{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T11:52:46Z","timestamp":1769773966050,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557189","type":"print"},{"value":"9789819557196","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5719-6_39","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:53Z","timestamp":1769718893000},"page":"616-632","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["zkHARPS: A Decentralized Method for Cross-Chain Identity Aggregation and Privacy Proof"],"prefix":"10.1007","author":[{"given":"Hanyu","family":"Mao","sequence":"first","affiliation":[]},{"given":"Tiezheng","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Minghe","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaomei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xiaohua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"issue":"2327","key":"39_CR1","first-page":"4662","volume":"21","author":"G Wood","year":"2016","unstructured":"Wood, G.: POLKADOT: vision for a heterogeneous multi-chain framework. White paper 21(2327), 4662 (2016)","journal-title":"White paper"},{"issue":"22\u201323","key":"39_CR2","first-page":"5","volume":"1","author":"V Buterin","year":"2013","unstructured":"Buterin, V.: Ethereum white paper. GitHub Reposit. 1(22\u201323), 5\u20137 (2013)","journal-title":"GitHub Reposit."},{"issue":"4","key":"39_CR3","first-page":"1298","volume":"67","author":"T Hardjono","year":"2019","unstructured":"Hardjono, T., Lipton, A., Pentland, A.: Toward an interoperability architecture for blockchain autonomous systems. IEEE TEM 67(4), 1298\u20131309 (2019)","journal-title":"IEEE TEM"},{"key":"39_CR4","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press (2016)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E.: ZEROCASH: decentralized anonymous payments from bitcoin. In: Symposium on Security and Privacy, Berkeley, USA, 18\u201321 May, 2014, pp. 459\u2013474 (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"39_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102731","volume":"166","author":"Y Liu","year":"2020","unstructured":"Liu, Y., He, D., Obaidat, M., Kumar, N., Khan, M.: Blockchain-based identity management systems: a review. J. Netw. Comput. Appl. 166, 102731 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"39_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2018.3111247","volume":"16","author":"P Dunphy","year":"2018","unstructured":"Dunphy, P., Petitcolas, F.: A first look at identity management schemes on the blockchain. IEEE Secur. Priv. 16(4), 20\u201329 (2018)","journal-title":"IEEE Secur. Priv."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z.: HAWK: the blockchain model of cryptography and privacy-preserving smart contracts. In: Symposium on Security and Privacy, San Jose, USA, 22\u201326 May, 2016, pp. 839\u2013858 (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"39_CR9","unstructured":"Lundkvist, C., Heck, R., Torstensson, J., Mitton, Z., Sena, M.: UPORT: a platform for self-sovereign identity [EB\/OL] (2017). https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Bhattacharya, M., Zavarsky, P., Butakov, S.: Enhancing the security and privacy of self-sovereign identities on hyperledger indy blockchain. In: International Symposium on Networks, Computers and Communications, Montreal, Canada, 20\u201322 October, 2020, pp. 1\u20137 (2020)","DOI":"10.1109\/ISNCC49221.2020.9297357"},{"key":"39_CR11","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1007\/s00453-016-0221-0","volume":"79","author":"E Ben-Sasson","year":"2017","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., et al.: Scalable zero knowledge via cycles of elliptic curves. Algorithmica 79, 1102\u20131160 (2017)","journal-title":"Algorithmica"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Virza, M.: Scalable zero knowledge with no trusted setup. In: Advances in Cryptology\u2013CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part III 39. Springer International Publishing, 2019, pp. 701\u2013732 (2019)","DOI":"10.1007\/978-3-030-26954-8_23"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., et al.: BulletProofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 2018, pp. 315\u2013334 (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Xie, T., Zhang, J., Cheng, Z., et al.: ZKBRIDGE: trustless cross-chain bridges made practical. In: SIGSAC Conference on Computer and Communications Security, pp. 3003\u20133017 (2022)","DOI":"10.1145\/3548606.3560652"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Arade S, Pise N. ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy. Cybernetics and Information Technologies, 2025, 25(1)","DOI":"10.2478\/cait-2025-0001"},{"key":"39_CR16","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., et al.: Succinct {Non-Interactive} zero knowledge for a von neumann architecture. In: USENIX Security Symposium, pp. 781\u2013796 (2014)"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Advances in Cryptology\u2013EUROCRYPT, Vienna, Austria, May 8\u201312, 2016, pp. 305\u2013326(2016)","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Riabzev, M., et al.: AURORA: transparent succinct arguments for R1CS. In: Advances in Cryptology\u2013EUROCRYPT, Darmstadt, Germany, May 19\u201323, 2019, pp. 103\u2013128 (2019)","DOI":"10.1007\/978-3-030-17653-2_4"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5719-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:34:57Z","timestamp":1769718897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5719-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557189","9789819557196"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5719-6_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2025.sau.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}