{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:10:39Z","timestamp":1773195039008,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031324147","type":"print"},{"value":"9783031324154","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32415-4_30","type":"book-chapter","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:25:45Z","timestamp":1689971145000},"page":"481-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards Smart Contract-Based Verification of\u00a0Anonymous Credentials"],"prefix":"10.1007","author":[{"given":"Robert","family":"Muth","sequence":"first","affiliation":[]},{"given":"Tarek","family":"Galal","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Heiss","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,22]]},"reference":[{"key":"30_CR1","unstructured":"Qin, K., Zhou, L., Afonin, Y., Lazzaretti, L., Gervais, A.: Cefi vs. defi - comparing centralized to decentralized finance. CoRR, abs\/2106.08157 (2021)"},{"key":"30_CR2","unstructured":"Jentzsch, C.: Decentralized autonomous organization to automate governance. White paper (2016)"},{"issue":"2","key":"30_CR3","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"MS Ali","year":"2019","unstructured":"Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H.: Applications of blockchains in the internet of things: a comprehensive survey. IEEE Commun. Surv. Tutorials 21(2), 1676\u20131717 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"30_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-70972-7_20","volume-title":"Financial Cryptography and Data Security","author":"P McCorry","year":"2017","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 357\u2013375. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_20"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Heiss, J., Eberhardt, J., Tai, S.: From oracles to trustworthy data on-chaining systems. In: IEEE International Conference on Blockchain (2019)","DOI":"10.1109\/Blockchain.2019.00075"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_7"},{"key":"30_CR8","unstructured":"Hyperledger White Paper Working Group. An introduction to hyperledger (2018). http:\/\/www.hyperledger.org\/wp-content\/uploads\/2018\/07\/HL_Whitepaper_IntroductiontoHyperledger.pdf"},{"key":"30_CR9","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger, berlin version fabef25. (2021)"},{"issue":"1","key":"30_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133375.2133379","volume":"15","author":"J Camenisch","year":"2008","unstructured":"Camenisch, J., Gross, T.: Efficient attributes for anonymous credentials. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(1), 1\u201330 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"30_CR11","unstructured":"Hyperledger Indy sdk Repository. Indy walkthrough - a developer guide for building indy clients using libindy (2018). http:\/\/github.com\/hyperledger\/indy-sdk\/blob\/master\/docs\/getting-started\/indy-walkthrough.md"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle, A., Gr\u00fcner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80\u201386 (2018)","journal-title":"Comput. Sci. Rev."},{"key":"30_CR13","unstructured":"Allen, C.: The path to self-sovereign identity (2016). http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html"},{"key":"30_CR14","unstructured":"World Wide Web Consortium (W3C). Verifiable credentials data model v1.1 - expressing verifiable information on the web (2021). http:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268\u2013289. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36413-7_20"},{"key":"30_CR16","unstructured":"Khovratovich, D., Lodder, M.: Anonymous credentials with type-3 revocation (2018). http:\/\/github.com\/hyperledger\/ursa-docs\/blob\/62bc87b\/specs\/anoncreds1\/anoncreds.tex"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4, 161\u2013174 (1991)","DOI":"10.1007\/BF00196725"},{"key":"30_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"key":"30_CR19","unstructured":"Buterin, V.: Big integer modular exponentiation (2017). http:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-198.md"},{"key":"30_CR20","unstructured":"Popov, S.: IOTA: Feeless and free. Blockchain Technical Briefs (2019)"},{"key":"30_CR21","unstructured":"Roughgarden, T.: Transaction fee mechanism design for the Ethereum blockchain: an economic analysis of EIP-1559. CoRR, abs\/2012.00854 (2020)"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Busse, A., Eberhardt, J., Tai, S.: EVM-Perf: high-precision EVM performance analysis. In: IEEE International Conference on Blockchain and Cryptocurrency, pp. 1\u20138 (2021)","DOI":"10.1109\/ICBC51069.2021.9461058"},{"key":"30_CR23","unstructured":"Spain, M., Foley, S., Gramoli, V.: The impact of ethereum throughput and fees on transaction latency during icos. In: OASIcs, Tokenomics. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2019)"},{"issue":"01","key":"30_CR24","first-page":"2008","volume":"539","author":"J Camenisch","year":"2008","unstructured":"Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. IACR Cryptology ePrint Arch. 539(01), 2008 (2008)","journal-title":"IACR Cryptology ePrint Arch."},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D Boneh","year":"2008","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptology 21, 149\u2013177 (2008)","journal-title":"J. Cryptology"},{"key":"30_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41\u201355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_3"},{"key":"30_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11693383_22","volume-title":"Selected Areas in Cryptography","author":"PSLM Barreto","year":"2006","unstructured":"Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319\u2013331. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11693383_22"},{"key":"30_CR28","doi-asserted-by":"crossref","unstructured":"Eberhardt, J., Heiss, J.: Off-chaining models and approaches to off-chain computations. In: Proceedings of the 2Nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, SERIAL 2018. ACM (2018)","DOI":"10.1145\/3284764.3284766"},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"Eberhardt, J., Tai, S.: Zokrates - scalable privacy-preserving off-chain computations. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1084\u20131091 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"Gabay, D., Akkaya, K., Cebe, M.: A privacy framework for charging connected electric vehicles using blockchain and zero knowledge proofs. In: IEEE 44th LCN Symposium on Emerging Topics in Networking, pp. 66\u201373 (2019)","DOI":"10.1109\/LCNSymposium47956.2019.9000682"},{"key":"30_CR31","doi-asserted-by":"crossref","unstructured":"Sharma, B., Halder, R., Singh, J.L.: Blockchain-based interoperable healthcare using zero-knowledge proofs and proxy re-encryption. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 1\u20136 (2020)","DOI":"10.1109\/COMSNETS48256.2020.9027413"},{"key":"30_CR32","doi-asserted-by":"crossref","unstructured":"Heiss, J., Ulbricht, M.R., Eberhardt, J.: Put your money where your mouth is - towards blockchain-based consent violation detection. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20139 (2020)","DOI":"10.1109\/ICBC48266.2020.9169455"},{"key":"30_CR33","doi-asserted-by":"crossref","unstructured":"Soltani, R., Nguyen, U.T., An, A.: A survey of self-sovereign identity ecosystem. CoRR, abs\/2111.02003 (2021)","DOI":"10.1155\/2021\/8873429"},{"key":"30_CR34","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P.: uPort open-source identity management system: an assessment of self-sovereign identity and user-centric data platform built on blockchain. In: ISSE (2020)","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"30_CR35","unstructured":"JOLOCOM: A decentralized, open source solution for digital identity and access management (whitepaper) (2019). http:\/\/jolocom.io\/wp-content\/uploads\/2019\/12\/Jolocom-Whitepaper- v2.1-A-Decentralized-Open-Source-Solution-for-Digital-Identity-and- Access-Management.pdf"},{"key":"30_CR36","unstructured":"Vogelsteller, F., Yasaka, T.: Erc-725 smart contract based account (2020). http:\/\/github.com\/ethereum\/EIPs\/issues\/725"},{"key":"30_CR37","unstructured":"Vogelsteller, F.: Claim holder (2019). http:\/\/github.com\/ethereum\/EIPs\/issues\/735"},{"key":"30_CR38","unstructured":"Lodder, D.M., Khovratovich, D.: Anonymous credentials 2.0 (2019). http:\/\/wiki.hyperledger.org\/download\/attachments\/6426712\/Anoncreds2.1.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2022 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32415-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:28:48Z","timestamp":1689971328000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32415-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031324147","9783031324154"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32415-4_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}