{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:10Z","timestamp":1749874090559,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":74,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_19","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:03Z","timestamp":1749846183000},"page":"379-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Information-Sharing System that\u00a0Guarantees the\u00a0Authenticity and\u00a0Privacy of\u00a0Contributors"],"prefix":"10.1007","author":[{"given":"Mebae","family":"Ushida","sequence":"first","affiliation":[]},{"given":"Takeshi","family":"Miyamae","sequence":"additional","affiliation":[]},{"given":"Takeru","family":"Fukuoka","sequence":"additional","affiliation":[]},{"given":"Yoshiyuki","family":"Sakamaki","sequence":"additional","affiliation":[]},{"given":"Yoshitomo","family":"Sakuma","sequence":"additional","affiliation":[]},{"given":"Kota","family":"Miyake","sequence":"additional","affiliation":[]},{"given":"Takuya","family":"Sakamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"19_CR1","unstructured":"Decentralized identifiers (dids) v1.0. https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"19_CR2","unstructured":"Decentralized identity own and control your identity. https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE2DjfY\/"},{"key":"19_CR3","unstructured":"Dif - decentralized identity foundation. https:\/\/identity.foundation\/"},{"key":"19_CR4","unstructured":"Github - zokrates\/zokrates: A toolbox for zksnarks on ethereum. https:\/\/github.com\/Zokrates\/ZoKrates"},{"key":"19_CR5","unstructured":"Hyperledger indy - hyperledger foundation. https:\/\/www.hyperledger.org\/use\/hyperledger-indy"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Iso\/iec 24760-1:2019 it security and privacy - a framework for identity management - part 1: terminology and concepts. https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:24760:-1:ed-2:v1:en","DOI":"10.55621\/idpro.30"},{"key":"19_CR7","unstructured":"Verifiable credentials data model v2.0. https:\/\/www.w3.org\/TR\/vc-data-model-2.0\/"},{"key":"19_CR8","unstructured":"Web5 | tbd. https:\/\/developer.tbd.website\/projects\/web5\/"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Akama, K., Nakatsuka, Y., Sato, M., Uehara, K.: Scrappy: secure rate assuring protocol with privacy. In: NDSS (2024)","DOI":"10.14722\/ndss.2024.24445"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/ACCESS.2017.2656635","volume":"5","author":"M Al-Qurishi","year":"2017","unstructured":"Al-Qurishi, M., Al-Rakhami, M., Alamri, A., Alrubaian, M., Rahman, S., Hossain, M.S.: Sybil defense techniques in online social networks: a survey. IEEE Access 5, 1200\u20131219 (2017)","journal-title":"IEEE Access"},{"key":"19_CR11","unstructured":"Alam, F., et al.: A survey on multimodal disinformation detection. arXiv preprint arXiv:2103.12541 (2021)"},{"key":"19_CR12","unstructured":"Allen, C.: The path to self-sovereign identity. http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html"},{"issue":"3","key":"19_CR13","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MS.2021.3086718","volume":"39","author":"M Bell\u00e9s-Mu\u00f1oz","year":"2021","unstructured":"Bell\u00e9s-Mu\u00f1oz, M., Baylina, J., Daza, V., Mu\u00f1oz-Tapia, J.L.: New privacy practices for blockchain software. IEEE Softw. 39(3), 43\u201349 (2021)","journal-title":"IEEE Softw."},{"issue":"6","key":"19_CR14","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1109\/TDSC.2022.3232813","volume":"20","author":"M Bell\u00e9s-Mu\u00f1oz","year":"2022","unstructured":"Bell\u00e9s-Mu\u00f1oz, M., Isabel, M., Mu\u00f1oz-Tapia, J.L., Rubio, A., Baylina, J.: Circom: a circuit description language for building zero-knowledge applications. IEEE Trans. Dependable Secure Comput. 20(6), 4733\u20134751 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from bitcoin. Cryptology ePrint Archive, Paper 2014\/349 (2014). https:\/\/eprint.iacr.org\/2014\/349","DOI":"10.1109\/SP.2014.36"},{"key":"19_CR16","unstructured":"Bichsel, P., et al.: Cryptographic protocols of the identity mixer library. In: Technical Report, vol. 99740, p.\u00a03730 (2009)"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s00145-016-9241-9","volume":"30","author":"N Bitansky","year":"2017","unstructured":"Bitansky, N., et al.: The hunting of the snark. J. Cryptol. 30(4), 989\u20131066 (2017)","journal-title":"J. Cryptol."