{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:19:01Z","timestamp":1743041941391,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031545207"},{"type":"electronic","value":"9783031545214"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54521-4_10","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and\u00a0Revocable Anonymous Account Guarantee System Based on\u00a0Blockchain"],"prefix":"10.1007","author":[{"given":"Weiyou","family":"Liang","sequence":"first","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Changsong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Huiyong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Arasan, A., Sadaiyandi, R., Al-Turjman, F., Rajasekaran, A.S., Selvi Karuppuswamy, K.: Computationally efficient and secure anonymous authentication scheme for cloud users. Personal Ubiquit. Comput. 1\u201311 (2021). https:\/\/doi.org\/10.1007\/s00779-021-01566-9","DOI":"10.1007\/s00779-021-01566-9"},{"issue":"4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.3390\/s20041215","volume":"20","author":"S Banerjee","year":"2020","unstructured":"Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Park, Y.: An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4), 1215 (2020)","journal-title":"Sensors"},{"key":"10_CR3","unstructured":"Camenisch, J., et al.: Specification of the identity mixer cryptographic library. IBM Research-Zurich, pp. 1\u201348 (2010)"},{"key":"10_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103708","volume":"85","author":"YN Cao","year":"2022","unstructured":"Cao, Y.N., Wang, Y., Ding, Y., Guo, Z., Wu, Q., Liang, H.: Blockchain-empowered security and privacy protection technologies for smart grid. Comput. Stand. Interfaces 85, 103708 (2022)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3406092","volume":"21","author":"L Cheng","year":"2021","unstructured":"Cheng, L., Liu, J., Jin, Y., Li, Y., Wang, W.: Account guarantee scheme: making anonymous accounts supervised in blockchain. ACM Trans. Internet Technol. (TOIT) 21(1), 1\u201319 (2021)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"14686","DOI":"10.1109\/ACCESS.2018.2810096","volume":"6","author":"T Gao","year":"2018","unstructured":"Gao, T., Deng, X., Guo, N., Wang, X.: An anonymous authentication scheme based on pmipv6 for VANETs. IEEE Access 6, 14686\u201314698 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0228319","volume":"15","author":"M Han","year":"2020","unstructured":"Han, M., Liu, S., Ma, S., Wan, A.: Anonymous-authentication scheme based on fog computing for VANET. PLoS ONE 15(2), e0228319 (2020)","journal-title":"PLoS ONE"},{"issue":"5","key":"10_CR8","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1142\/S0129054115500343","volume":"26","author":"TH Ho","year":"2015","unstructured":"Ho, T.H., Yen, L.H., Tseng, C.C.: Simple-yet-efficient construction and revocation of group signatures. Int. J. Found. Comput. Sci. 26(5), 611\u2013624 (2015)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"I\u2019Anson, C., Mitchell, C.: Security defects in CCITT recommendation x. 509: the directory authentication framework. ACM SIGCOMM Comput. Commun. Rev. 20(2), 30\u201334 (1990)","DOI":"10.1145\/378570.378623"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"48576","DOI":"10.1109\/ACCESS.2020.2977968","volume":"8","author":"S Jegadeesan","year":"2020","unstructured":"Jegadeesan, S., Azees, M., Babu, N.R., Subramaniam, U., Almakhles, J.D.: EPAW: efficient privacy preserving anonymous mutual authentication scheme for wireless body area networks (WBANS). IEEE Access 8, 48576\u201348586 (2020)","journal-title":"IEEE Access"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"98986","DOI":"10.1109\/ACCESS.2020.2997840","volume":"8","author":"Y Jiang","year":"2020","unstructured":"Jiang, Y., Ge, S., Shen, X.: AAAS: an anonymous authentication scheme based on group signature in VANETs. IEEE Access 8, 98986\u201398998 (2020)","journal-title":"IEEE Access"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Khan, N., Zhang, J., Jan, S.U.: A robust and privacy-preserving anonymous user authentication scheme for public cloud server. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/1943426"},{"key":"10_CR13","first-page":"246","volume":"5","author":"NA Lal","year":"2016","unstructured":"Lal, N.A., Prasad, S., Farik, M.: A review of authentication methods. Int. J. Sci. Technol. Res. 5, 246\u2013249 (2016)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Liang, W., Wang, Y., Ding, Y., Zheng, H., Liang, H., Wang, H.: An efficient anonymous authentication and supervision system based on blockchain. In: 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), pp. 306\u2013313. IEEE (2022)","DOI":"10.1109\/DSC55868.2022.00048"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Liang, W., Wang, Y., Ding, Y., Zheng, H., Liang, H., Wang, H.: An efficient blockchain-based anonymous authentication and supervision system. Peer-to-Peer Networking and Applications, pp. 1\u201320 (2023)","DOI":"10.21203\/rs.3.rs-1977769\/v1"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1080\/02533839.2018.1537804","volume":"42","author":"H Liu","year":"2019","unstructured":"Liu, H., Sun, Y., Xu, Y., Xu, R., Wei, Z.: A secure lattice-based anonymous authentication scheme for VANETs. J. Chin. Inst. Eng. 42(1), 66\u201373 (2019)","journal-title":"J. Chin. Inst. Eng."