[1] Imran M, Ian Z, Mehran A, Justin L, Wei N,
et al. PrivySharing: A Blockchain-Based Frame
work for Privacy-Preserving and Secure Data S
haring in Smart Cities.[J], Computers & securit
y, 2019: 363-371.
[2] J. Wei, X. Chen, J. Wang, X. Huang, W. Susilo.
Securing Fine-Grained Data Sharing and Erasure
in
Outsourced
Storage
Systems[J].
IEEE
Transactions on Parallel and Distributed Systems,
2023, 34(2): 552-566.
[3] Wikipedia contributors. List of data breaches[E
B/OL]. (https://en.wikipedia.org/w/index.php?title
=List of data breaches&oldid=1225484109). 202
4/2024-05-26.
[4] Giovanna N. Vilaza, Jakob E. Bardram. Sharin
g Access to Behavioural and Personal Health
Data: Designers' Perspectives on Opportunities
and Barriers.[C], Pervasive Computing Technolo
gies for Healthcare, 2019, 2019, 346–350.
[5] Zyskind, Guy, and Oz Nathan. Decentralizing
privacy: Using blockchain to protect personal
data[C]. 2015 IEEE Security and Privacy
Workshops. IEEE, 2015(180-184).
[6] C. Wona, J.-W. Choi, S.-J. Lee, S.-H. Choi, D.-J.
Kim, and I. Y. Choi. Development of a MyData
Platform Based on the Personal Health Record
Data Sharing System in Korea[J]. Applied
Sciences-Basel, 2021, 11(17): 8208-8208.
[7] J. Hwang, J. Oh, and H. Kim. A Study on the
Progress and Future Directions for MyData in
South
Korea[J].
IEEE/ACIS
International
Conference on Big Data, Cloud Computing, and
Data Science, 2023: 49-51.
[8] S. Angelopoulos, M. Bernhardt, D. McAuley, Y.
Meng, R. Mortier, and D. Price. Stewardship of
Personal Data on Social Networking Sites[J].
International Journal of Information Management,
2021, 56: 102208-102208.
[9] 王海龙, 田有亮, 尹鑫. 基于区块链的大数据确权
方案[J]. 计算机科学, 2018,45(02):15-19+24.
Wang H L, Tian Y L,Yin X. Blockchain-based
Big Data Right Confirmation Scheme[J].
Computer Science. 2018,45(02):15-19+24. (in
Chinese)
[10] C. Yadav, C. Sharma, R. Kumar, and M. Gupta.
Secure and Reliable Data Sharing Scheme Using
Attribute-Based
Encryption
Attribute-Based
Encryption
with
in
Weighted
Cloud
Environment[J]. International Journal of Electrical
and Electronics Research, 2021, 9(3): 48-56.
[11] R. Guo, J. Zhang, X. Liu, and Y. Wang. An
Attribute-Based Encryption Scheme with Multiple
Authorities on Hierarchical Personal Health
Record
in
Cloud[J].
The Journal of
Supercomputing, 2020, 76(7): 4884-4903.
[12] Janssen, Heleen, et al. Decentralized data
processing: personal data stores and the GDPR[J].
International Data Privacy Law, 2020, 10(4):
356-384.
[13] Hamed H, Heidi H, Amir C, Jon C, Anil M,
Richard M. Personal data: Thinking inside the
box[C]//In Proceedings of The Fifth Decennial
Aarhus Conference on Critical Alternatives (CA
'15), Aarhus University Press, 2015: 29-32.
[14] K. U. Farooq, B. Mahmoud, and P. Charith.
Personal Data Stores (PDS): A Review[J]. Sensors,
2023, 23(3): 1477-1503.
[15] Hugo Krawczyk, Tal Rabin. Chameleon Hashing
and Signatures[R]. Cryptology ePrint Archive,
1998.
[16] Rui Guo, et al. O 3-R-CP-ABE: An efficient and
revocable attribute-based encryption scheme in the
cloud-assisted IoMT system [J]. IEEE Internet of
Things Journal, 2021, 8(11): 8949-8963.
