{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T03:10:01Z","timestamp":1746846601828,"version":"3.40.5"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T00:00:00Z","timestamp":1743552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T00:00:00Z","timestamp":1743552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024M753597"],"award-info":[{"award-number":["2024M753597"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01963-4","type":"journal-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T09:14:38Z","timestamp":1743758078000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling privacy-preserving and distributed intelligent credit scoring by zero-knowledge proof and functional encryption"],"prefix":"10.1007","volume":"18","author":[{"given":"Yangyang","family":"Bao","sequence":"first","affiliation":[]},{"given":"Lingrui","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Nie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"1963_CR1","unstructured":"Bradford T (2023) Give me some credit!: using alternative data to expand credit access. Payments system research briefing, pp 1\u20136"},{"issue":"4","key":"1963_CR2","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1109\/TNSE.2020.2982488","volume":"7","author":"V Hassija","year":"2020","unstructured":"Hassija V, Bansal G, Chamola V et al (2020) Secure lending: blockchain and prospect theory-based decentralized credit scoring model. IEEE Trans Netw Sci Eng 7(4):2566\u20132575","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1963_CR3","doi-asserted-by":"crossref","unstructured":"Dowd AC, Rosinger KO, Fernandez Castro M (2020) Trends and perspectives on finance equity and the promise of community colleges. Higher education: handbook of theory and research, vol 35, pp 517\u2013588","DOI":"10.1007\/978-3-030-31365-4_7"},{"key":"1963_CR4","doi-asserted-by":"publisher","first-page":"113986","DOI":"10.1016\/j.eswa.2020.113986","volume":"165","author":"V Moscato","year":"2021","unstructured":"Moscato V, Picariello A, Sperli G (2021) A benchmark of machine learning approaches for credit score prediction. Expert Syst Appl 165:113986","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1963_CR5","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.ejor.2023.08.040","volume":"317","author":"F Yang","year":"2024","unstructured":"Yang F, Abedin MZ, Hajek P (2024) An explainable federated learning and blockchain-based secure credit modeling method. Eur J Oper Res 317(2):449\u2013467","journal-title":"Eur J Oper Res"},{"key":"1963_CR6","doi-asserted-by":"crossref","unstructured":"Ferreira M, Brito T, Santos JF et al (2023) RuleKeeper: GDPR-aware personal data compliance for web frameworks. 2023 IEEE Symposium on Security and Privacy (SP). IEEE, pp 2817\u20132834","DOI":"10.1109\/SP46215.2023.10179395"},{"issue":"3","key":"1963_CR7","doi-asserted-by":"publisher","first-page":"4289","DOI":"10.1109\/JIOT.2023.3302065","volume":"11","author":"NM Hijazi","year":"2023","unstructured":"Hijazi NM, Aloqaily M, Guizani M et al (2023) Secure federated learning with fully homomorphic encryption for iot communications. IEEE Internet Things J 11(3):4289\u20134300","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1963_CR8","doi-asserted-by":"publisher","first-page":"e3635","DOI":"10.1002\/ett.3635","volume":"33","author":"F Al-Turjman","year":"2022","unstructured":"Al-Turjman F, Baali I (2022) Machine learning for wearable IoT-based applications: a survey. Trans Emerg Telecommun Technol 33(8):e3635","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"2","key":"1963_CR9","first-page":"9","volume":"18","author":"KP Brevoort","year":"2016","unstructured":"Brevoort KP, Grimm P, Kambara M (2016) Credit invisibles and the unscored. Cityscape 18(2):9\u201334","journal-title":"Cityscape"},{"key":"1963_CR10","doi-asserted-by":"crossref","unstructured":"Andolfo L, Coppolino L, D Antonio S et al (2021) Privacy-preserving credit scoring via functional encryption, Computational science and its applications\u2013CICCSA 2021: 21st International Conference, Cagliari, Italy, September 13\u2013C16, 2021, Proceedings, Part VIII 21. Springer International Publishing, LNTCS, vol 12956, pp 31\u201343","DOI":"10.1007\/978-3-030-87010-2_3"},{"key":"1963_CR11","doi-asserted-by":"crossref","unstructured":"Abdalla M, Bourse F, De Caro A et al (2015) Simple functional encryption schemes for inner products. IACR international workshop on public key cryptography. Berlin, Heidelberg: