iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1109/MNET.126.2200334
{"id":"https://openalex.org/W4297310180","doi":"https://doi.org/10.1109/mnet.126.2200334","title":"Enhancing Account Privacy in Blockchain-Based IoT Access Control via Zero Knowledge Proof","display_name":"Enhancing Account Privacy in Blockchain-Based IoT Access Control via Zero Knowledge Proof","publication_year":2022,"publication_date":"2022-09-26","ids":{"openalex":"https://openalex.org/W4297310180","doi":"https://doi.org/10.1109/mnet.126.2200334"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.126.2200334","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085618694","display_name":"Qiwei Hu","orcid":"https://orcid.org/0000-0003-0220-961X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiwei Hu","raw_affiliation_strings":["Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009617425","display_name":"Yueyue Dai","orcid":"https://orcid.org/0000-0002-2163-987X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueyue Dai","raw_affiliation_strings":["Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386630","display_name":"Shuo Li","orcid":"https://orcid.org/0000-0002-5184-3230"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Li","raw_affiliation_strings":["Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100678341","display_name":"Tao Jiang","orcid":"https://orcid.org/0000-0002-8482-1046"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jiang","raw_affiliation_strings":["Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Research Center of 6G Mobile Communications, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.859,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.830548,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":89},"biblio":{"volume":"37","issue":"6","first_page":"117","last_page":"123"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.81314987},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5141859},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.4717052},{"id":"https://openalex.org/keywords/cloaking","display_name":"Cloaking","score":0.44184774}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.89659894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8519005},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.81314987},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7776239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.674363},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6645556},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.62137467},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6197626},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5425506},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5141859},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.4717052},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45683712},{"id":"https://openalex.org/C62973154","wikidata":"https://www.wikidata.org/wiki/Q868018","display_name":"Cloaking","level":3,"score":0.44184774},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43148172},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C110367647","wikidata":"https://www.wikidata.org/wiki/Q497166","display_name":"Metamaterial","level":2,"score":0.0},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.126.2200334","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.73}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1503499126","https://openalex.org/W1970606468","https://openalex.org/W2018746447","https://openalex.org/W2043007983","https://openalex.org/W2553727764","https://openalex.org/W2960610835","https://openalex.org/W2986501596","https://openalex.org/W3000548332","https://openalex.org/W3110989801","https://openalex.org/W3111916670","https://openalex.org/W3194918904"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3014040989","https://openalex.org/W2953300811","https://openalex.org/W2951033480","https://openalex.org/W2783338065","https://openalex.org/W2360841018","https://openalex.org/W2167779058","https://openalex.org/W2095170444","https://openalex.org/W2051529116"],"abstract_inverted_index":{"Blockchain-enabled":[0],"IoT":[1,18],"Access":[2],"Control":[3],"(BIAC)":[4],"is":[5,27,31],"a":[6,57],"promising":[7],"paradigm":[8],"to":[9,21,47,82,105],"achieve":[10],"reliable":[11],"and":[12,151],"automatic":[13],"access":[14,106],"control":[15],"management":[16],"for":[17,124],"systems.":[19],"Due":[20],"the":[22,38,64,91,97,125,156,161],"involvement":[23],"of":[24,41,74,145],"blockchain":[25],"which":[26],"transparent,":[28],"account":[29,49],"privacy":[30,50],"easily":[32],"violated":[33],"in":[34,51],"BIAC.":[35],"Motivated":[36],"by":[37],"recent":[39],"progress":[40],"utilizing":[42],"Zero":[43],"Knowledge":[44],"Proof":[45],"(ZKP)":[46],"protect":[48],"cryptocurrencies,":[52],"this":[53,111],"article":[54],"systematically":[55],"investigates":[56],"ZKPbased":[58],"privacy-enhancing":[59],"BIAC":[60],"architecture.":[61],"We":[62,154],"summarize":[63],"design":[65,115],"principles":[66],"as":[67,119,121],"authenticating":[68],"transactions":[69,118],"with":[70],"ZKP":[71,92,133,158],"proofs":[72,93,134],"instead":[73],"digital":[75],"signatures":[76],"so":[77],"that":[78],"permissions":[79],"are":[80,94],"linked":[81],"off-chain":[83],"secrets":[84],"rather":[85],"than":[86],"on-chain":[87],"accounts.":[88],"However,":[89],"since":[90],"stored":[95],"on":[96],"blockchain,":[98],"an":[99],"adversary":[100],"may":[101],"launch":[102],"replay":[103],"attacks":[104],"resources":[107],"illegally.":[108],"To":[109],"tackle":[110],"challenge,":[112],"we":[113],"carefully":[114],"two":[116],"account-hiding":[117],"well":[120],"validation":[122],"rules":[123],"classical":[126],"capability-based":[127],"AC":[128],"(CBAC)":[129],"model,":[130],"where":[131,160],"all":[132,142],"expire":[135],"once":[136],"used.":[137],"The":[138],"enhanced":[139],"system":[140],"preserves":[141],"necessary":[143],"functions":[144],"CBAC":[146],"while":[147],"achieving":[148],"permission":[149],"invisibility":[150],"requester":[152],"anonymity.":[153],"implement":[155],"designed":[157],"operations,":[159],"evaluation":[162],"results":[163],"demonstrate":[164],"our":[165],"solution":[166],"incurs":[167],"low":[168],"overheads.":[169]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4297310180","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2024-12-12T15:56:11.140632","created_date":"2022-09-28"}