{"id":"https://openalex.org/W4385471251","doi":"https://doi.org/10.1186/s13677-023-00486-8","title":"An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain","display_name":"An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain","publication_year":2023,"publication_date":"2023-08-01","ids":{"openalex":"https://openalex.org/W4385471251","doi":"https://doi.org/10.1186/s13677-023-00486-8"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00486-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00486-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00486-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00486-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082587353","display_name":"Somchart Fugkeaw","orcid":"https://orcid.org/0000-0001-7156-184X"},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Somchart Fugkeaw","raw_affiliation_strings":["Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, 12000, Thailand"],"affiliations":[{"raw_affiliation_string":"Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, 12000, Thailand","institution_ids":["https://openalex.org/I108108428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5082587353"],"corresponding_institution_ids":["https://openalex.org/I108108428"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.0595,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81366869,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12149","display_name":"Nanocluster Synthesis and Applications","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8039246797561646},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6806471347808838},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.649918258190155},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6063871383666992},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5973902344703674},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5905195474624634},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5436044335365295},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5160017013549805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4883517920970917},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4238024353981018},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.41208532452583313},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3825448155403137},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37141114473342896},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20747634768486023},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.20131763815879822},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14420461654663086}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8039246797561646},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6806471347808838},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.649918258190155},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6063871383666992},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5973902344703674},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5905195474624634},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5436044335365295},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5160017013549805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4883517920970917},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4238024353981018},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.41208532452583313},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3825448155403137},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37141114473342896},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20747634768486023},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.20131763815879822},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14420461654663086},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-023-00486-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00486-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00486-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:db3272103cd74f1f8828c07d86bb528a","is_oa":true,"landing_page_url":"https://doaj.org/article/db3272103cd74f1f8828c07d86bb528a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-14 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00486-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00486-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00486-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385471251.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1638747471","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2804900363","https://openalex.org/W2805711435","https://openalex.org/W2907212274","https://openalex.org/W2915600598","https://openalex.org/W2946008609","https://openalex.org/W2948074879","https://openalex.org/W2964258141","https://openalex.org/W2982223078","https://openalex.org/W3003811098","https://openalex.org/W3015421697","https://openalex.org/W3027138609","https://openalex.org/W3046966467","https://openalex.org/W3049014197","https://openalex.org/W3082692902","https://openalex.org/W3088123725","https://openalex.org/W3194490200","https://openalex.org/W3198878493","https://openalex.org/W3201037927","https://openalex.org/W4205207211","https://openalex.org/W4205847564","https://openalex.org/W4213080544","https://openalex.org/W4226176725","https://openalex.org/W4226244194","https://openalex.org/W4285166113","https://openalex.org/W4323914546"],"related_works":["https://openalex.org/W2788225348","https://openalex.org/W2553096087","https://openalex.org/W2530459946","https://openalex.org/W2125192202","https://openalex.org/W2282054813","https://openalex.org/W1663161527","https://openalex.org/W2147871863","https://openalex.org/W4206042844","https://openalex.org/W4212948454","https://openalex.org/W1516622814"],"abstract_inverted_index":{"Abstract":[0],"Implementing":[1],"a":[2,50,89,98,115,150,166],"trust":[3],"and":[4,28,66,102,112,131,135,143,159,177,201,212],"secure":[5,25,130,178],"immunity":[6],"or":[7],"vaccine":[8,108,184],"passport":[9,109,185],"verification":[10,29],"system":[11,19,46],"is":[12,209],"now":[13],"crucial":[14],"for":[15,63,106],"many":[16],"countries.":[17],"The":[18],"typically":[20],"aims":[21],"to":[22,44,74,96,128,139,174],"enable":[23,175],"the":[24,41,45,57,60,67,71,122,137,161,169,182,187,194,202],"access":[26,55,72,104,133,141],"control":[27,105,134],"of":[30,53,59,117,168,181],"vaccination":[31],"records":[32],"which":[33],"will":[34],"be":[35],"used":[36],"by":[37,81],"trusted":[38,75],"parties.":[39],"However,":[40],"issues":[42],"related":[43,215],"scalability":[47],"in":[48,69,197],"supporting":[49],"large":[51],"number":[52],"data":[54,64,110,145],"requests,":[56],"enforcement":[58],"user":[61],"consent":[62],"sharing,":[65],"flexibility":[68],"delegating":[70],"capability":[73],"parties":[76],"have":[77],"not":[78],"been":[79],"resolved":[80],"existing":[82],"works.":[83,216],"In":[84],"this":[85],"paper,":[86],"we":[87,120,148,192],"propose":[88,149],"Universal":[90],"Vaccine":[91],"Passport":[92],"Verification":[93],"System":[94],"(UniVAC)":[95],"support":[97,129],"decentralized,":[99],"scalable,":[100],"secure,":[101],"fine-grained,":[103],"Covid-19":[107],"sharing":[111],"verification.":[113],"At":[114],"core":[116],"our":[118,206],"scheme,":[119],"employ":[121],"ciphertext":[123,151,179],"policy":[124],"attribute-based":[125],"encryption":[126],"(CP-ABE)":[127],"fine-grained":[132],"use":[136],"blockchain":[138,157],"record":[140],"transactions":[142],"provide":[144],"indexing.":[146],"Furthermore,":[147],"retrieval":[152],"method":[153],"based":[154],"on":[155],"regional":[156],"segmentation":[158],"introduce":[160],"outsourced":[162],"CP-ABE":[163],"decryption":[164],"as":[165],"part":[167],"proxy":[170],"re-encryption":[171],"(PRE)":[172],"process":[173],"scalable":[176,213],"delivery":[180],"encrypted":[183],"under":[186],"requestor\u2019s":[188],"public":[189],"key.":[190],"Finally,":[191],"conducted":[193],"extensive":[195],"experiments":[196],"real":[198],"cloud":[199],"environment":[200],"results":[203],"showed":[204],"that":[205],"proposed":[207],"scheme":[208],"more":[210],"efficient":[211],"than":[214]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
