{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:25:25Z","timestamp":1747459525558,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030314996"},{"type":"electronic","value":"9783030315009"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31500-9_23","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T23:26:53Z","timestamp":1568935613000},"page":"355-371","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts"],"prefix":"10.1007","author":[{"given":"Rujia","family":"Li","sequence":"first","affiliation":[]},{"given":"David","family":"Galindo","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/3-540-45682-1_34","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"M Abe","year":"2001","unstructured":"Abe, M., Ohkub, M.: Provably secure air blind signatures with tight revocation. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 583\u2013601. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_34"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-21969-6_13","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"O Blazy","year":"2011","unstructured":"Blazy, O., Canard, S., Fuchsbauer, G., Gouget, A., Sibert, H., Traor\u00e9, J.: Achieving optimal anonymity in transferable E-cash with a judge. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 206\u2013223. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21969-6_13"},{"key":"23_CR3","unstructured":"Brickell, E.F., Gemmell, P., Kravitz, D.W.: Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In: SODA (1995)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: towards privacy in a smart contract world. IACR Cryptology ePrint Archive, p. 191 (2019)","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"23_CR5","unstructured":"B\u00fcnz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: towards privacy in a smart contract world. Cryptology ePrint Archive, Report 2019\/191 (2019). https:\/\/eprint.iacr.org\/2019\/191"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_7"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-61770-1_26","volume-title":"Computer Security \u2014 ESORICS 96","author":"J Camenisch","year":"1996","unstructured":"Camenisch, J., Maurer, U., Stadler, M.: Digital payment systems with passive anonymity-revoking trustees. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 33\u201343. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61770-1_26"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-15898-8_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"J Camenisch","year":"2010","unstructured":"Camenisch, J., M\u00f6dersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198\u2013214. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15898-8_13"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45067-X_21","volume-title":"Information Security and Privacy","author":"S Canard","year":"2003","unstructured":"Canard, S., Traor\u00e9, J.: On fair E-cash systems based on group signature schemes. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 237\u2013248. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-45067-X_21"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston, MA (1983). https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, R., et al.: Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contract execution. arXiv:1804.05141 [cs], April 2018","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-21969-6_14","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"A Escala","year":"2011","unstructured":"Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 224\u2013241. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21969-6_14"},{"key":"23_CR13","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., Van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: 13th USENIX Symposium on Networked Systems Design and Implementation NSDI 16, pp. 45\u201359 (2016)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC (1990)","DOI":"10.1145\/100216.100272"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-12678-9_2","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"G Fuchsbauer","year":"2010","unstructured":"Fuchsbauer, G., Vergnaud, D.: Fair blind signatures without random oracles. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 16\u201333. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12678-9_2"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-73489-5_14","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"E Hufschmitt","year":"2007","unstructured":"Hufschmitt, E., Traor\u00e9, J.: Fair blind signatures revisited. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 268\u2013292. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73489-5_14"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Yung, M.: Revokable and versatile electronic money (extended abstract). In: ACM Conference on Computer and Communications Security (1996)","DOI":"10.1145\/238168.238191"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/3-540-69053-0_31","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"M Jakobsson","year":"1997","unstructured":"Jakobsson, M., Yung, M.: Distributed \u201cmagic ink\u201d signatures. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 450\u2013464. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_31"},{"key":"23_CR20","unstructured":"Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S.M., Felten, E.W.: Arbitrum: scalable, private smart contracts. In: 27th USENIX Security Symposium, pp. 1353\u20131370 (2018)"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/11832072_4","volume-title":"Security and Cryptography for Networks","author":"A Kiayias","year":"2006","unstructured":"Kiayias, A., Zhou, H.-S.: Concurrent blind signatures without random oracles. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 49\u201362. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11832072_4"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858, May 2016","DOI":"10.1109\/SP.2016.55"},{"issue":"13","key":"23_CR23","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1016\/j.ins.2011.02.016","volume":"181","author":"T Kwon","year":"2011","unstructured":"Kwon, T.: Privacy preservation with X.509 standard certificates. Inf. Sci. 181(13), 2906\u20132921 (2011)","journal-title":"Inf. Sci."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 254\u2013269. ACM, New York (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"23_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-70972-7_20","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2017","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 357\u2013375. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_20"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP 2013, Tel-Aviv, Israel, p. 1. ACM Press (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"23_CR27","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/3-540-46885-4_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201989","author":"T Okamoto","year":"1990","unstructured":"Okamoto, T., Ohta, K.: Divertible zero knowledge interactive proofs and commutative random self-reducibility. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 134\u2013149. Springer, Heidelberg (1990). https:\/\/doi.org\/10.1007\/3-540-46885-4_16"},{"key":"23_CR29","unstructured":"Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1. 1. Technical report, Microsoft Corporation (2011)"},{"key":"23_CR30","doi-asserted-by":"publisher","unstructured":"Park, S., Park, H., Won, Y., Lee, J., Kent, S.: Traceable anonymous certificate. Technical report RFC5636, RFC Editor, August 2009. https:\/\/doi.org\/10.17487\/rfc5636, https:\/\/www.rfc-editor.org\/info\/rfc5636","DOI":"10.17487\/rfc5636"},{"key":"23_CR31","series-title":"Identity in the Information Society","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14439-9","volume-title":"Attribute-based Credentials for Trust","author":"K Rannenberg","year":"2015","unstructured":"Rannenberg, K., Camenisch, J., Sabouri, A.: Attribute-based Credentials for Trust. Identity in the Information Society. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14439-9"},{"issue":"6","key":"23_CR32","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S von Solms","year":"1992","unstructured":"von Solms, S., Naccache, D.: On blind signatures and perfect crimes. Comput. Secur. 11(6), 581\u2013583 (1992)","journal-title":"Comput. Secur."},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Sonnino, A., Al-Bassam, M., Bano, S., Meiklejohn, S., Danezis, G.: Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers. arXiv preprint arXiv:1802.07344 (2018)","DOI":"10.14722\/ndss.2019.23272"},{"key":"23_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-49264-X_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201995","author":"M Stadler","year":"1995","unstructured":"Stadler, M., Piveteau, J.-M., Camenisch, J.: Fair blind signatures. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 209\u2013219. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-49264-X_17"},{"key":"23_CR35","unstructured":"Szabo, N.: Smart contracts: building blocks for digital markets. EXTROPY J. Transhumanist Thought (16) (1996)"},{"key":"23_CR36","unstructured":"Zamfir, V.: Casper the friendly ghost: a correct by construction blockchain consensus protocol. White paper (2017). https:\/\/github.com\/ethereum\/research\/blob\/master\/papers\/caspertfg\/caspertfg.pdf"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31500-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:04:53Z","timestamp":1726790693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31500-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030314996","9783030315009"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31500-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CBT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cryptocurrencies and Blockchain Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cbt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2019.uni.lu\/workshops\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}