{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:59:04Z","timestamp":1760043544253,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_22","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"390-407","source":"Crossref","is-referenced-by-count":35,"title":["A User-Centric System for Verified Identities on the Bitcoin Blockchain"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Augot","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Chenevier","sequence":"additional","affiliation":[]},{"given":"William","family":"George","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Lambert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"22_CR1","unstructured":"CryptID. Source code https:\/\/github.com\/CryptidID\/Cryptid . Consulted April 2017. http:\/\/cryptid.xyz\/"},{"key":"22_CR2","unstructured":"IDCoins. Consulted April 2017. https:\/\/github.com\/IDCoin\/IDCoin"},{"key":"22_CR3","unstructured":"Predicting Bitcoin fees for transactions, Consulted April 2017. https:\/\/bitcoinfees.21.co\/"},{"key":"22_CR4","unstructured":"Estonian e-residency, Consulted March 2017. https:\/\/e-estonia.com\/e-residents\/about\/"},{"issue":"5","key":"22_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/2670528","volume":"58","author":"S Abiteboul","year":"2015","unstructured":"Abiteboul, S., Andr\u00e9, B., Kaplan, D.: Managing your digital life. Commun. ACM 58(5), 32\u201335 (2015)","journal-title":"Commun. ACM"},{"key":"22_CR6","unstructured":"Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchains. In: 2016 USENIX Annual Technical Conference (USENIX ATC 2016), Denver, CO, USA, June 22\u201324, 2016. Proceedings, pp. 181\u2013194 (2016)"},{"key":"22_CR7","volume-title":"Mastering Bitcoin","author":"AM Antonopoulos","year":"2015","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin. O\u2019Reilly Media, Sebastopol (2015). ISBN: 978-1-449-37404-4"},{"key":"22_CR8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates (Building in Privacy)","author":"S Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates (Building in Privacy). MIT Press, Cambridge (2000)"},{"issue":"1","key":"22_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2012.7","volume":"10","author":"J Camenisch","year":"2012","unstructured":"Camenisch, J., Lehmann, A., Neven, G.: Electronic identities need private credentials. IEEE Secur. Priv. 10(1), 80\u201383 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR10","unstructured":"Charlon, F.:. Open assets protocol (OAP\/1.0) (2011). https:\/\/github.com\/OpenAssets\/open-assets-protocol\/blob\/master\/specification.mediawiki"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M.: Accountable privacy for decentralized anonymous payments. In: Financial Cryptography and Data Security (2016)","DOI":"10.1007\/978-3-662-54970-4_5"},{"key":"22_CR12","unstructured":"The Bitcoin Core developers: Bitcoin transactions primitives code, Consulted March 2017. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/0.14\/src\/primitives\/transaction.h"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46803-6_10"},{"key":"22_CR14","unstructured":"Hardjono, T., Smith, N., (Sandy) Pentland, A.: Anonymous identities for permissioned blockchains, January 2016. http:\/\/www.the-blockchain.com\/docs\/MIT-ChainAnchor-DRAFT.pdf"},{"key":"22_CR15","unstructured":"Hay, S.: Bitcoin vs ethereum: Cryptocurrency comparison, March 2017. https:\/\/99bitcoins.com\/bitcoin-vs-ethereum-cryptocurrency-comparison\/"},{"key":"22_CR16","unstructured":"Jacobovitz, O.: Blockchain for identity management, December 2016. https:\/\/www.cs.bgu.ac.il\/%7Efrankel\/TechnicalReports\/2016\/16-02.pdf"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tome, W., Zhang, L., Choffnes, D.R., Levin, D., Maggs, B.M., Mislove, A., Schulman, A., Wilson, C.: An end-to-end measurement of certificate revocation in the web\u2019s PKI. In: Proceedings of the 2015 ACM Internet Measurement Conference, IMC 2015, Tokyo, Japan, October 28\u201330, 2015, pp. 183\u2013196 (2015)","DOI":"10.1145\/2815675.2815685"},{"key":"22_CR18","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"22_CR19","volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"22_CR20","unstructured":"Nazar\u00e9, J., Hamilton, K., Schmidt, P.: Digital certificates project. Source code https:\/\/github.com\/digital-certificates . Consulted December 2016. http:\/\/certificates.media.mit.edu"},{"key":"22_CR21","unstructured":"Office of the Privacy Commissionner of Canada. Privacy and your reputation - who shapes your identity online? (2012)"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-319-56614-6_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"R Pass","year":"2017","unstructured":"Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643\u2013673. Springer, Cham (2017). doi: 10.1007\/978-3-319-56614-6_22"},{"key":"22_CR23","unstructured":"Prisco, G.: Estonian government partnerts with bitnation to offer blockchain notarization services to e-residents, November 2015. https:\/\/bitcoinmagazine.com\/articles\/estonian-government-partners-with-bitnation-to-offer-blockchain-notarization-services-to-e-residents-1448915243\/"},{"key":"22_CR24","unstructured":"Security Team: Specification of the identity mixer cryptographic library version 2.3.0. Technical report RZ 3730, IBM Research, Computer Science Dept, IBM Research - Zurich, Switzerland, 48 pages (2010)"},{"key":"22_CR25","unstructured":"Torpey, K.: Are bitcoin miners making more money off small blocks? March 2017. https:\/\/bitcoinmagazine.com\/articles\/are-bitcoin-miners-making-more-money-small-blocks\/"},{"key":"22_CR26","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger, EIP-150 REVISION (030c1b5 - 10 July 2017). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"22_CR27","unstructured":"Yang, D., Gavigan, J., Wilcox-O\u2019Hearn, Z.: Survey of confidentiality and privacy preserving technologies for blockchains, November 2016. https:\/\/z.cash\/static\/R3_Confidentiality_and_Privacy_Report.pdf"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Symposium on Security and Privacy Workshops, SPW 2015, San Jose, CA, USA, May 21\u201322, 2015, pp. 180\u2013184. IEEE Computer Society, Los Alamitos (2015)","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:46:19Z","timestamp":1570085179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}