[17] Yang Kedi, Zhang Zhenyong, Tian Youliang, Ma
Jianfeng. A secure authentication framework to
guarantee
the
traceability
of
avatars
in
metaverse[J]. IEEE Transactions on Information
Forensics and Security, 2023, 18: 3817-3832.
[18] Shengmin Xu, et al. Accountable and
Fine-Grained
Controllable
Rewriting
in
Blockchains [J]. IEEE Transactions on Information
Forensics and Security, 2022, 18: 101-116.
[19] Shangxiong Yang, et al. A Redactable
Blockchain-Based Data Management Scheme for
Agricultural Product Traceability [J]. Sensors,24(5),
1667. https://doi.org/10.3390/s24051667.
[20]崔希, 田有亮, 杨科迪.面向 Web 3.0 的三权分置
数据确权方案[J/OL]. 计算机工程,1-15[2025-06-20].https://doi.org/10.19678/j.issn.1000-3428.006969
3.
Cui X, Tian Y L, Yang K D. A Three-Right Sep
aration Data Rights Confirmation Scheme for We
b 3.0[J/OL]. Computer Engineering.1-15[2025-06-2
0].https://doi.org/10.19678/j.issn.1000-3428.0069693.
(in Chinese)
[21] Wang Liang, Huang Shunjiu, Zuo Lina, Li Jun,
Liu
Wenyuan. RCDS: a right-confirmable
data-sharing model based on symbol mapping
coding and blockchain[J]. Frontiers of Information
Technology & Electronic Engineering, 2023, 24(8):
1194-1213.
[22] V. Jaiman and U. Visara. A Consent Model for
Blockchain-Based
Health
Platforms[J].
IEEE
Data
Access,
143734-143745.
Sharing
2020,
8:
[23] Manzoor Ahsan, Braeken An, Kanhere Salil S,
Ylianttila Mika, Liyanage Madhsanka. Proxy
re-encryption enabled secure and anonymous IoT
data sharing platform based on blockchain[J].
Journal of Network and Computer Applications,
2021, 176: 102917-102934.
[24] L. Tang, W. He, H. Dai, and Y. Jiang.
Blockchain-Based
Privacy-Preserving
and
Rewarding Private Data Sharing for IoT[J]. IEEE
Internet
of Things Journal, 2022, 9(16):
15138-15149.
[25] R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, A.
K. M. N. Islam, and M. S. Hossain. Permissioned
Blockchain and Deep Learning for Secure and
Efficient Data Sharing in Industrial Healthcare
Systems[J]. IEEE Transactions on Industrial
Informatics, 2022, 18(11): 8065-8073.
[26] X. Liu, C. Wang, Y. Xu, X. Wang, and J. Reardon.
ZKSQL: Verifiable and Efficient Query Evaluation
with Zero-Knowledge Proofs[J]. Proceedings of
the VLDB Endowment, 2023, 16(8): 1804-1816.
[27] Bao Feng, Deng Robert H, Zhu Huafei. Variations
of
diffie-hellman
problem[C]//International
Conference on Information and Communications
Security. Springer, 2003: 301-312.
[28] K. Y. Chan, L. Chen, Y. Tang, and T. H. Yuen.
Reconstructing Chameleon Hash: Full Security and
the
Multi-Party Setting[J]. ASIA CCS '24
Proceedings of the 19th ACM Asia Conference on
Computer and Communications Security, 2024:
1066-1081.
[29] Singh Parminder, Masud Mehedi, Hossain M
Shamim, Kaur Avinash. Cross-domain secure data
sharing using blockchain for industrial IoT[J].
Journal of Parallel and Distributed Computing,
2021, 156: 176-184.
[30] Jan Camenisch, David Derler, Stephan Krenn,
Henrich C. Pöhls, Kai Samelin, Daniel Slamanig.
Chameleon-Hashes with Ephemeral Trapdoors[J].
2017, 10175: 152-182.
[31] Cong Li, Qingni Shen, Zhikang Xie, Jisheng
Dong, Yuejian Fang, Zhonghai Wu. Efficient
Identity-Based Chameleon Hash for Mobile
Devices[J]. 2022: 3039-3043.
|