{"id":"https://openalex.org/W4406858712","doi":"https://doi.org/10.1109/tifs.2025.3534563","title":"Anonymous and Efficient (<i>t, n</i>)-Threshold Ownership Transfer for Cloud EMRs Auditing","display_name":"Anonymous and Efficient (<i>t, n</i>)-Threshold Ownership Transfer for Cloud EMRs Auditing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406858712","doi":"https://doi.org/10.1109/tifs.2025.3534563"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3534563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3534563","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044489631","display_name":"Yamei Wang","orcid":"https://orcid.org/0009-0003-8560-0194"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yamei Wang","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100762148","display_name":"Yuexin Zhang","orcid":"https://orcid.org/0000-0002-3882-7041"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuexin Zhang","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073974408","display_name":"Ayong Ye","orcid":"https://orcid.org/0000-0002-2606-5406"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ayong Ye","raw_affiliation_strings":["College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081805488","display_name":"Derui Wang","orcid":"https://orcid.org/0000-0003-1388-7715"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Derui Wang","raw_affiliation_strings":["Data61, CSIRO, Marsfield, NSW, Australia","CSIRO&#x2019;s Data61, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Marsfield, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"CSIRO&#x2019;s Data61, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia","Swinburne University of Technology, Australia"],"affiliations":[{"raw_affiliation_string":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Swinburne University of Technology, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044489631"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":8.5798,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96658014,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"1710","last_page":"1723"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.701920211315155},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6433378458023071},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.6148660778999329},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4305275082588196},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.18735533952713013},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.18392235040664673},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12165823578834534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.701920211315155},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6433378458023071},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.6148660778999329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4305275082588196},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.18735533952713013},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.18392235040664673},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12165823578834534}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3534563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3534563","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1412727992","display_name":null,"funder_award_id":"61902283","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2351304197","display_name":null,"funder_award_id":"U21A20465","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3965561246","display_name":null,"funder_award_id":"2023J01534","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1582713334","https://openalex.org/W1885156594","https://openalex.org/W1980461171","https://openalex.org/W1994788755","https://openalex.org/W2038704326","https://openalex.org/W2065726143","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2261354470","https://openalex.org/W2293635076","https://openalex.org/W2310212673","https://openalex.org/W2518462489","https://openalex.org/W2578477031","https://openalex.org/W2579459581","https://openalex.org/W2581692541","https://openalex.org/W2585855180","https://openalex.org/W2611557754","https://openalex.org/W2765448309","https://openalex.org/W2888971196","https://openalex.org/W2908825189","https://openalex.org/W2961017266","https://openalex.org/W3011462710","https://openalex.org/W3037440387","https://openalex.org/W3085589753","https://openalex.org/W3113856710","https://openalex.org/W3174410876","https://openalex.org/W3195414805","https://openalex.org/W4210426740","https://openalex.org/W4288057692","https://openalex.org/W4310022506","https://openalex.org/W4313168746","https://openalex.org/W4367146820","https://openalex.org/W4368232621","https://openalex.org/W4379382407","https://openalex.org/W4381735776","https://openalex.org/W4384518886","https://openalex.org/W4385696607","https://openalex.org/W4385998044","https://openalex.org/W4386032667"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919"],"abstract_inverted_index":{"In":[0,26],"cloud":[1,66],"Electronic":[2],"Medical":[3],"Records":[4],"(EMRs),":[5],"health-related":[6],"private":[7],"information":[8],"such":[9],"as":[10],"genetics":[11],"and":[12,35,61,115,146],"diseases":[13],"is":[14,84,94],"contained.":[15],"Thus,":[16],"the":[17,74,104,111,127],"secure":[18,60],"ownership":[19,63,133],"transfer":[20,64,134],"protocol":[21,72,118,130],"should":[22],"protect":[23],"users\u2019":[24],"privacy.":[25],"certain":[27],"scenarios,":[28],"some":[29],"users,":[30],"including":[31,140],"patients,":[32],"doctors,":[33],"medical":[34],"research":[36],"institutions,":[37],"may":[38],"be":[39,47],"offline.":[40],"As":[41],"a":[42,59,91,120],"result,":[43],"existing":[44],"protocols":[45],"cannot":[46],"directly":[48],"employed.":[49],"Motivated":[50],"by":[51],"these":[52],"observations,":[53],"in":[54],"this":[55],"paper":[56],"we":[57],"propose":[58],"efficient":[62],"for":[65],"EMRs":[67],"auditing":[68],"protocol.":[69],"Specifically,":[70],"our":[71,107,117,129],"allows":[73],"existence":[75],"of":[76,106,113],"offline":[77],"users":[78,81],"while":[79,136],"ensuring":[80],"anonymity,":[82,145],"it":[83],"achieved":[85],"using":[86],"different":[87],"signature":[88],"constructions.":[89],"Additionally,":[90],"tracing":[92],"mechanism":[93],"introduced":[95],"to":[96,126],"safeguard":[97],"against":[98],"malicious":[99],"users.":[100],"We":[101],"rigorously":[102],"prove":[103],"security":[105],"protocol,":[108],"comprehensively":[109],"evaluate":[110],"performance":[112],"it,":[114],"compare":[116],"with":[119],"few":[121],"closely":[122],"relevant":[123],"protocols.":[124],"According":[125],"evaluations,":[128],"significantly":[131],"improves":[132],"efficiency":[135],"achieving":[137],"additional":[138],"functionalities,":[139],"public":[141],"verifiability,":[142],"multi-ownership":[143],"transferability,":[144],"traceability.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-01-28T00:00:00"}
