{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:34:14Z","timestamp":1743104054336,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_6","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:00Z","timestamp":1741867920000},"page":"107-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Credential Issuance Transparency: A Privacy-Preserving Audit Log of\u00a0Credential Issuance"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1536-9233","authenticated-orcid":false,"given":"Edona","family":"Fasllija","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7351-8117","authenticated-orcid":false,"given":"Jakob","family":"Heher","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7076-7563","authenticated-orcid":false,"given":"Stefan","family":"More","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"6_CR1","unstructured":"Al-Bassam, M., Meiklejohn, S.: Contour: a practical system for binary transparency. CoRR abs\/1712.08427 (2017)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-662-53887-6_7","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"M Albrecht","year":"2016","unstructured":"Albrecht, M., Grassi, L., Rechberger, C., Roy, A., Tiessen, T.: MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 191\u2013219. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_7"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/11832072_8","volume-title":"Security and Cryptography for Networks","author":"MH Au","year":"2006","unstructured":"Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111\u2013125. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11832072_8"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Botrel, G., Piellard, T., Housni, Y.E., Kubjas, I., Tabaie, A.: Consensys\/gnark: v0.9.0, February 2023. https:\/\/doi.org\/10.5281\/zenodo.5819104","DOI":"10.5281\/zenodo.5819104"},{"key":"6_CR5","unstructured":"Cameron, K.: The laws of identity (2005)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Chase, M., Fuchsbauer, G., Ghosh, E., Plouviez, A.: Credential transparency system. In: International Conference on Security and Cryptography for Networks (2022)","DOI":"10.1007\/978-3-031-14791-3_14"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Chase, M., Meiklejohn, S.: Transparency overlays and applications. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978404"},{"key":"6_CR8","unstructured":"Crosby, S.A., Wallach, D.S.: Efficient data structures for tamper-evident logging. In: USENIX Security Symposium (2009)"},{"key":"6_CR9","unstructured":"Dang, Q.: Secure hash standard (SHS), 06 March 2012"},{"key":"6_CR10","unstructured":"Dworkin, M.: SHA-3 standard: permutation-based hash and extendable-output functions, 04 August 2015"},{"key":"6_CR11","unstructured":"ECRYPT VAMPIRE: Measurements of hash functions, index by machine (2024). https:\/\/bench.cr.yp.to\/results-hash.html"},{"key":"6_CR12","unstructured":"European Parliament, Council of the European Union: Regulation (EU) 2024\/1183 of the European Parliament and of the Council of 11 April 2024 amending Regulation (EU) No 910\/2014 as regards establishing the European Digital Identity Framework (eIDAS 2) (2024)"},{"key":"6_CR13","unstructured":"Gabizon, A., Williamson, Z.J., Ciobotaru, O.: PLONK: permutations over Lagrange-bases for oecumenical noninteractive arguments of knowledge. IACR Cryptol. ePrint Arch. (2019)"},{"key":"6_CR14","unstructured":"Godtschalk, L.: Accountability and access control using anonymous credentials (2022)"},{"key":"6_CR15","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems (2019)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"6_CR17","unstructured":"Guillevic, A., Singh, S.: On the alpha value of polynomials in the tower number field sieve algorithm. IACR Cryptol. ePrint Arch. (2019)"},{"key":"6_CR18","unstructured":"Hicks, A., Mavroudis, V., Al-Bassam, M., Meiklejohn, S., Murdoch, S.J.: VAMS: verifiable auditing of access to confidential data. CoRR abs\/1805.04772 (2018)"},{"key":"6_CR19","unstructured":"Hof, B., Carle, G.: Software distribution transparency and auditability (2017)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Laurie, B., et\u00a0al.: Certificate transparency v2.0. RFC 9162 (2021)","DOI":"10.17487\/RFC9162"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Li, B., et al.: Certificate transparency in the wild: exploring the reliability of monitors. In: CCS. ACM (2019)","DOI":"10.1145\/3319535.3345653"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Marquardt, F., Schmidt, C.: Don\u2019t stop at the top: using certificate transparency logs to extend domain lists for web security studies. In: LCN. IEEE (2020)","DOI":"10.1109\/LCN48667.2020.9314793"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_32"},{"key":"6_CR24","unstructured":"OASIS Security Services TC: Security assertion markup language (SAML) v2.0 technical overview (2008). https:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0-cd-02.html"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Roberts, R., Levin, D.: When certificate transparency is too transparent: analyzing information leakage in HTTPS domain names. In: WPES@CCS. ACM (2019)","DOI":"10.1145\/3338498.3358655"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Rosenberg, M., White, J., Garman, C., Miers, I.: zk-creds: flexible anonymous credentials from zksnarks and existing identity infrastructure. In: IEEE Symposium on Security and Privacy (2023)","DOI":"10.1109\/SP46215.2023.10179430"},{"key":"6_CR27","unstructured":"Sakimura, N., Bradley, J., Jones, M.B., de\u00a0Medeiros, B., Mortimore, C.: Openid connect core 1.0 (2014). https:\/\/openid.net\/specs\/openid-connect-core-1_0.html"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Saramago, R.Q., Jehl, L., Meling, H., Estrada-Gali\u00f1anes, V.: A tree-based construction for verifiable diplomas with issuer transparency. In: IEEE International Conference on DAPPS (2021)","DOI":"10.1109\/DAPPS52256.2021.00017"},{"key":"6_CR29","unstructured":"Saramago, R.Q., Meling, H., Jehl, L.N.: A privacy-preserving and transparent certification system for digital credentials. In: International Conference on Principles of Distributed Systems (OPODIS) (2023)"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Scheitle, Q., et al.: The rise of certificate transparency and its implications on the internet ecosystem (2018)","DOI":"10.1145\/3278532.3278562"},{"key":"6_CR31","unstructured":"Sporny, M., Longley, D., Chadwick, D.: Verifiable credentials data model v1.1 (2022). https:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Zwattendorfer, B., Zefferer, T., Stranacher, K.: An overview of cloud identity management-models. In: WEBIST (1). SciTePress (2014)","DOI":"10.1007\/978-3-319-27030-2_9"},{"key":"6_CR33","unstructured":"Melara, M., Blankstein, A., Bonneau, J., Felten, E., Freedman, M.: CONIKS: bringing key transparency to end users. In: 24th USENIX Security Symposium, USENIX Security 2015, Washington, D.C., USA, 12\u201314 August 2015, pp. 383\u2013398 (2015). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/melara"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:17Z","timestamp":1741867937000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}