},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-642-36594-2_18","volume-title":"Theory of Cryptography","author":"N Bitansky","year":"2013","unstructured":"Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O., Ostrovsky, R.: Succinct non-interactive arguments via linear interactive proofs. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 315\u2013333. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36594-2_18"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Borge, M., Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Ford, B.: Proof-of-personhood: Redemocratizing permissionless cryptocurrencies. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 23\u201326. IEEE (2017)","DOI":"10.1109\/EuroSPW.2017.46"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Bowe, S., Chiesa, A., Green, M., Miers, I., Mishra, P., Wu, H.: Zexe: enabling decentralized private computation. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 947\u2013964. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00050"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132\u2013145 (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315\u2013334. IEEE (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Buterin, V., Illum, J., Nadler, M., Sch\u00e4r, F., Soleimani, A.: Blockchain privacy and regulatory compliance: towards a practical equilibrium. Blockchain: Res. Appl. 5(1), 100176 (2024)","DOI":"10.1016\/j.bcra.2023.100176"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-31301-6_1","volume-title":"Selected Areas in Cryptography \u2013 SAC 2015","author":"J Camenisch","year":"2016","unstructured":"Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pedersen, M.\u00d8.: Formal treatment of privacy-enhancing credential systems. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 3\u201324. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_1"},{"key":"19_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268\u2013289. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36413-7_20"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56\u201372. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_4"},{"issue":"10","key":"19_CR27","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-47721-7_10","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"D Chaum","year":"1987","unstructured":"Chaum, D., Evertse, J.-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118\u2013167. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_10"},{"key":"19_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_22"},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1007\/978-3-030-45721-1_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"A Chiesa","year":"2020","unstructured":"Chiesa, A., Hu, Y., Maller, M., Mishra, P., Vesely, N., Ward, N.: Marlin: preprocessing zkSNARKs with universal and updatable SRS. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 738\u2013768. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_26"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/978-3-030-45721-1_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"A Chiesa","year":"2020","unstructured":"Chiesa, A., Ojha, D., Spooner, N.: Fractal: post-quantum and transparent recursive proofs from holography. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 769\u2013793. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_27"},{"key":"19_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/0-387-34799-2_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"IB Damg\u00e5rd","year":"1990","unstructured":"Damg\u00e5rd, I.B.: Payment systems and credential mechanisms with provable security against abuse by individuals. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 328\u2013335. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34799-2_26"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Dzurenda, P., Casanova-Marqu\u00e9s, R., Malina, L., Hajny, J.: Real-world deployment of privacy-enhancing authentication system using attribute-based credentials. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp.\u00a01\u20139 (2022)","DOI":"10.1145\/3538969.3543803"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Eberhardt, J., Tai, S.: Zokrates-scalable privacy-preserving off-chain computations. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1084\u20131091. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Fang, Z., Darais, D., Near, J.P., Zhang, Y.: Zero knowledge static program analysis. