3340567","title":"Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things","display_name":"Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things","publication_year":2023,"publication_date":"2023-12-08","ids":{"openalex":"https://openalex.org/W4389474225","doi":"https://doi.org/10.1109/jiot.2023.3340567"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3340567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3340567","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031717657","display_name":"Fengqun Wang","orcid":"https://orcid.org/0000-0003-2465-7982"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengqun Wang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, the Anhui Engineering Laboratory of IoT Security Technologies, and the Institute of Physical Science and Information Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5031717657"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":4.5231,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.95795299,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"11","issue":"8","first_page":"14115","last_page":"14126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9335236549377441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7819696664810181},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.7573067545890808},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6394537687301636},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5888967514038086},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5641247630119324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5289841890335083},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4980762004852295},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46791747212409973},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46367570757865906},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44116345047950745},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.43374159932136536},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2698221206665039},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18083348870277405}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9335236549377441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7819696664810181},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.7573067545890808},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6394537687301636},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5888967514038086},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5641247630119324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5289841890335083},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4980762004852295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46791747212409973},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46367570757865906},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44116345047950745},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.43374159932136536},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2698221206665039},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18083348870277405},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3340567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3340567","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G167982814","display_name":null,"funder_award_id":"U23A20308","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1965058431","https://openalex.org/W2092335398","https://openalex.org/W2125943199","https://openalex.org/W2320470009","https://openalex.org/W2325737963","https://openalex.org/W2621249842","https://openalex.org/W2762579166","https://openalex.org/W2774002561","https://openalex.org/W2790332478","https://openalex.org/W2905357302","https://openalex.org/W2912480766","https://openalex.org/W2920289721","https://openalex.org/W2971569867","https://openalex.org/W2979779867","https://openalex.org/W3007218738","https://openalex.org/W3011576217","https://openalex.org/W3014230463","https://openalex.org/W3033227554","https://openalex.org/W3034788315","https://openalex.org/W3043320740","https://openalex.org/W3045040944","https://openalex.org/W3089096050","https://openalex.org/W3092142530","https://openalex.org/W3112700932","https://openalex.org/W3118241334","https://openalex.org/W3129114628","https://openalex.org/W3159116648","https://openalex.org/W3166793278","https://openalex.org/W3174986320","https://openalex.org/W3190161635","https://openalex.org/W3197697311","https://openalex.org/W3198924380","https://openalex.org/W4221166575","https://openalex.org/W4313555287","https://openalex.org/W4319068551","https://openalex.org/W4320015845","https://openalex.org/W4380839239"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W3216065934","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018"],"abstract_inverted_index":{"In":[0],"the":[1,13,59,76,87,91,94,113,123],"Industrial":[2],"Internet":[3],"of":[4,16,90],"Things":[5],"(IIoT),":[6],"data":[7,22,68,73,97,102],"sharing":[8],"is":[9,133],"crucial":[10],"for":[11],"promoting":[12],"intelligent":[14],"development":[15],"industrial":[17],"production.":[18],"To":[19],"achieve":[20],"effective":[21],"supervision,":[23],"introducing":[24],"blockchain":[25,120],"into":[26],"traditional":[27],"cloud-based":[28],"data-sharing":[29,38,52],"frameworks":[30],"has":[31],"attracted":[32],"widespread":[33],"attention.":[34],"However,":[35],"existing":[36],"blockchain-based":[37],"schemes":[39],"still":[40],"have":[41],"issues":[42],"with":[43],"security":[44,106,114],"and":[45,64,71,81],"efficiency.":[46,104],"Therefore,":[47],"we":[48,117],"propose":[49],"a":[50,119],"blockchain-enabled":[51],"scheme":[53,60,77,95,111,132],"based":[54],"on":[55],"proxy":[56],"re-encryption.":[57],"First,":[58],"considers":[61],"both":[62],"storage":[63,84,88,103],"access":[65],"authentication,":[66],"guaranteeing":[67],"sources\u2019":[69],"trustworthiness":[70],"preventing":[72],"misuse.":[74],"Second,":[75],"uses":[78],"an":[79],"on-chain":[80],"off-chain":[82],"cooperative":[83],"mechanism,":[85],"saving":[86],"resources":[89],"blockchain.":[92],"Third,":[93],"supports":[96],"packing,":[98],"which":[99],"effectively":[100],"improves":[101],"The":[105,126],"analysis":[107],"shows":[108,129],"that":[109,130],"our":[110,131],"satisfies":[112],"requirements.":[115],"Finally,":[116],"build":[118],"platform":[121],"using":[122],"hyperledger":[124],"fabric.":[125],"performance":[127],"evaluation":[128],"more":[134],"advantageous":[135],"regarding":[136],"computational":[137],"overhead":[138],"than":[139],"other":[140],"related":[141],"schemes.":[142]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
