{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T02:44:52Z","timestamp":1777085092153,"version":"3.51.4"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T00:00:00Z","timestamp":1677888000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T00:00:00Z","timestamp":1677888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012190","name":"Ministry of Science and Higher Education of the Russian Federation","doi-asserted-by":"crossref","award":["FSWU-2023-0031"],"award-info":[{"award-number":["FSWU-2023-0031"]}],"id":[{"id":"10.13039\/501100012190","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00470-5","type":"journal-article","created":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T02:02:17Z","timestamp":1677895337000},"page":"219-224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains"],"prefix":"10.1007","volume":"20","author":[{"given":"Anatoly","family":"Konkin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7975-6040","authenticated-orcid":false,"given":"Sergey","family":"Zapechnikov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,4]]},"reference":[{"key":"470_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng, Q., He, D., Zeadally, S., Khan, K.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45\u201358 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"470_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3025129","author":"Z Guan","year":"2020","unstructured":"Guan, Z., Wan, Z., Yang, Y., Zhou, Y., Huang, B.: BlockMaze: an efficient privacy-preserving account-model blockchain based on zk-SNARKs. IEEE Trans. Depend. Secure Comput. (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.3025129","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"470_CR3","doi-asserted-by":"crossref","unstructured":"Konkin, A., Zapechnikov, S.: Privacy methods and zero-knowledge poof for corporate blockchain, 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial. Procedia Comput. Sci. 190, 471\u2013478 ((2021))","DOI":"10.1016\/j.procs.2021.06.055"},{"key":"470_CR4","unstructured":"Tai, S.: On or Off the Blockchain? Insights on Off-Chaining Computation and Data, European Conference on Service-Oriented and Cloud Computing (2017)"},{"issue":"2","key":"470_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D Chaum","year":"2018","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201388 (2018)","journal-title":"Commun. ACM"},{"key":"470_CR6","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.procs.2018.03.063","volume":"129","author":"B Wang","year":"2018","unstructured":"Wang, B., Sun, J., He, Y., Pang, D., Ningxiao, L.: Large-scale election based on blockchain. Procedia Comput. Sci. 129, 234\u2013237 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"470_CR7","doi-asserted-by":"publisher","unstructured":"Mayer, H.: zk-SNARK explained: Basic Principles (2016). https:\/\/doi.org\/10.13140\/RG.2.2.20887.68007, [Online] Available: https:\/\/blog.coinfabrik.com\/zk-snarks-explained-basic-principles\/","DOI":"10.13140\/RG.2.2.20887.68007"},{"key":"470_CR8","unstructured":"Alonso, K., Joancomarti, J.: Monero: Privacy in the Blockchain. IACR eprint archive. (2018). https:\/\/eprint.iacr.org\/2018\/535.pdf. Accessed: 29 Sep 2022"},{"key":"470_CR9","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Garman, C., et al.: Zerocash: Decentralized anonymous payments from Bitcoin. Proc. IEEE Symposium on Security and Privacy (SP), pp. 459\u2013474 (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"470_CR10","first-page":"423","volume-title":"Lecture Notes in Computer Science","author":"B B\u00fcnz","year":"2020","unstructured":"B\u00fcnz, B., Agrawal, S., Zamani, M., et al.: Zether: Towards Privacy in a Smart Contract World. Financial Cryptography and Data Security (FC 2020). In: Bonneau, J., Heninger, N. (eds.) Lecture Notes in Computer Science, vol. 12059, pp. 423\u2013443. Springer, Cham (2020)"},{"key":"470_CR11","unstructured":"Bowe, S., Chiesa, A., Green, M., Miers, I.: Zexe: Enabling Decentralized Private Computation, 2018. https:\/\/eprint.iacr.org\/2018\/962. Accessed 09 Feb 2023"},{"key":"470_CR12","unstructured":"Almashaqbeh1, G., Ravital, S.: SoK: Privacy-Preserving Computing in the Blockchain Era (2021). https:\/\/eprint.iacr.org\/2021\/727. Accessed 09 Feb 2023"},{"key":"470_CR13","doi-asserted-by":"publisher","unstructured":"Anroulaki, E., Barger, A., Bortnikov, V., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: EuroSys \u201918: Thirteenth EuroSys Conference 2018, April 23\u201326, 2018, Porto, Portugal. ACM, New York, NY, USA, 15 pages. https:\/\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"key":"470_CR14","doi-asserted-by":"publisher","unstructured":"Graf, M., K\u00fcsters, R., Rausch, D.: Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric.\u00a02020 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 236\u2013255 (2020). https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00023","DOI":"10.1109\/EuroSP48549.2020.00023"},{"key":"470_CR15","doi-asserted-by":"publisher","unstructured":"Camenisch, J., van Herreweghen, E.: Design and implementation of the\u00a0idemix\u00a0anonymous credential system. In: CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security. November 2002, pp. 21\u201330. https:\/\/doi.org\/10.1145\/586110.586114","DOI":"10.1145\/586110.586114"},{"key":"470_CR16","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT 2001, LNCS 2045, B. Pfitzmann (Ed.), pp. 93\u2013118 (2001)","DOI":"10.1007\/3-540-44987-6_7"},{"key":"470_CR17","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Drijvers, M., Dubovitskaya, M.: Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain. CCS\u201917, October 30-November 3, 2017, Dallas, TX, USA, pp. 683\u2013699. https:\/\/doi.org\/10.1145\/3133956.3134025","DOI":"10.1145\/3133956.3134025"},{"key":"470_CR18","doi-asserted-by":"publisher","unstructured":"Bogatov, D., Caro, A.D., Elkhiyaoui, K., Tackmann, B.: Anonymous transactions with revocation and auditing in hyperledger fabric. In: Cryptology and Network Security. Springer International Publishing, pp. 435\u2013459 (2021). https:\/\/doi.org\/10.1007\/978-3-030-92548-2","DOI":"10.1007\/978-3-030-92548-2"},{"issue":"4","key":"470_CR19","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1109\/TETC.2019.2920719","volume":"9","author":"S Mazumdar","year":"2021","unstructured":"Mazumdar, S., Ruj, S.: Design of anonymous endorsement system in hyperledger fabric. IEEE Trans. Emerg. Top. Comput. 9(4), 1780\u20131791 (2021). https:\/\/doi.org\/10.1109\/TETC.2019.2920719","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"470_CR20","unstructured":"Connolly A., Deschamps J., Lafourcade P., et al.: Protego: A Credential Scheme for Permissioned Blockchains (Extended Version). Accessed 09 Feb 2023"},{"key":"470_CR21","unstructured":"ConsenSys Quorum: Tessera private transaction manager. https:\/\/docs.tessera.consensys.net\/en\/stable\/. Accessed 09 Feb 2023"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00470-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00470-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00470-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:11:18Z","timestamp":1713463878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00470-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,4]]},"references-count":21,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["470"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00470-5","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,4]]},"assertion":[{"value":"4 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}