Springer, Berlin Heidelberg, LNSC, vol 9020, pp 733\u2013751","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"1963_CR12","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"JW Lee","year":"2022","unstructured":"Lee JW, Kang HC, Lee Y et al (2022) Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10:30039\u201330054","journal-title":"IEEE Access"},{"key":"1963_CR13","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.procs.2022.11.100","volume":"213","author":"S Zapechnikov","year":"2022","unstructured":"Zapechnikov S (2022) Secure multi-party computations for privacy-preserving machine learning. Procedia Comput Sci 213:523\u2013527","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"1963_CR14","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1186\/s13677-024-00618-8","volume":"13","author":"H Wang","year":"2024","unstructured":"Wang H, Wang Q, Ding Y et al (2024) Privacy-preserving federated learning based on partial low-quality data. J Cloud Comput 13(1):62","journal-title":"J Cloud Comput"},{"issue":"8","key":"1963_CR15","doi-asserted-by":"publisher","first-page":"5494","DOI":"10.1109\/TII.2021.3110808","volume":"18","author":"X Li","year":"2021","unstructured":"Li X, He J, Vijayakumar P et al (2021) A verifiable privacy-preserving machine learning prediction scheme for edge-enhanced HCPSs. IEEE Trans Ind Inform 18(8):5494\u20135503","journal-title":"IEEE Trans Ind Inform"},{"key":"1963_CR16","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2019","unstructured":"Xu G, Li H, Liu S et al (2019) VerifyNet: secure and verifiable federated learning. IEEE Trans Inf Forensic Secur 15:911\u2013926","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2","key":"1963_CR17","first-page":"840","volume":"167","author":"LJ Pang","year":"2005","unstructured":"Pang LJ, Wang YM (2005) A new (t, n)-multi-secret sharing scheme based on Shamir\u2019s secret sharing. Appl Math Comput 167(2):840\u2013848","journal-title":"Appl Math Comput"},{"key":"1963_CR18","doi-asserted-by":"crossref","unstructured":"Xu R, Joshi JB, Li C (2019) Cryptonn: training neural networks over encrypted data. IEEE 39th International Conference on Distributed Computing Systems (ICDCS) 2019, pp 1199\u20131209","DOI":"10.1109\/ICDCS.2019.00121"},{"key":"1963_CR19","doi-asserted-by":"crossref","unstructured":"Panzade P, Takabi D (2023) FENet: privacy-preserving neural network training with functional encryption. Proceedings of the 9th ACM international workshop on security and privacy analytics, pp 33\u201343","DOI":"10.1145\/3579987.3586566"},{"key":"1963_CR20","unstructured":"Ryffel T, Dufour-Sans E, Gay R et al (2019) Partially encrypted machine learning using functional encryption. arXiv:1905.10214"},{"key":"1963_CR21","doi-asserted-by":"crossref","unstructured":"Camenisch J, Chaabouni R, Shelat A (2008) Efficient protocols for set membership and range proofs. International conference on the theory and application of cryptology and information security. Berlin, Heidelberg: Springer Berlin Heidelberg, LNSC, vol 5350, pp 234\u2013252","DOI":"10.1007\/978-3-540-89255-7_15"},{"issue":"2","key":"1963_CR22","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1007\/s10207-023-00779-8","volume":"23","author":"F Hamila","year":"2024","unstructured":"Hamila F, Hamad M, Salgado DC et al (2024) Enhancing security in Fiat-CShamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. Int J Inf Secur 23(2):1131\u20131148","journal-title":"Int J Inf Secur"},{"key":"1963_CR23","doi-asserted-by":"crossref","unstructured":"Deng Y, Ma S, Zhang X et al (2021) Promise $$\\Sigma $$-protocol: how to construct efficient threshold ECDSA from encryptions based on class groups. International conference on the theory and application of cryptology and information security. Cham: Springer International Publishing, LNSC, vol 13093, pp 557\u2013586","DOI":"10.1007\/978-3-030-92068-5_19"},{"key":"1963_CR24","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. Advances in cryptology-EUROCRYPT 2004: international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23. Springer Berlin Heidelberg, LNSC, vol 3027, pp 223\u2013238","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"1963_CR25","doi-asserted-by":"crossref","unstructured":"Canetti R, Chen Y, Holmgren J et al (2019) Fiat-Shamir: from practice to theory. Proceedings of the 51st annual ACM SIGACT symposium on theory of computing, pp 