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"33552","DOI":"10.1109\/ACCESS.2018.2841972","volume":"6","author":"A Mehmood","year":"2018","unstructured":"Mehmood, A., Natgunanathan, I., Xiang, Y., Poston, H., Zhang, Y.: Anonymous authentication scheme for smart cloud based healthcare applications. IEEE access 6, 33552\u201333567 (2018)","journal-title":"IEEE access"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-540-30574-3_19","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"L Nguyen","year":"2005","unstructured":"Nguyen, L.: Accumulators from Bilinear Pairings and Applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275\u2013292. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30574-3_19"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Rana, R., Zaeem, R.N., Barber, K.S.: An assessment of blockchain identity solutions: Minimizing risk and liability of authentication. In: 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI), pp. 26\u201333. IEEE (2019)","DOI":"10.1145\/3350546.3352497"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Saleem, T., et al.: ProofChain: an x. 509-compatible blockchain-based PKI framework with decentralized trust. Comput. Netw. 213, 109069 (2022)","DOI":"10.1016\/j.comnet.2022.109069"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Wang, F., Xu, G., Gu, L.: A secure and efficient ECC-based anonymous authentication protocol. Secur. Commun. Netw. 2019 (2019)","DOI":"10.1155\/2019\/4656281"},{"key":"10_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103080","volume":"188","author":"X Wang","year":"2021","unstructured":"Wang, X., Yan, Z., Zhang, R., Zhang, P.: Attacks and defenses in user authentication systems: a survey. J. Netw. Comput. Appl. 188, 103080 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"10_CR23","first-page":"1705","volume":"6","author":"Z Wang","year":"2019","unstructured":"Wang, Z., Fan, J., Cheng, L., An, H.Z., Zheng, H.B., Niu, J.X.: Supervised anonymous authentication scheme. J. Softw. 6, 1705\u20131720 (2019)","journal-title":"J. Softw."},{"key":"10_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119322","volume":"645","author":"B Wen","year":"2023","unstructured":"Wen, B., Wang, Y., Ding, Y., Zheng, H., Qin, B., Yang, C.: Security and privacy protection technologies in securing blockchain applications. Inf. Sci. 645, 119322 (2023)","journal-title":"Inf. Sci."},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.future.2019.05.081","volume":"101","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Li, H., Li, Y., Yu, Y., Au, M.H., Wang, B.: An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Futur. Gener. Comput. Syst. 101, 29\u201338 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102161","volume":"117","author":"M Zhang","year":"2021","unstructured":"Zhang, M., Zhou, J., Zhang, G., Zou, M., Chen, M.: EC-BAAS: elliptic curve-based batch anonymous authentication scheme for internet of vehicles. J. Syst. Architect. 117, 102161 (2021)","journal-title":"J. Syst. Architect."},{"issue":"2","key":"10_CR27","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1587\/transinf.2021BCP0011","volume":"105","author":"T Zhang","year":"2022","unstructured":"Zhang, T., Wang, Y., Ding, Y., Wu, Q., Liang, H., Wang, H.: Multi-party electronic contract signing protocol based on blockchain. IEICE Trans. Inf. Syst. 105(2), 264\u2013271 (2022)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ijhcs.2019.08.006","volume":"133","author":"V Zimmermann","year":"2020","unstructured":"Zimmermann, V., Gerber, N.: The password is dead, long live the password-a laboratory study on user perceptions of authentication schemes. Int. J. Hum Comput. Stud. 133, 26\u201344 (2020)","journal-title":"Int. J. Hum Comput. Stud."},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Zulfiqar, M., Janjua, M.U., Hassan, M., Ahmad, T., Saleem, T., Stokes, J.W.: Tracking adoption of revocation and cryptographic features in x. 509 certificates. Int. J. Inf. Secur. 21(3), 653\u2013668 (2022)","DOI":"10.1007\/s10207-021-00572-5"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54521-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:42:29Z","timestamp":1708584149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54521-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031545207","9783031545214"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54521-4_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cony +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"176","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}