{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T16:48:14Z","timestamp":1749055694074,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030494421"},{"type":"electronic","value":"9783030494438"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49443-8_1","type":"book-chapter","created":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T12:02:48Z","timestamp":1593259368000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SPROOF: A Decentralized Platform for Attribute-Based Authentication"],"prefix":"10.1007","author":[{"given":"Clemens","family":"Brunner","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Knirsch","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,28]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-70278-0_14","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of bitcoin OP\\_RETURN metadata. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 218\u2013230. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70278-0_14"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Benet, J.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). Technical report, IPFS (2014). \nhttps:\/\/doi.org\/10.1109\/ICPADS.2007.4447808\n\n, \nhttps:\/\/ipfs.io\/ipfs\/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX\/ipfs.draft3.pdf","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"1_CR3","unstructured":"Brunner, C.: Eduthereum: A System for Storing Educational Certificates in a Public Blockchain. Master\u2019s thesis, Universit\u00e4t Innsbruck (2017)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Brunner, C., Knirsch, F., Engel, D.: SPROOF: a platform for issuing and verifying documents in a public blockchain. In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, pp. 15\u201325. SciTePress, Prague, Czech Republic (2019)","DOI":"10.5220\/0007245600150025"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Caronni, G.: Walking the web of trust. In: 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp. 153\u2013158. IEEE, Gaithersburg (2000). \nhttps:\/\/doi.org\/10.1109\/ENABL.2000.883720","DOI":"10.1109\/ENABL.2000.883720"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","journal-title":"IEEE Access"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"Financial Cryptography and Data Security","author":"K Croman","year":"2016","unstructured":"Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106\u2013125. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-53357-4_8"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Damg\u00e5rd, I.B.: Collision free hash functions and public key signature schemes. Advances in Cryptology \u2013 EUROCRYPT 1987, pp. 203\u2013216 (1988). \nhttps:\/\/doi.org\/10.1007\/3-540-39118-5_19","DOI":"10.1007\/3-540-39118-5_19"},{"issue":"6","key":"1_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976). \nhttps:\/\/doi.org\/10.1109\/TIT.1976.1055638","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Durumeric, Z., Kasten, J., Bailey, M., Halderman, J.A.: Analysis of the HTTPS certificate ecosystem. In: Proceedings of the 2013 Conference on Internet Measurement Conference (IMC 2013), pp. 291\u2013304. ACM, Barcelona, Spain (2013). \nhttps:\/\/doi.org\/10.1145\/2504730.2504755\n\n, \nhttps:\/\/arxiv.org\/abs\/1408.1023","DOI":"10.1145\/2504730.2504755"},{"key":"1_CR11","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, pp. 45\u201359. NSDI 2016, USENIX Association, Santa Clara, CA (2016)"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Gauravaram, P.: Security analysis of salt\\$||\\$password hashes. In: International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 25\u201330. IEEE, Kuala Lumpur, Malaysia (2012). \nhttps:\/\/doi.org\/10.1109\/ACSAT.2012.49","DOI":"10.1109\/ACSAT.2012.49"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Gr\u00e4ther, W., et al.: Blockchain for education: lifelong learning passport. In: Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET), Amsterdam (2018). \nhttps:\/\/doi.org\/10.18420\/blockchain2018","DOI":"10.18420\/blockchain2018"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/978-3-662-47854-7_31","volume-title":"Financial Cryptography and Data Security","author":"G Gutoski","year":"2015","unstructured":"Gutoski, G., Stebila, D.: Hierarchical deterministic bitcoin wallets that tolerate key leakage. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 497\u2013504. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-47854-7_31"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001). \nhttps:\/\/doi.org\/10.1007\/s102070100002\n\n. \nhttp:\/\/www.cacr.math.uwaterloo.ca","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s00450-017-0348-5","volume":"33","author":"F Knirsch","year":"2018","unstructured":"Knirsch, F., Unterweger, A., Engel, D.: Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions. J. Comput. Sci. - Res. Dev. (CSRD) 33(1), 71\u201379 (2018)","journal-title":"J. Comput. Sci. - Res. Dev. (CSRD)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858. IEEE, San Jose (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"1_CR18","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report (2008). \nhttps:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013). \nhttps:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"1_CR20","unstructured":"Sovrin Foundation: Sovrin : a protocol and token for self- sovereign identity and decentralized trust. Technical Report, January (2018). \nhttps:\/\/sovrin.org\/wp-content\/uploads\/2018\/03\/Sovrin-Protocol-and-Token-White-Paper.pdf"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Unterweger, A., Knirsch, F., Leixnering, C., Engel, D.: Lessons learned from implementing a privacy-preserving smart contract in ethereum. In: 9th IFIP International Conference on New Technologies. Mobility and Security (NTMS), pp. 1\u20135. IEEE, Paris, France (2018)","DOI":"10.1109\/NTMS.2018.8328739"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Vasek, M., Bonneau, J., Castellucci, R., Keith, C., Moore, T.: The bitcoin brain drain: a short paper on the use and abuse of bitcoin brain wallets. In: 20th International Conference on Financial Cryptography and Data Security (FC 2016). Springer, Christ Church (2016)","DOI":"10.1007\/978-3-662-54970-4_36"},{"key":"1_CR23","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Technical report, Ethereum (2017). \nhttps:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"1_CR24","unstructured":"Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. Technical report, Parity.io (2017). \nhttps:\/\/github.com\/w3f\/polkadot-white-paper\/raw\/master\/PolkaDotPaper.pdf"},{"key":"1_CR25","unstructured":"W\u00fcst, K., Gervais, A.: Do you need a Blockchain. Technical report, International Association for Cryptologic Research (2017). \nhttps:\/\/eprint.iacr.org\/2017\/375.pdf"}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49443-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T12:27:29Z","timestamp":1593260849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49443-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030494421","9783030494438"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49443-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icissp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icissp.org\/?y=2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}