{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:01:39Z","timestamp":1775016099429,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2702402"],"award-info":[{"award-number":["2022YFB2702402"]}]},{"name":"National Key Research and Development Program of China","award":["2022YFB2702405"],"award-info":[{"award-number":["2022YFB2702405"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272039"],"award-info":[{"award-number":["62272039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnsm.2024.3525045","type":"journal-article","created":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T19:55:06Z","timestamp":1736798106000},"page":"2243-2263","source":"Crossref","is-referenced-by-count":3,"title":["zkFabLedger: Enabling Privacy Preserving and Regulatory Compliance in Hyperledger Fabric"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2796-776X","authenticated-orcid":false,"given":"Xingyu","family":"Yang","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6852-8501","authenticated-orcid":false,"given":"Jipeng","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6435-6055","authenticated-orcid":false,"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref2","article-title":"\u2018Blockchain for consortium: A practical paradigm in agricultural supply chain system","volume":"184","author":"Song","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005663"},{"key":"ref4","article-title":"Ring signature confidential transactions for Monero","author":"Noether","year":"2015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref7","volume-title":"Zcash protocol specification","author":"Hopwood","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE51007.2020.00013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583345"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2910058"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_29"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3144991"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.034"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134010"},{"key":"ref16","first-page":"65","article-title":"zkledger: Privacy-preserving auditing for distributed ledgers","volume-title":"Proc. 15th USENIX Conf. Netw. Syst. Design Implement.","author":"Narula"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00061"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199336"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_25"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22963-3_24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00026"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969565"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3228236"},{"key":"ref28","article-title":"ASOZ: A decentralized payment system with privacy preserving and auditing on public blockchain","author":"Liu","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3348268"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_20"},{"key":"ref33","article-title":"Bilinear pairings in cryptography","author":"Meffert","year":"2009"},{"issue":"11","key":"ref34","first-page":"2545","article-title":"Ring signature based on the SM9 digital signature and its application in blockchain privacy protection","volume":"60","author":"An","year":"2023","journal-title":"J. Comput. Res. Develop."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10225006"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10973774\/10839283.pdf?arnumber=10839283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:10:35Z","timestamp":1745385035000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10839283\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3525045","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}