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2951\u20132967 (2021)","DOI":"10.1145\/3460120.3484795"},{"key":"19_CR36","unstructured":"Gabizon, A., Williamson, Z.J., Ciobotaru, O.: Plonk: permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive (2019)"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Green, M., Hall-Andersen, M., Hennenfent, E., Kaptchuk, G., Perez, B., Van\u00a0Laer, G.: Efficient proofs of software exploitability for real-world processors. Proc. Priv. Enhanc. Technol. (2023)","DOI":"10.56553\/popets-2023-0036"},{"key":"19_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"19_CR39","unstructured":"Grubbs, P., Arun, A., Zhang, Y., Bonneau, J., Walfish, M.: $$\\{$$Zero-Knowledge$$\\}$$ middleboxes. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 4255\u20134272 (2022)"},{"issue":"18","key":"19_CR40","doi-asserted-by":"publisher","first-page":"3836","DOI":"10.1002\/sec.1304","volume":"8","author":"J Hajny","year":"2015","unstructured":"Hajny, J., Dzurenda, P., Malina, L.: Attribute-based credentials with cryptographic collusion prevention. Secur. Commun. Netw. 8(18), 3836\u20133846 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"19_CR41","unstructured":"Iden3: Github - iden3\/snarkjs: zksnark implementation in javascript & wasm. https:\/\/github.com\/iden3\/snarkjs"},{"key":"19_CR42","unstructured":"Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S.M., Felten, E.W.: Arbitrum: scalable, private smart contracts. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1353\u20131370 (2018)"},{"key":"19_CR43","unstructured":"Lab, S.: Github - scipr-lab\/libsnark: C++ library for zksnarks. https:\/\/github.com\/scipr-lab\/libsnark"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"Lee, S., Ko, H., Kim, J., Oh, H.: VCNN: verifiable convolutional neural network based on zk-snarks. IEEE Trans. Dependable Secure Comput. (2024)","DOI":"10.1109\/TDSC.2023.3348760"},{"key":"19_CR45","doi-asserted-by":"crossref","unstructured":"Lenders, V., Koukoumidis, E., Zhang, P., Martonosi, M.: Location-based trust for mobile user-generated content: applications, challenges and implementations. In: Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, pp. 60\u201364 (2008)","DOI":"10.1145\/1411759.1411775"},{"key":"19_CR46","doi-asserted-by":"crossref","unstructured":"Liu, T., Xie, X., Zhang, Y.: ZKCNN: zero knowledge proofs for convolutional neural network predictions and accuracy. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2968\u20132985 (2021)","DOI":"10.1145\/3460120.3485379"},{"key":"19_CR47","unstructured":"Lodder, M., Khovratovich, D.: Anonymous credentials 2.0 - hyperledger (2019)"},{"key":"19_CR48","unstructured":"Lofferto, D.: Self-sovereign identity the moxy tongue. https:\/\/www.moxytongue.com\/2016\/02\/self-sovereign-identity.html#!\/2016\/02\/self-sovereign-identity.html"},{"key":"19_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-46513-8_14","volume-title":"Selected Areas in Cryptography","author":"A Lysyanskaya","year":"2000","unstructured":"Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H., Adams, C. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184\u2013199. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-46513-8_14"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"Maganis, G., Shi, E., Chen, H., Song, D.: Opaak: using mobile phones to limit anonymous identities online. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 295\u2013308 (2012)","DOI":"10.1145\/2307636.2307664"},{"key":"19_CR51","doi-asserted-by":"crossref","unstructured":"Maram, D., et al.: Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1348\u20131366. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00038"},{"key":"19_CR52","doi-asserted-by":"crossref","unstructured":"Moriyama, K., Otsuka, A.: Permissionless blockchain-based sybil-resistant self-sovereign identity utilizing attested execution secure processors. In: 2022 IEEE International Conference on Blockchain (Blockchain), pp. 1\u201310. IEEE (2022)","DOI":"10.1109\/Blockchain55522.2022.00012"},{"key":"19_CR53","unstructured":"Nakatsuka, Y., Ozturk, E., Paverd, A., Tsudik, G.: $$\\{$$CACTI$$\\}$$: captcha avoidance via client-side $$\\{$$TEE$$\\}$$ integration. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2561\u20132578 (2021)"},{"key":"19_CR54","unstructured":"Ohlhaver, P., Weyl, E.G., Buterin, V.: Decentralized society: Finding web3\u2019s soul. SSRN 4105763 (2022)"},{"key":"19_CR55","unstructured":"Paquin, C.: U-prove technology overview v1. 