{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T10:51:19Z","timestamp":1775559079999,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819583980","type":"print"},{"value":"9789819583997","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-8399-7_20","type":"book-chapter","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T09:56:15Z","timestamp":1775555775000},"page":"359-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Updatable Verifiable Credential Sharing with\u00a0Selective Disclosure"],"prefix":"10.1007","author":[{"given":"Jui-Yung","family":"Lin","sequence":"first","affiliation":[]},{"given":"Xingfu","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Wing W. Y.","family":"Ng","sequence":"additional","affiliation":[]},{"given":"Gong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,8]]},"reference":[{"key":"20_CR1","unstructured":"Brands, S.: A technical overview of digital credentials (2002)"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102512","volume":"58","author":"RA Mishra","year":"2021","unstructured":"Mishra, R.A., Kalla, A., Braeken, A., Liyanage, M.: Privacy protected blockchain based architecture and implementation for sharing of students\u2019 credentials. Inf. Process. Manag. 58(3), 102512 (2021)","journal-title":"Inf. Process. Manag."},{"issue":"7","key":"20_CR3","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1038\/s41588-020-0651-0","volume":"52","author":"L Bonomi","year":"2020","unstructured":"Bonomi, L., Huang, Y., Ohno-Machado, L.: Privacy challenges and research opportunities for genomic data sharing. Nat. Genet. 52(7), 646\u2013654 (2020)","journal-title":"Nat. Genet."},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"16440","DOI":"10.1109\/ACCESS.2020.2967218","volume":"8","author":"Q Zhou","year":"2020","unstructured":"Zhou, Q., Huang, H., Zheng, Z., Bian, J.: Solutions to scalability of blockchain: a survey. IEEE Access 8, 16440\u201316455 (2020)","journal-title":"IEEE Access"},{"issue":"6","key":"20_CR5","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","volume":"15","author":"J Huang","year":"2019","unstructured":"Huang, J., Kong, L., Chen, G., Min-You, W., Liu, X., Zeng, P.: Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans. Ind. Inf. 15(6), 3680\u20133689 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Islam, M.R., et al.: A review on blockchain security issues and challenges. In: 2021 IEEE 12th Control and System Graduate Research Colloquium, pp. 227\u2013232 (2021)","DOI":"10.1109\/ICSGRC53186.2021.9515276"},{"key":"20_CR7","unstructured":"Nakamoto, S.,\u00a0Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin 4(2), 15 (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"3132","DOI":"10.1109\/TIFS.2023.3274435","volume":"18","author":"Y Liu","year":"2023","unstructured":"Liu, Y., He, D., Feng, Q., Luo, M., Choo, K.K.R.: Perce: a permissioned redactable credentials scheme for a period of membership. IEEE Trans. Inf. Forensics Secur. 18, 3132\u20133142 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Mukta, R., Martens, J., Paik, H.Y., Lu, Q., Kanhere, S.S.: Blockchain-based verifiable credential sharing with selective disclosure. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 959\u2013966. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00128"},{"issue":"16","key":"20_CR10","doi-asserted-by":"publisher","first-page":"15138","DOI":"10.1109\/JIOT.2022.3147925","volume":"9","author":"T Li","year":"2022","unstructured":"Li, T., Wang, H., He, D., Jia, Yu.: Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9(16), 15138\u201315149 (2022)","journal-title":"IEEE Internet Things J."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Sanders, O.: Efficient redactable signature and application to anonymous credentials. In: IACR International Conference on Public-Key Cryptography, pp. 628\u2013656. Springer, Heidelberg (2020)","DOI":"10.1007\/978-3-030-45388-6_22"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 93\u2013118. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44987-6_7"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van\u00a0Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21\u201330 (2002)","DOI":"10.1145\/586110.586114"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/s00145-012-9126-5","volume":"26","author":"L Steve","year":"2013","unstructured":"Steve, L., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. J. Cryptol. 26(2), 340\u2013373 (2013)","journal-title":"J. Cryptol."},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 114\u2013127. Springer, Heidelberg (2005)","DOI":"10.1007\/11426639_7"},{"key":"20_CR16","unstructured":"Nguyen, T.: Gradubique: an academic transcript database using blockchain architecture (2018)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"issue":"6","key":"20_CR18","doi-asserted-by":"publisher","first-page":"5826","DOI":"10.1109\/TVT.2020.2968094","volume":"69","author":"K Fan","year":"2020","unstructured":"Fan, K., et al.: A secure and verifiable data sharing scheme based on blockchain in vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5826\u20135835 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Sonnino, A., Al-Bassam, M., Bano, S., Meiklejohn, S., Danezis, G.: Coconut: threshold issuance selective disclosure credentials with applications to distributed ledgers. arXiv preprint arXiv:1802.07344 (2018)","DOI":"10.14722\/ndss.2019.23272"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Belchior, R., Putz, B., Pernul, G., Correia, M., Vasconcelos, A., Guerreiro, S.: Ssibac: self-sovereign identity based access control. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1935\u20131943. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00264"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Xu, J., Xue, K., Tian, H., Hong, J., Wei, D.S.L., Hong, P.: An identity management and authentication scheme based on redactable blockchain for mobile networks. IEEE Trans. Veh. Technol. 69(6), 6688\u20136698 (2020)","DOI":"10.1109\/TVT.2020.2986041"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 369\u2013378. Springer, Heidelberg (1987)","DOI":"10.1007\/3-540-48184-2_32"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Libert, B., Yung, M.: Concise mercurial vector commitments and independent zero-knowledge sets with short proofs. In: Theory of Cryptography Conference, pp. 499\u2013517. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-11799-2_30"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Catalano, D., Fiore, D.: Vector commitments and their applications. In: Public-Key Cryptography-PKC 2013, pp. 55\u201372 (2013)","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Papamanthou, C., Shi, E., Tamassia, R., Yi, K.: Streaming authenticated data structures. In: Advances in Cryptology-EUROCRYPT 2013, pp. 353\u2013370 (2013)","DOI":"10.1007\/978-3-642-38348-9_22"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Gorbunov, S., Reyzin, L., Wee, H., Zhang, Z.: Pointproofs: aggregating proofs for multiple vector commitments. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 2007\u20132023 (2020)","DOI":"10.1145\/3372297.3417244"},{"key":"20_CR27","unstructured":"Nicolescu, I.A.T.: How to keep a secret and share a public key (using polynomial commitments). PhD thesis, Massachusetts Institute of Technology (2020)"},{"key":"20_CR28","unstructured":"Srinivasan, S., Chepurnoy, A., Papamanthou, C., Tomescu, A., Zhang, Y.: Hyperproofs: aggregating and maintaining proofs in vector commitments. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 3001\u20133018 (2022)"},{"issue":"2014","key":"20_CR29","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-8399-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T09:56:22Z","timestamp":1775555782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-8399-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819583980","9789819583997"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-8399-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"8 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ieee-cybermatics.org\/2025\/ica3pp\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}