{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T15:20:00Z","timestamp":1767453600908,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3652463","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain-Based Zero-Knowledge Proofs for Data Privacy: Explore the Application of Blockchain Technology in facilitating Privacy-Preserving Transactions through Zero-Knowledge Proofs and Analyze their Effectiveness in Protecting Sensitive Data."],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1084-9208","authenticated-orcid":false,"given":"Shashank","family":"Saroop","sequence":"first","affiliation":[{"name":"CSE_ ASET, Amity University Gurugram, India and \rCSE_ASET, Amity University Gurugram, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Blockchain: blueprint for a new economy","author":"Swan M.","year":"2015","unstructured":"Swan, M. (2015). Blockchain: blueprint for a new economy. O'Reilly Media."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_1_3_1","volume-title":"Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world","author":"Tapscott D.","year":"2016","unstructured":"Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin."},{"key":"e_1_3_2_1_4_1","volume-title":"Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. White Paper","author":"Buterin V.","year":"2013","unstructured":"Buterin, V. (2013). Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. White Paper."},{"key":"e_1_3_2_1_5_1","volume-title":"Blockchain: Opportunities for health care. Deloitte Review, 19","author":"Mullan M.","year":"2016","unstructured":"Mullan, M. (2016). Blockchain: Opportunities for health care. Deloitte Review, 19."},{"key":"e_1_3_2_1_6_1","volume-title":"The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology","author":"Mougayar W.","year":"2016","unstructured":"Mougayar, W. (2016). The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. Wiley."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2994437"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of IEEE open & big data conference (Vol. 1).","author":"Ekblaw A.","year":"2016","unstructured":"Ekblaw, A., Azaria, A., Halamka, J. D., & Lippman, A. (2016). A case study for blockchain in healthcare: \"MedRec\" prototype for electronic health records and medical research data. In Proceedings of IEEE open & big data conference (Vol. 1)."},{"key":"e_1_3_2_1_10_1","volume-title":"A Certified Digital Signature. Advances in Cryptology\u2014CRYPTO\u201989, 369-378","author":"Merkle R. C.","year":"2020","unstructured":"Merkle, R. C. (2020). A Certified Digital Signature. Advances in Cryptology\u2014CRYPTO\u201989, 369-378."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_12_1","volume-title":"Data Privacy Management and Autonomous Spontaneus Security (pp. 53-67)","author":"Campanelli M.","year":"2013","unstructured":"Campanelli, M., Genovese, G., & Visconti, I. (2013). A Privacy-Enhancing Scheme for Identity Verification. In Data Privacy Management and Autonomous Spontaneus Security (pp. 53-67). Springer."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security (pp. 325-336)","author":"Stefanov E.","year":"2013","unstructured":"Stefanov, E., Papamanthou, C., & Shi, E. (2013). Practical dynamic proofs of retrievability. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security (pp. 325-336)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_15_1","volume-title":"How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology\u2014CRYPTO\u201986, 186-194","author":"Fiat A.","year":"1986","unstructured":"Fiat, A., & Shamir, A. (1986). How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology\u2014CRYPTO\u201986, 186-194."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_17_1","volume-title":"SecureComm'08.","author":"Ateniese G.","year":"2011","unstructured":"Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2011). Scalable and efficient provable data possession. In SecureComm'08."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"issue":"1","key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Privacy-Preserving Computation on Distributed Ledgers: A Survey","volume":"52","author":"Chase M.","year":"2019","unstructured":"Chase, M., & Meiklejohn, S. (2019). Privacy-Preserving Computation on Distributed Ledgers: A Survey. ACM Computing Surveys (CSUR), 52(1), 1-38.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"4","key":"e_1_3_2_1_20_1","first-page":"405","article-title":"Method and apparatus for secure communication","author":"Merkle R. C.","year":"2017","unstructured":"Merkle, R. C. (2017). Method and apparatus for secure communication. U.S. Patent No. 4,405,829.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_21_1","volume-title":"2020 Data Breach Investigations Report.","author":"Verizon","year":"2020","unstructured":"Verizon. (2020). 2020 Data Breach Investigations Report. Retrieved from https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Regulation (EU) 2016\/679: General Data Protection Regulation.","author":"GDPR.","year":"2018","unstructured":"EU GDPR. (2018). Regulation (EU) 2016\/679: General Data Protection Regulation. Retrieved from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32016R0679"},{"key":"e_1_3_2_1_23_1","volume-title":"California Consumer Privacy Act (CCPA).","author":"CCPA.","year":"2020","unstructured":"CCPA. (2020). California Consumer Privacy Act (CCPA). Retrieved from https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"e_1_3_2_1_24_1","volume-title":"Understanding Privacy","author":"Solove D. J.","year":"2013","unstructured":"Solove, D. J. (2013). Understanding Privacy. Harvard University Press."