{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T11:02:03Z","timestamp":1758279723207,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819707294"},{"type":"electronic","value":"9789819707300"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0730-0_22","type":"book-chapter","created":{"date-parts":[[2024,2,25]],"date-time":"2024-02-25T06:02:15Z","timestamp":1708840935000},"page":"243-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Preserving Educational Credentials Management Based on\u00a0Decentralized Identity and\u00a0Zero-Knowledge Proof"],"prefix":"10.1007","author":[{"given":"Tianmin","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Cheqin","family":"Jing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,26]]},"reference":[{"issue":"5","key":"22_CR1","first-page":"969","volume":"41","author":"S Qifeng","year":"2018","unstructured":"Qifeng, S., Cheqing, J., Zhao, Z., et al.: Blockchain technology: architecture and progress. J. Comput. Sci. 41(5), 969\u2013988 (2018)","journal-title":"J. Comput. Sci."},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Arenas, R., Fernandez, P.: CredenceLedger: a permissioned blockchain for verifiable academic credentials. In: 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE\/ITMC), pp. 1-6. IEEE (2018). https:\/\/doi.org\/10.1109\/ICE.2018.8436324","DOI":"10.1109\/ICE.2018.8436324"},{"issue":"2","key":"22_CR3","first-page":"84","volume":"10","author":"T Arndt","year":"2020","unstructured":"Arndt, T., Guercio, A.: Blockchain-based transcripts for mobile higher-education. Int. J. Inf. Educ. Technol. 10(2), 84\u201389 (2020)","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Han, M., Li, Z., He, J., et al.: A novel blockchain-based education records verification solution. In: Proceedings of the 19th Annual SIG Conference on Information Technology Education, pp. 178\u2013183 (2018). https:\/\/doi.org\/10.1145\/3241815.3241870","DOI":"10.1145\/3241815.3241870"},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Turkanovic, M., Holbl, M., Kosic, K., et al.: EduCTX: a blockchain-based higher education credit platform. IEEE Access 6, 5112\u20135127 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2789929","DOI":"10.1109\/ACCESS.2018.2789929"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Mishra, R.A., Kalla, A., Braeken, A., et al.: Privacy protected blockchain based architecture and implementation for sharing of students credentials. Inf. Process. Manag. 58(3), 102512 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102512","DOI":"10.1016\/j.ipm.2021.102512"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Du, R., Ma, C., Li, M.: Privacy-preserving searchable encryption scheme based on public and private blockchains. Tsinghua Sci. Technol. 28(1), 13\u201326 (2022). https:\/\/doi.org\/10.26599\/TST.2021.9010070","DOI":"10.26599\/TST.2021.9010070"},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Rosenberg, M., White, J., Garman, C., et al.: zk-creds: Flexible anonymous credentials from zk-SNARKs and existing identity infrastructure. In: S &P, pp. 1882\u20131900 (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10179430","DOI":"10.1109\/SP46215.2023.10179430"},{"key":"22_CR9","unstructured":"CITAHub: CITA: Cryptape Inter-enterprise Trust Automation (2021). https:\/\/docs.citahub.com\/zh-CN\/0.25.0\/cita\/cita-intro"},{"key":"22_CR10","unstructured":"Sporny, M., Longley, D., Sabadello, M., et al.: Decentralized Identifiers (DIDs) v1.0 (2021). https:\/\/w3c.github.io\/did-core\/"},{"key":"22_CR11","unstructured":"Sporny, M., Longley, D., Chadwick, D.: Verifiable credentials data model v1.1 (2022). https:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems (extended bstract). In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing (STOC), pp. 291\u2013304. ACM (1985). https:\/\/doi.org\/10.1145\/3335741.3335750","DOI":"10.1145\/3335741.3335750"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Bitansky, N., Canetti, R., Chiesa, A., et al.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 326\u2013349 (2012). https:\/\/doi.org\/10.1145\/2090236.2090263","DOI":"10.1145\/2090236.2090263"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016, Part II. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Bunz, B., Bootle, J., Boneh, D., et al.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315\u2013334. IEEE (2018). https:\/\/doi.org\/10.1109\/SP.2018.00020","DOI":"10.1109\/SP.2018.00020"},{"key":"22_CR16","unstructured":"WeBank: WeIdentity Document (2021). https:\/\/weidentity.readthedocs.io\/zh-cn\/latest\/docs\/weidentity-contract-design.html"}],"container-title":["Communications in Computer and Information Science","Computer Science and Education. Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0730-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,25]],"date-time":"2024-02-25T06:06:23Z","timestamp":1708841183000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0730-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819707294","9789819707300"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0730-0_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Science and Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sepang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccse12023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ieee-iccse.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EquinOCS, EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"305","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}