{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:06:23Z","timestamp":1750824383745,"version":"3.41.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033396","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"2065-2070","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof"],"prefix":"10.1109","author":[{"given":"Shujiang","family":"Xu","sequence":"first","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]},{"given":"Duanzhen","family":"Li","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]},{"given":"Lianhai","family":"Wang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]},{"given":"Miodrag J.","family":"Mihaljevi\u0107","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]},{"given":"Shuhui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]},{"given":"Wei","family":"Shao","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]},{"given":"Qizheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center,Jinan,PR China,250014"}]}],"member":"263","reference":[{"key":"ref1","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Business Review"},{"key":"ref2","article-title":"Review on the development and application of Blockchain cross-chain technology","volume-title":"Journal of Xihua University","author":"He","year":"2021"},{"journal-title":"A protocol for interledger payments","year":"2015","author":"Thomas","key":"ref3"},{"article-title":"Alt chains and atomic transfers","volume-title":"Bitcoin Forum","author":"Nolan","key":"ref4"},{"key":"ref5","first-page":"201","author":"Back","year":"2014","journal-title":"Enabling blockchain innovations with pegged sidechains"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94340-4_12"},{"key":"ref7","first-page":"2","volume-title":"Research onPKIIdentity Authentication Based on-Blockchain","author":"CHEN","year":"2020"},{"volume-title":"Design and Implementation of a Distributed PKI Architecture based on an Alliance Chain","year":"2022","author":"Wang","key":"ref8"},{"key":"ref9","first-page":"135","article-title":"User identity authentication model for cross-chain system","author":"Wang","year":"2020","journal-title":"Computer Engineering and Applications"},{"key":"ref10","first-page":"2544","article-title":"Design of a Supervised Blockchain Cross Chain Platform","author":"Lei","year":"2021","journal-title":"Computer Digital Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00864-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3381081"},{"key":"ref13","article-title":"Research and Realization of Blockchain Cross-chain Secure Access and Identity Authentication Scheme","author":"Wang","year":"2022","journal-title":"Information Network Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82153-1_51"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HotICN53262.2021.9680822"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCAE52414.2021.9590718"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.04.045"},{"key":"ref18","first-page":"12","article-title":"Cross-Chain Identity Privacy Protection Technology for Consortium Blockchain Based on Group Signature","author":"XU","year":"2022","journal-title":"Information Security and Communications Privacy"},{"volume-title":"W3C. DID","year":"2022","key":"ref19"},{"key":"ref20","first-page":"1","article-title":"Overview of Cross-chain Identity Authentication Based on DID","author":"Bai","year":"2023","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2944678"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3364188"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033396.pdf?arnumber=11033396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:53:54Z","timestamp":1750748034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033396","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}