{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:13:07Z","timestamp":1748664787609,"version":"3.41.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031945748","type":"print"},{"value":"9783031945755","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94575-5_21","type":"book-chapter","created":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T02:15:15Z","timestamp":1748657715000},"page":"383-402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RDF-Based Semantics for\u00a0Selective Disclosure and\u00a0Zero-Knowledge Proofs on\u00a0Verifiable Credentials"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5843-0316","authenticated-orcid":false,"given":"Christoph H.-J.","family":"Braun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0576-7457","authenticated-orcid":false,"given":"Tobias","family":"K\u00e4fer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,1]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Alvestrand, H.: Tags for the identification of languages. Best current practice, IETF (2001). https:\/\/www.ietf.org\/rfc\/rfc3066.txt","DOI":"10.17487\/rfc3066"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-taa. In: Proceedings of the 5th SCN (2006)","DOI":"10.1007\/11832072_8"},{"key":"21_CR3","unstructured":"Baum, C., et al.: Cryptographers\u2019 Feedback on the EU Digital Identity\u2019s ARF (June 2024). https:\/\/github.com\/user-attachments\/files\/15904122\/cryptographers-feedback.pdf, see also https:\/\/github.com\/eu-digital-identity-wallet\/eudi-doc-architecture-and-reference-framework\/issues\/200"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Masinter, L.: Uniform resource identifier (uri): generic syntax. Internet standards track document, IETF (January 2005). https:\/\/www.ietf.org\/rfc\/rfc3986.txt","DOI":"10.17487\/rfc3986"},{"key":"21_CR5","unstructured":"Bernstein, G., Sporny, M.: Data integrity bbs cryptosuites v1.0. W3c candidate recommendation draft, W3C Verifiable Credentials Working Group (2024). https:\/\/www.w3.org\/TR\/vc-di-bbs\/"},{"key":"21_CR6","unstructured":"Bitkom Arbeitskreis Digitale Identit\u00e4ten: EU Digital Identity Wallet (2025). Bitkom e.V. https:\/\/www.bitkom.org\/sites\/main\/files\/2025-01\/bitkom-whitepaper-organisationsidentitaeten.pdf. Accessed 11 Mar 2025"},{"key":"21_CR7","unstructured":"Brands, S.: A technical overview of digital credentials (2002). https:\/\/api.semanticscholar.org\/CorpusID:18284690"},{"key":"21_CR8","unstructured":"Braun, C., K\u00e4fer, T.: Attribute-based access control on solid pods using privacy-friendly credentials. In: Proceedings of the Posters & Demos at the 18th SEMANTiCS. CEUR Workshop Proceedings, vol.\u00a03235. CEUR-WS.org (2022)"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Braun, C.H.J., Papanchev, V., K\u00e4fer, T.: SISSI: an architecture for semantic interoperable self-sovereign identity-based access control on the Web. In: Proceedings of the 32nd Web Conference (WWW), pp. 3011\u20133021. ACM, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3543507.3583409","DOI":"10.1145\/3543507.3583409"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous attestation using the strong diffie hellman assumption revisited. IACR Cryptol. ePrint Arch, p.\u00a0663 (2016). http:\/\/eprint.iacr.org\/2016\/663","DOI":"10.1007\/978-3-319-45572-3_1"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Revised Papers of the 3rd SCN. LNCS, vol.\u00a02576, pp. 268\u2013289. Springer (2002)","DOI":"10.1007\/3-540-36413-7_20"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Campanelli, M., Fiore, D., Querol, A.: Legosnark: modular design and composition of succinct zero-knowledge proofs. IACR Cryptol. ePrint Arch. p.\u00a0142 (2019)","DOI":"10.1145\/3319535.3339820"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. IACR Cryptol. ePrint Arch. p.\u00a0140 (2002). http:\/\/eprint.iacr.org\/2002\/140","DOI":"10.1145\/509978.509980"},{"key":"21_CR14","unstructured":"Capadisli, S., Berners-Lee, T., Verborgh, R., Kjernsmo, K.: Solid protocol. Version 0.9.0, W3C Solid Community Group (December 2021). https:\/\/solidproject.org\/TR\/protocol"},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Carroll, J.J., Bizer, C., Hayes, P.J., Stickler, P.: Named graphs, provenance and trust. In: Ellis, A., Hagino, T. (eds.) Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, 10\u201314 May 2005, pp. 613\u2013622. ACM (2005). https:\/\/doi.org\/10.1145\/1060745.1060835","DOI":"10.1145\/1060745.1060835"},{"key":"21_CR16","unstructured":"Curran, S., et al.: Anoncreds specification. v1.0 draft, Hyperledger AnonCreds Working Group (2024). https:\/\/hyperledger.github.io\/anoncreds-spec\/"},{"key":"21_CR17","unstructured":"Cyganiak, R., Wood, D., Lanthaler, M.: Rdf 1.1 concepts and abstract syntax. W3C Recommendation, W3C (2014). https:\/\/www.w3.org\/TR\/rdf11-concepts\/"},{"key":"21_CR18","unstructured":"European Commission: EU Digital Identity Wallet (2024). https:\/\/ec.europa.eu\/digital-building-blocks\/sites\/display\/EUDIGITALIDENTITYWALLET\/. Accessed 17 Sep 2024"},{"key":"21_CR19","unstructured":"European Commission: Regulation (eu) 2024\/1183 of the european parliament and of the council amending regulation (eu) no 910\/2014 as regards establishing the european digital identity framework (2024). