{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:35:43Z","timestamp":1770226543351,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011102","name":"Seventh Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,3]]},"DOI":"10.1109\/icbc51069.2021.9461082","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T20:16:55Z","timestamp":1624565815000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management"],"prefix":"10.1109","author":[{"given":"Jan","family":"Lauinger","sequence":"first","affiliation":[]},{"given":"Jens","family":"Ernstberger","sequence":"additional","affiliation":[]},{"given":"Emanuel","family":"Regnath","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Hamad","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_33"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/psapm\/042\/1095551"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref13","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"schnorr","year":"1989","journal-title":"Conference on the Theory and Application of Cryptology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"ref15","article-title":"Efficiency limitations for ?-protocols for group homomorphisms","author":"bangerter","year":"2010","journal-title":"Theory of Cryptography Conference"},{"key":"ref16","first-page":"171","article-title":"New group signature schemes","author":"chen","year":"1994","journal-title":"Workshop on the Theory and Application of of Cryptographic Techniques"},{"key":"ref17","first-page":"1","article-title":"Efficient verifiable delay functions","author":"wesolowski","year":"2020","journal-title":"Journal of Cryptology"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"key":"ref19","article-title":"Self-sovereign identity: A comparison of irma and sovrin","author":"nauta","year":"2019","journal-title":"Technical Report TNO2019R11011 Tech Rep"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00458-7"},{"key":"ref4","first-page":"61","article-title":"Dynamic accumulators and application to efficient revocation of anonymous credentials","author":"camenisch","year":"2002","journal-title":"Annual International Cryptology Conference"},{"key":"ref27","article-title":"Relay racing with x. 509 mayflies: An analysis of certificate replacements and validity periods in https certificate logs","author":"bruhner","year":"2020"},{"key":"ref3","article-title":"Verifiable credentials data model 1.0","author":"sporny","year":"2019","journal-title":"W3C W3C Candidate Recommendation"},{"key":"ref6","first-page":"274","article-title":"One-way accumulators: A decentralized alternative to digital signatures","author":"benaloh","year":"1993","journal-title":"Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44618-9_16"},{"key":"ref5","first-page":"561","article-title":"Batching techniques for accumulators with applications to iops and stateless blockchains","author":"boneh","year":"2019","journal-title":"Annual International Cryptology Conference"},{"key":"ref8","first-page":"1186","article-title":"Trading accumulation size for witness size: A Merkle tree based universal accumulator via subset differences","volume":"2019","author":"jhanwar","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_26"},{"key":"ref1","article-title":"Facebook security breach exposes accounts of 50 million users","volume":"28","author":"isaac","year":"2018","journal-title":"The New York Times"},{"key":"ref20","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"key":"ref22","article-title":"Decentralized identifiers (dids) v1. 0","author":"reed","year":"2020","journal-title":"Community Group Draft Report"},{"key":"ref21","article-title":"Hyperledger Indy Project","year":"0"},{"key":"ref24","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1986","journal-title":"Conference on the theory and application of crypto-graphic techniques"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167303"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_17"}],"event":{"name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Sydney, Australia","start":{"date-parts":[[2021,5,3]]},"end":{"date-parts":[[2021,5,6]]}},"container-title":["2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9460986\/9461049\/09461082.pdf?arnumber=9461082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:46Z","timestamp":1652197366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9461082\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icbc51069.2021.9461082","relation":{},"subject":[],"published":{"date-parts":[[2021,5,3]]}}}