{"id":"https://openalex.org/W4280615745","doi":"https://doi.org/10.1109/wcnc51071.2022.9771976","title":"Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation","display_name":"Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation","publication_year":2022,"publication_date":"2022-04-10","ids":{"openalex":"https://openalex.org/W4280615745","doi":"https://doi.org/10.1109/wcnc51071.2022.9771976"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc51071.2022.9771976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc51071.2022.9771976","pdf_url":null,"source":{"id":"https://openalex.org/S4363607776","display_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102821467","display_name":"Sheng Cao","orcid":"https://orcid.org/0000-0001-5556-7854"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sheng Cao","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China","School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114378267","display_name":"Qian Zhang","orcid":"https://orcid.org/0000-0001-9205-1881"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Zhang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China","School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100446874","display_name":"Dongdong Wang","orcid":"https://orcid.org/0000-0002-5510-2536"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdong Wang","raw_affiliation_strings":["No.15 Research Institute of China Electronics Technology Group Corporation"],"affiliations":[{"raw_affiliation_string":"No.15 Research Institute of China Electronics Technology Group Corporation","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087006241","display_name":"Peng Xiangli","orcid":null},"institutions":[{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]},{"id":"https://openalex.org/I4210165125","display_name":"Fifth Gait Technologies (United States)","ror":"https://ror.org/05w58gm09","country_code":"US","type":"company","lineage":["https://openalex.org/I4210165125"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Peng Xiangli","raw_affiliation_strings":["The Fifth Electronic Research Institute of MIIT,China","The Fifth Electronic Research Institute of MIIT, China"],"affiliations":[{"raw_affiliation_string":"The Fifth Electronic Research Institute of MIIT,China","institution_ids":["https://openalex.org/I4210165125"]},{"raw_affiliation_string":"The Fifth Electronic Research Institute of MIIT, China","institution_ids":["https://openalex.org/I890469752"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China","School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Center for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102821467"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.437,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5912123,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9537000060081482,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9534000158309937,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.7180355787277222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6336526870727539},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.5925629734992981},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5573868155479431},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5569809079170227},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5465824007987976},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5217700600624084},{"id":"https://openalex.org/keywords/compensation","display_name":"Compensation (psychology)","score":0.5081014633178711},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.48914816975593567},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4735913872718811},{"id":"https://openalex.org/keywords/insurance-policy","display_name":"Insurance policy","score":0.4724460244178772},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4525430202484131},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.42417392134666443},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.36431849002838135},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34510958194732666},{"id":"https://openalex.org/keywords/actuarial-science","display_name":"Actuarial science","score":0.24370414018630981},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19627591967582703}],"concepts":[{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.7180355787277222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6336526870727539},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.5925629734992981},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5573868155479431},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5569809079170227},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5465824007987976},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5217700600624084},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.5081014633178711},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.48914816975593567},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4735913872718811},{"id":"https://openalex.org/C68799949","wikidata":"https://www.wikidata.org/wiki/Q977871","display_name":"Insurance policy","level":2,"score":0.4724460244178772},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4525430202484131},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.42417392134666443},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.36431849002838135},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34510958194732666},{"id":"https://openalex.org/C162118730","wikidata":"https://www.wikidata.org/wiki/Q1128453","display_name":"Actuarial science","level":1,"score":0.24370414018630981},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19627591967582703},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc51071.2022.9771976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc51071.2022.9771976","pdf_url":null,"source":{"id":"https://openalex.org/S4363607776","display_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W2496543269","https://openalex.org/W2517744317","https://openalex.org/W2533941064","https://openalex.org/W2726052863","https://openalex.org/W2795085730","https://openalex.org/W2914424007","https://openalex.org/W2948043589","https://openalex.org/W2978282230","https://openalex.org/W2982474429","https://openalex.org/W2982588734","https://openalex.org/W2984674716","https://openalex.org/W2989515460","https://openalex.org/W2990181228","https://openalex.org/W2998416486","https://openalex.org/W3014168583","https://openalex.org/W3042848129","https://openalex.org/W3046004324","https://openalex.org/W3089656219","https://openalex.org/W3090306331","https://openalex.org/W3151748982","https://openalex.org/W6768415072","https://openalex.org/W6770492946","https://openalex.org/W6793285265","https://openalex.org/W6891805332"],"related_works":["https://openalex.org/W4391375891","https://openalex.org/W3092702943","https://openalex.org/W4297798448","https://openalex.org/W4391241361","https://openalex.org/W4388187043","https://openalex.org/W4285161539","https://openalex.org/W2982625131","https://openalex.org/W4320715980","https://openalex.org/W3122124622","https://openalex.org/W3150062897"],"abstract_inverted_index":{"Large-scale":[0],"applications":[1],"of":[2,38,53,73,130],"electronic":[3],"medical":[4],"records":[5],"(EHRs)":[6],"based":[7,65,100],"on":[8,66,101,114],"blockchain":[9,43,119,152],"technology":[10],"have":[11],"prompted":[12],"us":[13],"to":[14,19,34,44,69,76,173],"find":[15],"an":[16,46,61],"intelligent":[17],"way":[18],"realize":[20,155],"insurance":[21,28,47,79,85,94],"compensation,":[22],"which":[23],"brings":[24],"convenience":[25],"for":[26],"both":[27],"companies":[29,86],"and":[30,75,87,108,117,133,151,159,168],"patients.":[31,88],"However,":[32],"due":[33],"the":[35,71,102,115,128],"public":[36,118,144],"verifiability":[37],"blockchains,":[39],"straightforward":[40],"utilizing":[41],"a":[42],"construct":[45],"compensation":[48,63,80,95,104],"scheme":[49,96,177],"would":[50],"cause":[51],"leakage":[52],"patients&#x2019;":[54],"privacy.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59,126,154],"propose":[60],"agent":[62,103,160],"model":[64],"smart":[67,91,110,124,145],"contract":[68,92,146],"guarantee":[70],"credibility":[72],"EHRs":[74],"enable":[77],"automatical":[78],"without":[81,162],"requiring":[82],"interactions":[83],"between":[84],"A":[89],"hybrid":[90],"privacy-preserving":[93],"is":[97,178],"put":[98],"forward":[99],"model.":[105],"The":[106],"\"private\"":[107],"\"public\"":[109],"contracts":[111],"are":[112,171],"deployed":[113],"private":[116,123,131,140],"respectively.":[120],"By":[121,142],"designing":[122],"contracts,":[125],"limit":[127],"visitors":[129],"data":[132,164],"prevent":[134],"third":[135],"parties":[136],"from":[137],"accessing":[138],"patient":[139],"data.":[141],"deploying":[143],"that":[147,175],"introduces":[148],"zero-knowledge":[149],"proof":[150],"oracles,":[153],"compensations":[156],"information":[157],"verification":[158],"payment":[161],"privacy":[163],"leakage.":[165],"Security":[166],"analysis":[167],"performance":[169],"evaluations":[170],"conducted":[172],"prove":[174],"our":[176],"secure":[179],"against":[180],"various":[181],"attacks":[182],"while":[183],"achieving":[184],"high":[185],"efficiency.":[186]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
