{"id":"https://openalex.org/W3017048894","doi":"https://doi.org/10.1109/tits.2020.2983466","title":"Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain","display_name":"Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain","publication_year":2020,"publication_date":"2020-04-16","ids":{"openalex":"https://openalex.org/W3017048894","doi":"https://doi.org/10.1109/tits.2020.2983466","mag":"3017048894"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2020.2983466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2020.2983466","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006107599","display_name":"Qinglei Kong","orcid":"https://orcid.org/0000-0002-9740-0240"},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinglei Kong","raw_affiliation_strings":["Future Network of Intelligence Institute (FNii), The Chinese University of Hong Kong at Shenzhen, Shenzhen, China","[Future Network of Intelligence Institute (FNii), The Chinese University of Hong Kong at Shenzhen, Shenzhen, China]"],"affiliations":[{"raw_affiliation_string":"Future Network of Intelligence Institute (FNii), The Chinese University of Hong Kong at Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I4210116924"]},{"raw_affiliation_string":"[Future Network of Intelligence Institute (FNii), The Chinese University of Hong Kong at Shenzhen, Shenzhen, China]","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100907836","display_name":"Le Su","orcid":"https://orcid.org/0009-0007-1592-1477"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Le Su","raw_affiliation_strings":["Nanyang Technological University, Singapore","Nanyang Technological University; Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University; Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["Nanyang Technological University, Singapore","Nanyang Technological University; Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University; Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006107599"],"corresponding_institution_ids":["https://openalex.org/I4210116924"],"apc_list":null,"apc_paid":null,"fwci":4.6236,"has_fulltext":false,"cited_by_count":69,"citation_normalized_percentile":{"value":0.95536652,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"22","issue":"8","first_page":"4889","last_page":"4898"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7698496580123901},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7541388273239136},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.587006151676178},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5688499808311462},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5644338130950928},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5245062112808228},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5061232447624207},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5023353099822998},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4991285800933838},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4568536877632141},{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.43130603432655334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4305553138256073},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4228218197822571},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4187723696231842},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41141289472579956},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4026290476322174},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2391972839832306},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.22926652431488037},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10518133640289307},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09168779850006104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7698496580123901},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7541388273239136},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.587006151676178},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5688499808311462},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5644338130950928},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5245062112808228},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5061232447624207},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5023353099822998},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4991285800933838},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4568536877632141},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.43130603432655334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4305553138256073},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4228218197822571},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4187723696231842},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41141289472579956},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4026290476322174},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2391972839832306},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.22926652431488037},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10518133640289307},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09168779850006104},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tits.2020.2983466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2020.2983466","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/160347","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/160347","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1798609567","https://openalex.org/W1832688593","https://openalex.org/W1977656351","https://openalex.org/W2033667833","https://openalex.org/W2053810140","https://openalex.org/W2055817410","https://openalex.org/W2061598619","https://openalex.org/W2079838248","https://openalex.org/W2118886234","https://openalex.org/W2121247918","https://openalex.org/W2126043280","https://openalex.org/W2128628587","https://openalex.org/W2131924466","https://openalex.org/W2135840460","https://openalex.org/W2139910984","https://openalex.org/W2343050074","https://openalex.org/W2430154064","https://openalex.org/W2472333518","https://openalex.org/W2591915039","https://openalex.org/W2594028680","https://openalex.org/W2620276187","https://openalex.org/W2625826519","https://openalex.org/W2731079083","https://openalex.org/W2749247755","https://openalex.org/W2766497172","https://openalex.org/W2803109435","https://openalex.org/W2898082692","https://openalex.org/W2902765948","https://openalex.org/W2907165388","https://openalex.org/W2919985578","https://openalex.org/W2963159546","https://openalex.org/W4248175462"],"related_works":["https://openalex.org/W2384216712","https://openalex.org/W54013283","https://openalex.org/W2766497172","https://openalex.org/W2954812164","https://openalex.org/W4388087842","https://openalex.org/W4380533155","https://openalex.org/W2382204082","https://openalex.org/W2352780961","https://openalex.org/W4389690957","https://openalex.org/W3001342270"],"abstract_inverted_index":{"Vehicular":[0],"sensing":[1,22],"is":[2],"advocated":[3],"to":[4,37,135,147,182],"perform":[5],"data":[6,43,64,83,97,140],"collection":[7,84,98],"by":[8,100],"exploiting":[9,203],"a":[10,89,144,200],"plethora":[11],"of":[12,20,56,62,123,128,154,165,171,186],"vehicular":[13,21,41,66,93,131],"on-board":[14],"sensors;":[15],"meanwhile,":[16],"with":[17,88,199],"the":[18,26,45,57,96,102,118,124,129,155,162,166,184,187],"merging":[19],"and":[23,39,59,80,85,109,120,126,138,151,176,194],"fog":[24,35],"computing,":[25],"deployed":[27],"road":[28],"side":[29],"units":[30],"(RSUs)":[31],"can":[32],"act":[33],"as":[34],"nodes":[36],"collect":[38],"share":[40],"sensory":[42,63,82,132,157],"at":[44],"network":[46],"edge.":[47],"However,":[48],"there":[49],"are":[50,180],"still":[51],"several":[52],"problems":[53],"in":[54,65,72,92,169,192,197],"terms":[55,170],"secure":[58,119],"reliable":[60,139],"sharing":[61,86],"fog.":[67,94],"To":[68],"resolve":[69],"these":[70],"issues,":[71],"this":[73],"paper,":[74],"we":[75,142],"present":[76],"an":[77,110,149],"efficient,":[78],"privacy-preserving":[79],"verifiable":[81,121],"scheme":[87,116,201],"permissioned":[90,145],"blockchain":[91,146],"During":[95],"phase,":[99],"combining":[101],"homomorphic":[103],"2-DNF":[104],"(Disjunctive":[105],"Normal":[106],"Form)":[107],"cryptosystem":[108],"identity-based":[111],"signcryption":[112],"scheme,":[113,168,189],"our":[114],"proposed":[115,167,188],"achieves":[117],"computation":[122,193],"average":[125],"variance":[127],"collected":[130],"data.":[133,158],"Meanwhile,":[134],"achieve":[136],"efficient":[137],"sharing,":[141],"exploit":[143],"maintain":[148],"immutable":[150],"tamper-proof":[152],"record":[153],"derived":[156],"Security":[159],"analysis":[160],"demonstrates":[161],"security":[163],"properties":[164],"location":[172],"privacy":[173],"preservation,":[174],"verifiability":[175],"immutability.":[177],"Performance":[178],"evaluations":[179],"conducted":[181],"validate":[183],"efficiency":[185,196],"i.e.,":[190],"improvements":[191],"communication":[195],"comparison":[198],"without":[202],"blockchain.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
