{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:14:59Z","timestamp":1743041699785,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031800191"},{"type":"electronic","value":"9783031800207"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80020-7_21","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T07:30:28Z","timestamp":1734161428000},"page":"359-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Decoupling Mechanism for\u00a0Transaction Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7714-2291","authenticated-orcid":false,"given":"Vishwas","family":"Patil","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6966-0507","authenticated-orcid":false,"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Abdelaziz, Y., Napoli, D., Chiasson, S.: End-users and service providers: Trust and distributed responsibility for account security. In: 2019 17th International Conference on Privacy, Security and Trust (PST), pp.\u00a01\u20136. IEEE Computer Society (2019). https:\/\/doi.org\/10.1109\/PST47121.2019.8949041","DOI":"10.1109\/PST47121.2019.8949041"},{"key":"21_CR2","unstructured":"Alliance, F.: Passkeys (2022). https:\/\/fidoalliance.org\/passkeys\/"},{"key":"21_CR3","doi-asserted-by":"publisher","unstructured":"Brunner, C., Gallersd\u00f6rfer, U., Knirsch, F., Engel, D., Matthes, F.: Did and VC: untangling decentralized identifiers and verifiable credentials for the web of trust. In: Proceedings of the 3rd International Conference on Blockchain Technology and Applications, pp. 61\u201366. ACM (2021). https:\/\/doi.org\/10.1145\/3446983.3446992","DOI":"10.1145\/3446983.3446992"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston, MA (1983). https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18"},{"key":"21_CR5","series-title":"AIS","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-1-4615-0239-5_14","volume-title":"Secure Electronic Voting","author":"D Chaum","year":"2003","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. In: Gritzalis, D.A. (ed.) Secure Electronic Voting. AIS, vol. 7, pp. 211\u2013219. Springer, Boston (2003). https:\/\/doi.org\/10.1007\/978-1-4615-0239-5_14"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Clarke, D.E.: SPKI\/SDSI HTTP server\/certificate chain discovery in SPKI\/SDSI. Ph.D. thesis, Massachusetts Institute of Technology (2001)","DOI":"10.3233\/JCS-2001-9402"},{"issue":"3","key":"21_CR7","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1515\/POPETS-2018-0026","volume":"2018","author":"A Davidson","year":"2018","unstructured":"Davidson, A., Goldberg, I., Sullivan, N., Tankersley, G., Valsorda, F.: Privacy pass: bypassing internet challenges anonymously. Proc. Priv. Enhancing Technol. 2018(3), 164\u2013180 (2018). https:\/\/doi.org\/10.1515\/POPETS-2018-0026","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: 13th USENIX Security Symposium. USENIX Association (2004)","DOI":"10.21236\/ADA465464"},{"issue":"1","key":"21_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011). https:\/\/doi.org\/10.1145\/1866739.1866758","journal-title":"Commun. ACM"},{"key":"21_CR10","unstructured":"Ellison, C.: Establishing identity without certification authorities. In: 6th USENIX Security Symposium, p.\u00a07. USENIX Association (1996)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Ellison, C.: SPKI Requirements. RFC 2692 (1999). https:\/\/www.rfc-editor.org\/info\/rfc2692","DOI":"10.17487\/rfc2692"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Eskandarian, S., Messeri, E., Bonneau, J., Boneh, D.: Certificate Transparency with Privacy. CoRR abs\/1703.02209 (2017)","DOI":"10.1515\/popets-2017-0052"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"103059","DOI":"10.1109\/ACCESS.2019.2931173","volume":"7","author":"MS Ferdous","year":"2019","unstructured":"Ferdous, M.S., Chowdhury, F., Alassafi, M.O.: In search of self-sovereign identity leveraging blockchain technology. IEEE Access 7, 103059\u2013103079 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2931173","journal-title":"IEEE Access"},{"key":"21_CR14","unstructured":"Foundation, H.: Hyperledger indy (2024). https:\/\/www.hyperledger.org\/projects\/hyperledger-indy"},{"key":"21_CR15","unstructured":"Foundation, T.S.: Sovrin basics (2024). https:\/\/sovrin.org\/library\/"},{"issue":"7","key":"21_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2838730","volume":"59","author":"Y Gurevich","year":"2016","unstructured":"Gurevich, Y., Hudis, E., Wing, J.M.: Inverse privacy. Commun. ACM 59(7), 38\u201342 (2016). https:\/\/doi.org\/10.1145\/2838730","journal-title":"Commun. ACM"},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. RFC 6749 (2012). https:\/\/doi.org\/10.17487\/RFC6749","DOI":"10.17487\/RFC6749"},{"key":"21_CR18","doi-asserted-by":"publisher","unstructured":"Kales, D., Omolola, O., Ramacher, S.: Revisiting user privacy for certificate transparency. