{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:58:59Z","timestamp":1752101939022,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_2","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"21-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance"],"prefix":"10.1007","author":[{"given":"Yi-Hsiu","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7164-088X","authenticated-orcid":false,"given":"Zi-Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1485-0164","authenticated-orcid":false,"given":"Raylin","family":"Tso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6948-2405","authenticated-orcid":false,"given":"Yi-Fan","family":"Tseng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: EUROSYS 2018, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Baghery, K.: On the efficiency of privacy-preserving smart contract systems. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 118\u2013136. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23696-0_7","DOI":"10.1007\/978-3-030-23696-0_7"},{"key":"2_CR3","unstructured":"Brandenburger, M., Cachin, C., Kapitza, R., Sorniotti, A.: Blockchain and trusted computing: problems, pitfalls, and a solution for hyperledger fabric. CoRR abs\/1805.08541 (2018). http:\/\/arxiv.org\/abs\/1805.08541"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: S &P 2018, pp. 315\u2013334. IEEE (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"2_CR5","unstructured":"Decentralized identity foundation.https:\/\/identity.foundation\/, Accessed 20 June 2022"},{"key":"2_CR6","unstructured":"Digital identity management. https:\/\/www.raulwalter.com\/government\/digital-identity-management\/. Accessed 20 July 2022"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: NSPW 2001, pp. 13\u201322. ACM (2001)","DOI":"10.1145\/508171.508174"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Petitcolas, F.A.: A first look at identity management schemes on the blockchain. IEEE S &P 16(4), 20\u201329 (2018)","DOI":"10.1109\/MSP.2018.3111247"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.procs.2018.01.019","volume":"123","author":"D Efanov","year":"2018","unstructured":"Efanov, D., Roschin, P.: The all-pervasiveness of the blockchain technology. Procedia Comput. Sci. 123, 116\u2013121 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"103059","DOI":"10.1109\/ACCESS.2019.2931173","volume":"7","author":"MS Ferdous","year":"2019","unstructured":"Ferdous, M.S., Chowdhury, F., Alassafi, M.O.: In search of self-sovereign identity leveraging blockchain technology. IEEE Access 7, 103059\u2013103079 (2019)","journal-title":"IEEE Access"},{"key":"2_CR11","unstructured":"Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version 78(110) (1998)"},{"key":"2_CR12","unstructured":"Jacobovitz, O.: Blockchain for identity management. Technical report, The Lynne and William Frankel Center for Computer Science Department of Computer Science, Ben-Gurion University, Beersheba, Israel (2016). https:\/\/www.cs.bgu.ac.il\/frankel\/TechnicalReports\/2016\/16-02.pdf"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: S &P 2016, pp. 839\u2013858. IEEE (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Laurent, M., Bouzefrane, S.: Digital Identity Management. Elsevier (2015)","DOI":"10.1016\/B978-1-78548-004-1.50001-8"},{"issue":"3","key":"2_CR15","doi-asserted-by":"publisher","first-page":"711","DOI":"10.56553\/popets-2022-0093","volume":"2022","author":"R Li","year":"2022","unstructured":"Li, R., Wang, Q., Wang, Q., Galindo, D., Ryan, M.: SoK: TEE-assisted confidential smart contract. Proc. Priv. Enhancing Technol. 2022(3), 711\u2013731 (2022)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Maram, D., et al.: CanDID: Can-Do decentralized identity with legacy compatibility, sybil-resistance, and accountability. In: S &P 2021, pp. 1348\u20131366. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00038"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P.: uPort open-source identity management system: an assessment of self-sovereign identity and user-centric data platform built on blockchain. In: ISSE 2020, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"2_CR18","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573\u2013590. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_36","DOI":"10.1007\/3-540-48405-1_36"},{"key":"2_CR20","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptol. ePrint Arch. 187 (2005). https:\/\/eprint.iacr.org\/2005\/187"},{"key":"2_CR21","unstructured":"Reed, D., et al.: Decentralized identifiers (DIDs) v1.0. Technical report, W3C (2020). https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"2_CR22","unstructured":"Solomon, R., Almashaqbeh, G.: smartFHE: privacy-preserving smart contracts from fully homomorphic encryption. IACR Cryptol. ePrint Arch. 133 (2021). https:\/\/eprint.iacr.org\/2021\/133"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1109\/TIFS.2021.3116429","volume":"16","author":"P Szalachowski","year":"2021","unstructured":"Szalachowski, P.: Password-authenticated decentralized identities. IEEE Trans. Inf. Forensics Secur. 16, 4801\u20134810 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Voigt, P., Von dem Bussche, A.: The EU General Data Protection Regulation (GDPR). Springer, Cham (2017)","DOI":"10.1007\/978-3-319-57959-7"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., Wang, F.Y.: An overview of smart contract: architecture, applications, and future trends. In: IV 2018, pp. 108\u2013113. IEEE (2018)","DOI":"10.1109\/IVS.2018.8500488"},{"key":"2_CR26","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Yellow paper, Ethereum project (2014). https:\/\/files.gitter.im\/ethereum\/yellowpaper\/VIyt\/Paper.pdf"},{"key":"2_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102050","volume":"99","author":"X Yang","year":"2020","unstructured":"Yang, X., Li, W.: A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput. Secur. 99, 102050 (2020)","journal-title":"Comput. Secur."},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Town crier: an authenticated data feed for smart contracts. In: CCS 2016, pp. 270\u2013282 (2016)","DOI":"10.1145\/2976749.2978326"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, F., Maram, D., Malvai, H., Goldfeder, S., Juels, A.: DECO: liberating web data using decentralized oracles for TLS. In: CCS 2020, pp. 1919\u20131938 (2020)","DOI":"10.1145\/3372297.3417239"},{"key":"2_CR30","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Enigma: decentralized computation platform with guaranteed privacy. CoRR abs\/1506.03471 (2015). http:\/\/arxiv.org\/abs\/1506.03471"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:53Z","timestamp":1668760253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}