1. Microsoft Corporation Draft Revision 1 (2011)"},{"issue":"2","key":"19_CR56","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2856449","volume":"59","author":"B Parno","year":"2016","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. Commun. ACM 59(2), 103\u2013112 (2016)","journal-title":"Commun. ACM"},{"key":"19_CR57","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)"},{"key":"19_CR58","unstructured":"Rathee, D., Policharla, G.V., Xie, T., Cottone, R., Song, D.: Zebra: snark-based anonymous credentials for practical, private and accountable on-chain access control. Cryptology ePrint Archive (2022)"},{"key":"19_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-70972-7_1","volume-title":"Financial Cryptography and Data Security","author":"S Ringers","year":"2017","unstructured":"Ringers, S., Verheul, E., Hoepman, J.-H.: An efficient self-blindable attribute-based credential scheme. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 3\u201320. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_1"},{"key":"19_CR60","doi-asserted-by":"crossref","unstructured":"Rosenberg, M., White, J., Garman, C., Miers, I.: zk-creds: flexible anonymous credentials from zksnarks and existing identity infrastructure. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 790\u2013808. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179430"},{"key":"19_CR61","unstructured":"Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)"},{"key":"19_CR62","doi-asserted-by":"crossref","unstructured":"Smart, P.N.: Cryptography Made Simple. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-21936-3"},{"key":"19_CR63","unstructured":"Song, R., CC, B.: Linkdid: a privacy-preserving, sybil-resistant and key-recoverable decentralized identity scheme. arXiv preprint arXiv:2307.14679 (2023)"},{"key":"19_CR64","doi-asserted-by":"publisher","first-page":"93039","DOI":"10.1109\/ACCESS.2022.3200051","volume":"10","author":"LT Thibault","year":"2022","unstructured":"Thibault, L.T., Sarry, T., Hafid, A.S.: Blockchain scaling using rollups: a comprehensive survey. IEEE Access 10, 93039\u201393054 (2022)","journal-title":"IEEE Access"},{"key":"19_CR65","unstructured":"Tran, D.N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: NSDI, vol. 9, pp. 15\u201328 (2009)"},{"key":"19_CR66","unstructured":"Wang, G., et al.: Social turing tests: crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)"},{"key":"19_CR67","unstructured":"Weng, C., Yang, K., Xie, X., Katz, J., Wang, X.: Mystique: efficient conversions for $$\\{$$Zero-Knowledge$$\\}$$ proofs with applications to machine learning. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 501\u2013518 (2021)"},{"issue":"5","key":"19_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102610","volume":"58","author":"J Xue","year":"2021","unstructured":"Xue, J., Wang, Y., Tian, Y., Li, Y., Shi, L., Wei, L.: Detecting fake news by exploring the consistency of multimodal data. Inf. Process. Manag. 58(5), 102610 (2021)","journal-title":"Inf. Process. Manag."},{"issue":"1","key":"19_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2556609","volume":"8","author":"Z Yang","year":"2014","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. ACM Trans. Knowl. Disc. Data (TKDD) 8(1), 1\u201329 (2014)","journal-title":"ACM Trans. Knowl. Disc. Data (TKDD)"},{"key":"19_CR70","doi-asserted-by":"crossref","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: a near-optimal social network defense against sybil attacks. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 3\u201317. IEEE (2008)","DOI":"10.1109\/SP.2008.13"},{"key":"19_CR71","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 267\u2013278 (2006)","DOI":"10.1145\/1159913.1159945"},{"key":"19_CR72","unstructured":"Zhang, C., DeStefano, Z., Arun, A., Bonneau, J., Grubbs, P., Walfish, M.: Zombie: middleboxes that $$\\{$$Don\u2019t$$\\}$$ snoop. In: 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), pp. 1917\u20131936 (2024)"},{"key":"19_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, J., Fang, Z., Zhang, Y., Song, D.: Zero knowledge proofs for decision tree predictions and accuracy. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 2039\u20132053 (2020)","DOI":"10.1145\/3372297.3417278"},{"key":"19_CR74","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zheng, H., Li, X., Du, S., Zhu, H.: You are where you have been: sybil detection via geo-location analysis in osns. In: 2014 IEEE Global Communications Conference, pp. 698\u2013703. IEEE (2014)","DOI":"10.1109\/GLOCOM.2014.7036889"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:14Z","timestamp":1749846194000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":74,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}