{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T09:52:12Z","timestamp":1769421132865,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFC3303200"],"award-info":[{"award-number":["2022YFC3303200"]}]},{"name":"Guangdong Province Teaching Reform","award":["GDJX2020009"],"award-info":[{"award-number":["GDJX2020009"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3391423","type":"journal-article","created":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T17:29:10Z","timestamp":1713547750000},"page":"58378-58394","source":"Crossref","is-referenced-by-count":3,"title":["AASSI: A Self-Sovereign Identity Protocol With Anonymity and Accountability"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3410-2307","authenticated-orcid":false,"given":"Le","family":"Gao","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Guangzhou Huali College, Guangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1117-8705","authenticated-orcid":false,"given":"Jiaxin","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Intelligent Manufacturing, Wuyi University, Jiangmen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junzhe","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Intelligent Manufacturing, Wuyi University, Jiangmen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yin","family":"Tang","sequence":"additional","affiliation":[{"name":"Department of Intelligent Manufacturing, Wuyi University, Jiangmen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0042-7552","authenticated-orcid":false,"given":"Quansi","family":"Wen","sequence":"additional","affiliation":[{"name":"Jiangmen City Road Traffic Accident Social Relief Fund Management Center, Jiangmen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00026"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2020.1810764"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406986"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395570"},{"key":"ref5","volume-title":"The Path to Self-Sovereign Identity","author":"Allen","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223292"},{"key":"ref7","volume-title":"Verifiable Credentials Data Model 1.0: Expressing Verifiable Information on the Web","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-021-00722-y"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117588"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2020.05.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3233828"},{"key":"ref12","article-title":"Self-sovereign identity for more freedom and privacy-selfkey","author":"Foundation","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s20030945"},{"key":"ref14","volume-title":"UPORT: A Platform for Self-Sovereign Identity","author":"Lundkvist","year":"2017"},{"key":"ref15","volume-title":"Performant and Modular APIs for Verifiable Data and SSI"},{"key":"ref16","volume-title":"Serto"},{"key":"ref17","first-page":"18","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"Tobin","year":"2016","journal-title":"Sovrin Found."},{"key":"ref18","first-page":"1","article-title":"Architecture of the hyperledger blockchain fabric","volume-title":"Proc. Workshop Distrib. Cryptocurrencies Consensus Ledgers","volume":"310","author":"Cachin"},{"key":"ref19","article-title":"SIMS: Self sovereign identity management system with preserving privacy in blockchain","author":"Lee","year":"2019"},{"key":"ref20","article-title":"Privacy-preserving identity management system","author":"Lee","year":"2021"},{"key":"ref21","article-title":"Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers","author":"Sonnino","year":"2018","journal-title":"arXiv:1802.07344"},{"key":"ref22","article-title":"Security analysis of coconut, an attribute-based credential scheme with threshold issuance","author":"Rial","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00128"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_17"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/080725386"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s21165438"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/a16010004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.10.016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00038"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2944678"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_23"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102069"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_20"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054851"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1992.267809"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052252"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_17"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_24"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_7"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10505297.pdf?arnumber=10505297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:52:20Z","timestamp":1714762340000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10505297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3391423","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}