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L_202401183. Accessed 17 Sep 2024"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Fielding, R., Reschke, J.: Hypertext transfer protocol (http\/1.1): Message syntax and routing. Internet standards track document, IETF (June 2014). https:\/\/www.ietf.org\/rfc\/rfc7230.txt","DOI":"10.17487\/rfc7230"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the 17th ACM STOC, pp. 291\u2013304. ACM (1985)","DOI":"10.1145\/22145.22178"},{"key":"21_CR23","unstructured":"Hanssens, S., Vonner, F., Lisoir, X.: Digital identity (2021). PricewaterhouseCoopers, Soci\u00e9t\u00e9 coop\u00e9rative. https:\/\/www.pwc.lu\/en\/smart-identity\/docs\/pwc-digital-identity.pdf. Accessed 11 Mar 2025"},{"key":"21_CR24","unstructured":"Harris, S., Seaborne, A.: Sparql 1.1 query language. W3C Recommendation, W3C (2013). https:\/\/www.w3.org\/TR\/sparql11-query\/"},{"key":"21_CR25","unstructured":"Hayes, P., Patel-Schneider, P.F.: Rdf 1.1 semantics. W3C Recommendation, W3C (2014). https:\/\/www.w3.org\/TR\/rdf11-mt\/"},{"key":"21_CR26","unstructured":"IEEE, The Open Group: The open group base specifications issue 7, 2018 edition. IEEE Std 1003.1-2017, IEEE and The Open Group (2017). https:\/\/pubs.opengroup.org\/onlinepubs\/9699919799\/basedefs\/V1_chap04.html#tag_04_15"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., Sakimura, N.: Json web token (jwt). Internet standards track document, IETF (May 2015). https:\/\/www.ietf.org\/rfc\/rfc7519.txt","DOI":"10.17487\/RFC7519"},{"key":"21_CR28","unstructured":"Kilian, J.: Uses of Randomness in Algorithms and Protocols. MIT Press, Cambridge (1990)"},{"key":"21_CR29","unstructured":"Knublauch, H., Kontokostas, D.: Shapes constraint language (shacl). W3C Recommendation, W3C (July 2017). https:\/\/www.w3.org\/TR\/shacl\/"},{"key":"21_CR30","unstructured":"Longley, D., Kellogg, G., Yamamoto, D.: RDF dataset canonicalization a standard RDF dataset canonicalization algorithm. W3C recommendation, W3C (2024). https:\/\/www.w3.org\/TR\/rdf-canon\/"},{"key":"21_CR31","unstructured":"Looker, T., Steele, O.: Bbs+ signatures 2020. Draft cg report, W3C Credentials Community Group (2023). https:\/\/w3c-ccg.github.io\/ldp-bbs2020\/#the-bbs-signature-suite-2020"},{"key":"21_CR32","unstructured":"National Security Agency: Common Criteria for information technology security evaluation (CCMB-2017-04-002) (2017). https:\/\/www.commoncriteriaportal.org\/files\/ccfiles\/CCPART2V3.1R5.pdf"},{"key":"21_CR33","unstructured":"Peterson, D., Gao, S., Malhotra, A., Sperberg-McQueen, C.M., Thompson, H.S.: W3C XML schema definition language (XSD) 1.1 part 2: Datatypes. W3C recommendation, W3C (2012). https:\/\/www.w3.org\/TR\/xmlschema11-2\/"},{"key":"21_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"CP Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239\u2013252. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_22"},{"key":"21_CR35","unstructured":"Sporny, M., Longley, D., Bernstein, G., Zagidulin, D., Crane, S.: Verifiable credential data integrity 1.0. W3c candidate recommendation draft, W3C Verifiable Credentials Working Group (2024). https:\/\/www.w3.org\/TR\/vc-data-integrity\/"},{"key":"21_CR36","unstructured":"Sporny, M., Noble, G., Longley, D., Burnett, D.C., Zundel, B., Hartog, K.D.: Verifiable credentials data model v1.1. W3C recommendation, W3C (2022). https:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"21_CR37","unstructured":"Vitto, G., Biryukov, A.: Dynamic universal accumulator with batch update over bilinear groups. IACR Cryptol. ePrint Arch. p.\u00a0777 (2020). https:\/\/eprint.iacr.org\/2020\/777"},{"key":"21_CR38","doi-asserted-by":"publisher","unstructured":"Yamamoto, D., Suga, Y., Sako, K.: Formalising linked-data based verifiable credentials for selective disclosure. In: IEEE European Symposium on Security and Privacy, EuroS &P 2022 - Workshops, Genoa, Italy, 6\u201310 June 2022. pp. 52\u201365. IEEE (2022). https:\/\/doi.org\/10.1109\/EUROSPW55150.2022.00013","DOI":"10.1109\/EUROSPW55150.2022.00013"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Yergeau, F.: Utf-8, a transformation format of iso 10646. Internet standards track document, IETF (November 2003). https:\/\/www.ietf.org\/rfc\/rfc3629.txt","DOI":"10.17487\/rfc3629"},{"key":"21_CR40","unstructured":"Zimmermann, A.: RDF 1.1: On semantics of RDF datasets. W3C working group note, W3C (February 2014). https:\/\/www.w3.org\/TR\/rdf11-datasets\/"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94575-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T02:15:39Z","timestamp":1748657739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94575-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031945748","9783031945755"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94575-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESWC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Semantic Web Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portoroz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esws2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.eswc-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}