1082\u20131090","DOI":"10.1145\/3313276.3316380"},{"issue":"1","key":"1963_CR26","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/JSYST.2020.3045076","volume":"16","author":"C Lin","year":"2021","unstructured":"Lin C, Luo M, Huang X et al (2021) An efficient privacy-preserving credit score system based on noninteractive zero-knowledge proof. IEEE Syst J 16(1):1592\u20131601","journal-title":"IEEE Syst J"},{"issue":"1","key":"1963_CR27","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1186\/s13677-024-00711-y","volume":"13","author":"VS Naresh","year":"2024","unstructured":"Naresh VS (2024) PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach. J Cloud Comput 13(1):149","journal-title":"J Cloud Comput"},{"key":"1963_CR28","unstructured":"UCI_credit_card. https:\/\/www.kaggle.com\/datasets\/xuandiluo\/uci-credit-cardcsv"},{"key":"1963_CR29","doi-asserted-by":"publisher","first-page":"115989","DOI":"10.1016\/j.eswa.2021.115989","volume":"188","author":"Y Qiao","year":"2022","unstructured":"Qiao Y, Lan Q, Zhou Z et al (2022) Privacy-preserving credit evaluation system based on blockchain. Expert Syst Appl 188:115989","journal-title":"Expert Syst Appl"},{"key":"1963_CR30","doi-asserted-by":"publisher","first-page":"119844","DOI":"10.1016\/j.eswa.2023.119844","volume":"223","author":"Y Qiao","year":"2023","unstructured":"Qiao Y, Lan Q, Wang Y et al (2023) PEvaChain: privacy-preserving ridge regression-based credit evaluation system using hyperledger fabric blockchain. Expert Syst Appl 223:119844","journal-title":"Expert Syst Appl"},{"key":"1963_CR31","doi-asserted-by":"crossref","unstructured":"Noh H, Ji S, Go Y et al (2024) Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments. IEEE Trans Netw Serv Manag 21(5):5118\u20135134","DOI":"10.1109\/TNSM.2024.3436049"},{"key":"1963_CR32","doi-asserted-by":"publisher","unstructured":"Sun J, Bao Y, Qiu W et al (2024) Privacy-preserving fine-grained data sharing with dynamic service for the cloud-edge IoT. IEEE Trans Dependable Secure Comput 1\u201318. https:\/\/doi.org\/10.1109\/TDSC.2024.3432650","DOI":"10.1109\/TDSC.2024.3432650"},{"key":"1963_CR33","doi-asserted-by":"crossref","unstructured":"Li W, Wang S, Song Y (2024) Personal credit evaluation model based on federated learning. 2024 IEEE 14th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, pp 1\u20137","DOI":"10.1109\/ICEIEC61773.2024.10561670"},{"key":"1963_CR34","doi-asserted-by":"publisher","first-page":"113910","DOI":"10.1016\/j.dss.2022.113910","volume":"166","author":"H He","year":"2023","unstructured":"He H, Wang Z, Jain H et al (2023) A privacy-preserving decentralized credit scoring method based on multi-party information. Decis Support Syst 166:113910","journal-title":"Decis Support Syst"},{"key":"1963_CR35","doi-asserted-by":"crossref","unstructured":"Jovanovic Z, Hou Z, Biswas K et al (2024) Robust integration of blockchain and explainable federated learning for automated credit scoring. Comput Netw 243:110303","DOI":"10.1016\/j.comnet.2024.110303"},{"key":"1963_CR36","doi-asserted-by":"crossref","unstructured":"Zakowska A (2023) A new credit scoring model to reduce potential predatory lending: a design science approach. International conference on systems engineering. Cham: Springer Nature Switzerland, LNNS, vol 761, pp 33\u201347","DOI":"10.1007\/978-3-031-40579-2_4"},{"issue":"5","key":"1963_CR37","doi-asserted-by":"publisher","first-page":"7436","DOI":"10.1109\/JIOT.2023.3338220","volume":"11","author":"P Panzade","year":"2024","unstructured":"Panzade P, Takabi D, Cai Z (2024) Privacy-preserving machine learning using functional encryption: opportunities and challenges. IEEE Internet Things J 11(5):7436\u20137446","journal-title":"IEEE Internet Things J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01963-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01963-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01963-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:40Z","timestamp":1746844300000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01963-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,2]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1963"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01963-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,4,2]]},"assertion":[{"value":"20 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The work is original and unpublished and has not been submitted for publication elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors agree to the publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"138"}}