{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:47:35Z","timestamp":1761198455796,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC","award":["62171291"],"award-info":[{"award-number":["62171291"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714784","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"2668-2676","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Linking Souls to Humans: Blockchain Accounts with Credible Anonymity for Web 3.0 Decentralized Identity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9454-4997","authenticated-orcid":false,"given":"Taotao","family":"Wang","sequence":"first","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9423-3917","authenticated-orcid":false,"given":"Zibin","family":"Lin","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7937-5870","authenticated-orcid":false,"given":"Shengli","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6124-5173","authenticated-orcid":false,"given":"Long","family":"Shi","sequence":"additional","affiliation":[{"name":"Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2615-5145","authenticated-orcid":false,"given":"Qing","family":"Yang","sequence":"additional","affiliation":[{"name":"Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0241-7729","authenticated-orcid":false,"given":"Boris","family":"D\u00fcdder","sequence":"additional","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00136"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Steven Adler Zo\u00eb Hitzig Shrey Jain Catherine Brewer Wayne Chang Ren\u00e9e DiResta Eddy Lazzarin Sean McGregor Wendy Seltzer Divya Siddarth et al. 2024. Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online. arXiv preprint arXiv:2408.07892 (2024). hrefhttps:\/\/doi.org\/10.48550\/arXiv.2408.07892doi:nolinkurl10.48550\/arXiv.2408.07892","DOI":"10.48550\/arXiv.2408.07892nolinkurl10.48550"},{"key":"e_1_3_2_1_3_1","volume-title":"Towards a Blockchain based digital identity verification, record attestation and record sharing system. arXiv preprint arXiv:1906.09791","author":"Aydar Mehmet","year":"2019","unstructured":"Mehmet Aydar, Serkan Ayvaz, and Salih Cemil Cetin. 2019. Towards a Blockchain based digital identity verification, record attestation and record sharing system. arXiv preprint arXiv:1906.09791 (2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Shahram Bakhtiari Reihaneh Safavi-Naini Josef Pieprzyk et al. 1995. Cryptographic hash functions: A survey. Technical Report. Citeseer.","DOI":"10.1007\/BFb0032359"},{"key":"e_1_3_2_1_5_1","unstructured":"Ethereum Foundation. [n. d.]. go-ethereum: Official Go implementation of the Ethereum protocol. https:\/\/github.com\/ethereum\/go-ethereum. Accessed: 2024--10--14."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_7_1","unstructured":"iden3. 2024. Circom. https:\/\/github.com\/iden3\/circom. Accessed: 2024--10--14."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain62396.2024.00087"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/math11204387"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings, Part II 5. Springer, 614--623","author":"Liu Joseph K","year":"2005","unstructured":"Joseph K Liu and Duncan S Wong. 2005. Linkable ring signatures: Security models and new schemes. In Computational Science and Its Applications--ICCSA 2005: International Conference, Singapore, May 9--12, 2005, Proceedings, Part II 5. Springer, 614--623."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012706"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.34"},{"key":"e_1_3_2_1_14_1","volume-title":"zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance. Cryptology ePrint Archive","author":"Pauwels Pieter","year":"2022","unstructured":"Pieter Pauwels, Joni Pirovich, Peter Braunz, and Jack Deeb. 2022. zkKYC in DeFi: An approach for implementing the zkKYC solution concept in Decentralized Finance. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"Tiancheng Xie, Ryan Cottone, and Dawn Song.","author":"Rathee Deevashwer","year":"2022","unstructured":"Deevashwer Rathee, Guru Vamsi Policharla, Tiancheng Xie, Ryan Cottone, and Dawn Song. 2022. ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106586"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000473nolinkurl10.1109"},{"key":"e_1_3_2_1_20_1","unstructured":"W3C. 2020. Decentralized Identifiers (DIDs) v1.0. https:\/\/www.w3.org\/TR\/did-core\/. accessed: 2020-02-06."},{"key":"e_1_3_2_1_21_1","volume-title":"Accessed","author":"C.","year":"2024","unstructured":"W3C. 2024. Verifiable Credentials Data Model v2.0. [Online]. Available: https:\/\/www.w3.org\/TR\/vc-data-model-2.0\/. Accessed: May 15, 2024."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11460-008-0012-8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3321090"},{"key":"e_1_3_2_1_24_1","volume-title":"Decentralized Society: Finding Web3's Soul. Available at SSRN 4105763","author":"Weyl E Glen","year":"2022","unstructured":"E Glen Weyl, Puja Ohlhaver, and Vitalik Buterin. 2022. Decentralized Society: Finding Web3's Soul. Available at SSRN 4105763 (2022)."},{"key":"e_1_3_2_1_25_1","volume-title":"Digital Identity: Unmasking identity management architecture (IMA)","author":"Windley Phillip J","year":"2005","unstructured":"Phillip J Windley. 2005. Digital Identity: Unmasking identity management architecture (IMA). O'Reilly Media, Inc."},{"key":"e_1_3_2_1_26_1","first-page":"61","article-title":"Toward a Blockchain-Based","volume":"2","author":"Zhang Peng","year":"2024","unstructured":"Peng Zhang, Peilin Wu, Yuhong Liu, Ye Chen, Yuanliang Li, Jun Yan, and Mohsen Ghafouri. 2024. Toward a Blockchain-Based, Reputation-Aware Secure Transactive Energy Market. Blockchains, Vol. 2, 1 (2024), 61--78.","journal-title":"Reputation-Aware Secure Transactive Energy Market. Blockchains"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:41Z","timestamp":1750295921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":25,"alternative-id":["10.1145\/3696410.3714784","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714784","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}