{"id":"https://openalex.org/W4403826929","doi":"https://doi.org/10.1109/tce.2024.3486157","title":"Secure and Efficient Blockchain-Based Access Control Scheme With Attribute Update","display_name":"Secure and Efficient Blockchain-Based Access Control Scheme With Attribute Update","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4403826929","doi":"https://doi.org/10.1109/tce.2024.3486157"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2024.3486157","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3486157","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026353060","display_name":"Yuting Zuo","orcid":"https://orcid.org/0000-0002-2783-8351"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuting Zuo","raw_affiliation_strings":["College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030884513","display_name":"Li Xu","orcid":"https://orcid.org/0000-0002-8972-3373"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","School of Electronic Information and Electrical Engineering, and the Intelligent Big Data System Lab, Shanghai Jiao Tong University, Shanghai, China","College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, and the Intelligent Big Data System Lab, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679241","display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-4974-6116"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","School of Electronic Information and Electrical Engineering, and the Intelligent Big Data System Lab, Shanghai Jiao Tong University, Shanghai, China","School of Electronic Information and Electrical Engineering and Intelligent Big Data System (iBDSys) Lab, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, and the Intelligent Big Data System Lab, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering and Intelligent Big Data System (iBDSys) Lab, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101888309","display_name":"Xiaoding Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoding Wang","raw_affiliation_strings":["College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047578139","display_name":"Md. Jalil Piran","orcid":"https://orcid.org/0000-0003-3229-6785"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Md. Jalil Piran","raw_affiliation_strings":["Department of Computer Science and Engineering, Sejong University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sejong University, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5026353060"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":5.5468,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.95734209,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"71","issue":"1","first_page":"1539","last_page":"1550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8660482168197632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6682234406471252},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6521046757698059},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5243894457817078},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4651888906955719},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4360145628452301},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3977983593940735}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8660482168197632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6682234406471252},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6521046757698059},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5243894457817078},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4651888906955719},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4360145628452301},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3977983593940735},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2024.3486157","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3486157","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3051878211","display_name":null,"funder_award_id":"62471139","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G481413608","display_name":null,"funder_award_id":"2021L3032","funder_id":"https://openalex.org/F4320327832","funder_display_name":"Shantou Science and Technology Project"},{"id":"https://openalex.org/G4875579843","display_name":null,"funder_award_id":"U1905211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5426143635","display_name":null,"funder_award_id":"2022G02003","funder_id":"https://openalex.org/F4320327832","funder_display_name":"Shantou Science and Technology Project"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327832","display_name":"Shantou Science and Technology Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1510795740","https://openalex.org/W2019789301","https://openalex.org/W2048543827","https://openalex.org/W2579357702","https://openalex.org/W2593472119","https://openalex.org/W2621249842","https://openalex.org/W2903348560","https://openalex.org/W3037856732","https://openalex.org/W3041223433","https://openalex.org/W3119687955","https://openalex.org/W3135901748","https://openalex.org/W3136156468","https://openalex.org/W3165076188","https://openalex.org/W3166266336","https://openalex.org/W3184943777","https://openalex.org/W3187827945","https://openalex.org/W3198283894","https://openalex.org/W3212456559","https://openalex.org/W4220702665","https://openalex.org/W4220748246","https://openalex.org/W4224932126","https://openalex.org/W4285201318","https://openalex.org/W4292258978","https://openalex.org/W4293370874","https://openalex.org/W4294550730","https://openalex.org/W4296913371","https://openalex.org/W4309770047","https://openalex.org/W4312520007","https://openalex.org/W4364302695","https://openalex.org/W4367277154","https://openalex.org/W4377716570","https://openalex.org/W4381302977","https://openalex.org/W4384916364","https://openalex.org/W4385776789","https://openalex.org/W4387247661","https://openalex.org/W4388966693","https://openalex.org/W4389360633","https://openalex.org/W4391857816","https://openalex.org/W4392405520"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2989851257"],"abstract_inverted_index":{"Secure":[0],"data":[1],"access":[2,27,76],"control":[3,40,77],"is":[4,20,30,86,102,148],"widely":[5],"concerned":[6],"in":[7,150],"Cyber":[8],"Physical":[9],"Systems":[10],"(CPSs)":[11],"to":[12,36,64,88,104],"protect":[13],"consumer":[14,60],"rights.":[15],"Ciphertext-Policy":[16],"Attribute-Based":[17],"Encryption":[18],"(CP-ABE)":[19],"an":[21],"ideal":[22],"solution":[23],"that":[24,33,145],"supports":[25],"fine-grained":[26],"control.":[28],"It":[29],"a":[31,74],"pity":[32],"they":[34],"fail":[35],"consider":[37],"the":[38,42,51,90,94,106,119,126,137,146],"attribute":[39,80,95,114,128],"and":[41,68,112,124,131,154],"verifiable":[43],"legitimacy":[44],"when":[45],"consumer\u2019s":[46],"attributes":[47],"are":[48,56],"updated.":[49],"Additionally,":[50],"existing":[52],"revocable":[53],"CP-ABE":[54],"schemes":[55],"unsuitable":[57],"for":[58],"resource-constrained":[59],"electronic":[61],"devices":[62],"due":[63],"their":[65],"high":[66],"computational":[67],"storage":[69,122],"overhead.":[70],"This":[71,134],"paper":[72,117,135],"proposes":[73,125],"blockchain-based":[75],"scheme":[78,147],"with":[79],"update.":[81,96],"A":[82],"new":[83],"revocation":[84],"mechanism":[85],"designed":[87],"guarantee":[89],"forward/backward":[91],"security":[92,139],"of":[93,152],"The":[97,141],"lightweight":[98],"ciphertext":[99],"update":[100],"protocol":[101],"proposed":[103],"optimize":[105],"computation":[107],"cost.":[108],"To":[109],"realize":[110],"secure":[111],"efficient":[113,149],"management,":[115],"this":[116],"designs":[118],"on-chain/off-chain":[120],"separation":[121],"mode,":[123],"traceability-based":[127],"set":[129],"generation":[130],"validation":[132],"algorithm.":[133],"performs":[136],"formal":[138],"proof.":[140],"experimental":[142],"results":[143],"demonstrate":[144],"terms":[151],"encryption":[153],"decryption.":[155]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