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 432\u2013447 (2019). https:\/\/doi.org\/10.1109\/EuroSP.2019.00039","DOI":"10.1109\/EuroSP.2019.00039"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Khan, S., et al.: Accountable and transparent TLS certificate management: an alternate public-key infrastructure with verifiable trusted parties. Sec. Comm. Netw. (2018)","DOI":"10.1155\/2018\/8527010"},{"key":"21_CR20","unstructured":"Korir, M., Parkin, S., Dunphy, P.: An empirical study of a decentralized identity wallet: usability, security, and perspectives on user control. In: Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pp. 195\u2013211. USENIX Association (2022)"},{"key":"21_CR21","unstructured":"Mayrhofer, A., Klesev, D., Sabadello, M.: The Decentralized Identifier (DID) in the DNS. Internet-Draft draft-mayrhofer-did-dns-05, Internet Engineering Task Force (2021). https:\/\/datatracker.ietf.org\/doc\/draft-mayrhofer-did-dns\/05\/, work in Progress"},{"issue":"6","key":"21_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1743546.1743558","volume":"53","author":"A Narayanan","year":"2010","unstructured":"Narayanan, A., Shmatikov, V.: Myths and fallacies of \u201cpersonally identifiable information\u2019\u2019. Commun. ACM 53(6), 24\u201326 (2010). https:\/\/doi.org\/10.1145\/1743546.1743558","journal-title":"Commun. ACM"},{"key":"21_CR23","unstructured":"Narayanan, A., Toubiana, V., Barocas, S., Nissenbaum, H., Boneh, D.: A critical look at decentralized personal data architectures. CoRR abs\/1202.4503 (2012)"},{"key":"21_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-16441-5_3","volume-title":"Public Key Infrastructures, Services and Applications","author":"V Patil","year":"2010","unstructured":"Patil, V., Gasti, P., Mancini, L., Chiola, G.: Resource management with X.509 inter-domain authorization certificates (InterAC). In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol. 6391, pp. 34\u201350. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16441-5_3"},{"issue":"2","key":"21_CR25","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF02706242","volume":"30","author":"V Patil","year":"2005","unstructured":"Patil, V., Shyamasundar, R.K.: Trust management for e-transactions. Sadhana 30(2), 141\u2013158 (2005). https:\/\/doi.org\/10.1007\/BF02706242","journal-title":"Sadhana"},{"key":"21_CR26","unstructured":"Patil, V., Shyamasundar, R.: ROADS: role-based authorization and delegation system. In: International Conference on Computational & Experimental Engineering and Sciences (2003)"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"Patil, V., Shyamasundar, R.: Evolving role of PKI in facilitating trust. In: 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), pp.\u00a01\u20137. IEEE, USA (2022). https:\/\/doi.org\/10.1109\/PKIA56009.2022.9952249","DOI":"10.1109\/PKIA56009.2022.9952249"},{"issue":"12","key":"21_CR28","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSPEC.2023.10352412","volume":"60","author":"B Raghavan","year":"2023","unstructured":"Raghavan, B., Schneier, B.: A bold new plan for preserving online privacy and security: Decoupling our identities from our data and actions could safeguard our secrets in the cloud. IEEE Spectr. 60(12), 22\u201329 (2023)","journal-title":"IEEE Spectr."},{"key":"21_CR29","unstructured":"Reed, D., Law, J., Hardman, D.: The technical foundations of Sovrin. The Technical Foundations of Sovrin (2016)"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Schmitt, P., Iyengar, J., Wood, C., Raghavan, B.: The decoupling principle: a practical privacy framework. HotNets, Association for Computing Machinery (2022)","DOI":"10.1145\/3563766.3564112"},{"key":"21_CR31","unstructured":"Schwoon, S., Wang, H., Jha, S., Reps, T.: Distributed certificate-chain discovery in SPKI\/SDSI. Technical report. University of Wisconsin-Madison Department of Computer Sciences (2005)"},{"key":"21_CR32","unstructured":"Sporny, M., Longley, D., Sabadello, M., Reed, D., Steele, O., Allen, C.: Decentralized Identifiers (DIDs) v1.0 (2022). https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"21_CR33","doi-asserted-by":"publisher","unstructured":"Wouters, P.: DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP. RFC 7929 (2016). https:\/\/doi.org\/10.17487\/RFC7929","DOI":"10.17487\/RFC7929"},{"key":"21_CR34","unstructured":"Ylonen, T., Thomas, B., Lampson, B., Ellison, C., Rivest, R.L., Frantz, W.S.: SPKI Certificate Theory. RFC 2693 (1999)"},{"key":"21_CR35","unstructured":"Zhang, L., et al.: Identity confusion in WebView-based mobile app-in-app ecosystems. In: 31st USENIX Security Symposium, pp. 1597\u20131613. USENIX Association (2022)"},{"key":"21_CR36","unstructured":"Zhou, L., et al.: Policycomp: counterpart comparison of privacy policies uncovers overbroad personal data collection practices. In: Proceedings of the 32nd USENIX Conference on Security Symposium, SEC 2023. USENIX Association, USA (2023)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80020-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T08:06:14Z","timestamp":1734163574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80020-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9783031800191","9783031800207"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80020-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}