{"id":"https://openalex.org/W2982578497","doi":"https://doi.org/10.1109/tdsc.2019.2949809","title":"Blockchain-Based Private Provable Data Possession","display_name":"Blockchain-Based Private Provable Data Possession","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2982578497","doi":"https://doi.org/10.1109/tdsc.2019.2949809","mag":"2982578497"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2019.2949809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2949809","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603435","display_name":"Qihua Wang","orcid":"https://orcid.org/0000-0001-9548-8683"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qihua Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I51185872","display_name":"Jining Medical University","ror":"https://ror.org/03zn9gq54","country_code":"CN","type":"education","lineage":["https://openalex.org/I51185872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Medical Information Engineering, Jining Medical University, Rizhao, China"],"affiliations":[{"raw_affiliation_string":"School of Medical Information Engineering, Jining Medical University, Rizhao, China","institution_ids":["https://openalex.org/I51185872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082859576"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":11.954,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.98506678,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7530249357223511},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5827032327651978},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.5376798510551453},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.44726553559303284},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44604623317718506},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4409584403038025},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.4309016466140747},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.41916725039482117},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38671553134918213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24702224135398865},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17913419008255005}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7530249357223511},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5827032327651978},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.5376798510551453},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.44726553559303284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44604623317718506},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4409584403038025},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4309016466140747},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.41916725039482117},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38671553134918213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24702224135398865},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17913419008255005},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2019.2949809","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2949809","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W179922057","https://openalex.org/W1589846406","https://openalex.org/W2010287286","https://openalex.org/W2013686672","https://openalex.org/W2014698831","https://openalex.org/W2022932831","https://openalex.org/W2027703952","https://openalex.org/W2040193872","https://openalex.org/W2043007983","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2154460143","https://openalex.org/W2169710852","https://openalex.org/W2499850541","https://openalex.org/W2531399364","https://openalex.org/W2557530247","https://openalex.org/W2603893109","https://openalex.org/W2605157201","https://openalex.org/W2606779297","https://openalex.org/W2620870214","https://openalex.org/W2736188416","https://openalex.org/W2743496573","https://openalex.org/W2793423901","https://openalex.org/W2794925686","https://openalex.org/W2801274750","https://openalex.org/W2801576183","https://openalex.org/W2907742243","https://openalex.org/W2908825189","https://openalex.org/W2926564180","https://openalex.org/W2943574610","https://openalex.org/W2946156608","https://openalex.org/W2956118876","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6635179120","https://openalex.org/W6738471554"],"related_works":["https://openalex.org/W4378191215","https://openalex.org/W4283649939","https://openalex.org/W3205903094","https://openalex.org/W2992709026","https://openalex.org/W1481767347","https://openalex.org/W2950393897","https://openalex.org/W3002053843","https://openalex.org/W3028820650","https://openalex.org/W4376602909","https://openalex.org/W3131243375"],"abstract_inverted_index":{"Remote":[0],"data":[1,16,24],"secure":[2],"storage":[3],"is":[4,26,75,93,138,163,178,206],"of":[5,35,51,72,89,135,141,168],"crucial":[6],"importance":[7],"in":[8],"cloud":[9],"computing.":[10],"In":[11,108,115],"order":[12,88,116],"to":[13,44,59,117],"check":[14],"remote":[15],"integrity,":[17],"an":[18],"important":[19],"paradigm":[20],"PDP":[21,31,106,125,161,176,204],"(i.e.,":[22],"provable":[23],"possession)":[25],"proposed.":[27],"All":[28],"the":[29,70,73,87,90,104,119,139,144,147,182,202],"existing":[30],"schemes":[32],"make":[33],"use":[34,134,167],"RSA":[36],"or":[37,78],"bilinear":[38],"pairings.":[39],"One":[40],"large":[41],"file":[42,57],"has":[43,58],"be":[45,60],"divided":[46,61],"into":[47,62],"a":[48,123,157],"great":[49],"many":[50],"blocks.":[52],"For":[53,143],"example,":[54],"1T":[55],"(Terabit)":[56],"<inline-formula><tex-math":[63,79],"notation=\"LaTeX\">$1.0737":[64],"\\times":[65,81],"10^9$</tex-math></inline-formula>":[66,82],"blocks":[67,83],"(RSA":[68],"where":[69,86],"length":[71],"index":[74],"1024":[76],"bits)":[77],"notation=\"LaTeX\">$6.8719":[80],"(bilinear":[84],"pairings":[85],"elliptic":[91],"curve":[92],"160":[94],"bits).":[95],"The":[96,130,172],"huge":[97],"computation":[98],"cost":[99,102],"and":[100,153,170,195,209],"communication":[101],"incurs":[103],"inefficient":[105],"implementation.":[107],"other":[109],"words,":[110],"they":[111],"are":[112],"not":[113],"practical.":[114,210],"solve":[118],"problem,":[120],"we":[121,185],"propose":[122],"new":[124,131,145],"model:":[126],"blockchain-based":[127,159,174],"private":[128,160,175],"PDP.":[129],"concept":[132],"makes":[133],"blockchain":[136,169],"which":[137],"core":[140],"cryptocurrency.":[142],"concept,":[146],"paper":[148],"formalizes":[149],"its":[150,188],"system":[151],"model":[152],"security":[154],"model.":[155],"Then,":[156],"concrete":[158],"scheme":[162,177,205],"designed":[164],"by":[165],"making":[166],"RSA.":[171],"proposed":[173,203],"provably":[179],"secure.":[180],"At":[181],"same":[183],"time,":[184],"also":[186],"analyze":[187],"performance":[189],"from":[190],"two":[191],"parts:":[192],"theory":[193],"analysis":[194,199],"implementation":[196],"prototype.":[197],"Our":[198],"shows":[200],"that":[201],"secure,":[207],"efficient":[208]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":4}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