},{"issue":"6","key":"e_1_3_2_1_25_1","first-page":"1701","article-title":"Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization","volume":"57","author":"Ohm P.","year":"2009","unstructured":"Ohm, P. (2009). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review, 57(6), 1701-1777.","journal-title":"UCLA Law Review"},{"key":"e_1_3_2_1_26_1","volume-title":"The Hidden Privacy Risks of Unlocking Data.","author":"Hill K.","year":"2020","unstructured":"Hill, K. (2020). The Hidden Privacy Risks of Unlocking Data. Retrieved from https:\/\/www.nytimes.com\/interactive\/2020\/12\/18\/technology\/what-is-data-privacy.html"},{"key":"e_1_3_2_1_27_1","volume-title":"Fairness and Machine Learning.","author":"Barocas S.","year":"2019","unstructured":"Barocas, S., Hardt, M., & Narayanan, A. (2019). Fairness and Machine Learning. Retrieved from https:\/\/fairmlbook.org\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Machine Bias: There's Software Used Across the Country to Predict Future Criminals. And It's Biased Against Blacks. ProPublica.","author":"Angwin J.","year":"2016","unstructured":"Angwin, J., Larson, J., Mattu, S., & Kirchner, L. (2016). Machine Bias: There's Software Used Across the Country to Predict Future Criminals. And It's Biased Against Blacks. ProPublica. Retrieved from https:\/\/www.propublica.org\/article\/how-we-analyzed-the-compas-recidivism-algorithm"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"issue":"2","key":"e_1_3_2_1_30_1","first-page":"269","volume":"1","author":"Deetman S.","year":"2016","unstructured":"Deetman, S. (2016). Bitcoin's Growing Energy Problem. Joule, 1(2), 269-275.","journal-title":"Bitcoin's Growing Energy Problem. Joule"},{"key":"e_1_3_2_1_31_1","volume-title":"Scalability.","author":"Bitcoin Wiki","year":"2021","unstructured":"Bitcoin Wiki. (2021). Scalability. Retrieved from https:\/\/en.bitcoin.it\/wiki\/Scalability"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701411"},{"key":"e_1_3_2_1_33_1","volume-title":"Application of FinCEN's Regulations to Certain Business Models Involving Convertible Virtual Currencies.","author":"Fin CEN","year":"2019","unstructured":"FinCEN. (2019). Application of FinCEN's Regulations to Certain Business Models Involving Convertible Virtual Currencies. Retrieved from https:\/\/www.fincen.gov\/sites\/default\/files\/2019-05\/FinCEN%20Guidance%20CVC%20FINAL%20508.pdf"},{"issue":"2","key":"e_1_3_2_1_34_1","first-page":"95","article-title":"A survey of attacks on Ethereum smart contracts","volume":"7","author":"Atzei N.","year":"2017","unstructured":"Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts. Journal of Cryptocurrency Engineering, 7(2), 95-128.","journal-title":"Journal of Cryptocurrency Engineering"},{"key":"e_1_3_2_1_35_1","volume-title":"2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS).","author":"Gipp B.","year":"2017","unstructured":"Gipp, B., Meusch, A., & Gernand, A. (2017). Decentralized Trusted Timestamping using the Crypto Currency Bitcoin. 2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)."},{"key":"e_1_3_2_1_36_1","volume-title":"Zcash Technology.","author":"Zcash","year":"2020","unstructured":"Zcash. (2020). Zcash Technology. Retrieved from https:\/\/electriccoin.co\/technology\/"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the Forty-sixth Annual ACM Symposium on Theory of Computing.","author":"Sasson E. B.","year":"2014","unstructured":"Sasson, E. B., Chiesa, A., & Tromer, E. (2014). On the computational overhead of probabilistically checkable proofs. Proceedings of the Forty-sixth Annual ACM Symposium on Theory of Computing."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete Algorithms.","author":"Micali S.","year":"2016","unstructured":"Micali, S. (2016). Verifiable Random Functions. In Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete Algorithms."},{"key":"e_1_3_2_1_39_1","volume-title":"Proof of solvency.","author":"Maxwell G.","year":"2015","unstructured":"Maxwell, G. (2015). Proof of solvency. Retrieved from https:\/\/iwilcox.me.uk\/2015\/01\/proof-of-solvency"},{"key":"e_1_3_2_1_40_1","volume-title":"zk-SNARKs: Under the Hood.","author":"Buterin V.","year":"2017","unstructured":"Buterin, V. (2017). zk-SNARKs: Under the Hood. Retrieved from https:\/\/blog.ethereum.org\/2017\/01\/10\/zk-snarks-under-the-hood\/"},{"key":"e_1_3_2_1_41_1","volume-title":"Confidential Transactions.","author":"Noether S.","year":"2016","unstructured":"Noether, S., Mackenzie, S., Aron, M., Bowie, S., Kappos, G., Grass, D., & Back, A. (2016). Confidential Transactions. Retrieved from https:\/\/getmonero.org\/resources\/research-lab\/#research-lab-publications"},{"key":"e_1_3_2_1_42_1","volume-title":"JPMorgan's Quorum\u00ae Blockchain Platform Will Utilize Zcash Technology to Add Layer of Privacy to Smart Contracts.","author":"Morgan Chase","year":"2018","unstructured":"JPMorgan Chase. (2018). JPMorgan's Quorum\u00ae Blockchain Platform Will Utilize Zcash Technology to Add Layer of Privacy to Smart Contracts. Retrieved from https:\/\/www.jpmorganchase.com\/corporate\/news\/stories\/jpmorgan-quorum-zcash-privacy.htm"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3652463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:27:04Z","timestamp":1758216424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":43,"alternative-id":["10.1145\/3647444.3652463","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3652463","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}