{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589835,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723258","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"607-615","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["BDIMS: A Blockchain Based Digital Identity Management System with Zero Knowledge Proof"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8132-9214","authenticated-orcid":false,"given":"Md. Humayan Kabir","family":"Rupok","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Khulna University of Engineering &amp; Technology, Khulna, Khulna, Khulna, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1228-9043","authenticated-orcid":false,"given":"K. M. Azharul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Khulna University of Engineering &amp; Technology, Khulna, Khulna, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"AWS author. 2024. What is Ethereum? - Ethereum Explained - AWS \u2014 aws.amazon.com. https:\/\/aws.amazon.com\/blockchain\/what-is-ethereum\/. [Accessed 22-04-2024]."},{"key":"e_1_3_3_1_3_2","unstructured":"Cloudflare authors. 2022. Interplanetary File System (IPFS) \u00b7 Cloudflare Web3 docs \u2014 developers.cloudflare.com. https:\/\/developers.cloudflare.com\/web3\/ipfs-gateway\/concepts\/ipfs\/. [Accessed 17-04-2024]."},{"key":"e_1_3_3_1_4_2","unstructured":"MobileIdWorld authors. April 26 2019. ShoCard Delivers Proof of Identity with Blockchain eSignature Platform \u2014 mobileidworld.com. https:\/\/mobileidworld.com\/shocard-delivers-proof-identity-blockchain-esignature-platform\/. [Accessed 11-03-2024]."},{"key":"e_1_3_3_1_5_2","unstructured":"The\u00a0Solidity Authors. 2024. Solidity 0.8.25 documentation \u2014 docs.soliditylang.org. https:\/\/docs.soliditylang.org\/en\/v0.8.25\/. [Accessed 22-04-2024]."},{"key":"e_1_3_3_1_6_2","unstructured":"William\u00a0J Buchanan. 2017. Zero-knowledge Proof: Proving age with hash chains \u2014 asecuritysite.com. https:\/\/asecuritysite.com\/encryption\/age. [Accessed 17-04-2024]."},{"key":"e_1_3_3_1_7_2","unstructured":"consensys. 2023. Blockchain for Digital Identity | Real World Blockchain Use Cases | Consensys \u2014 consensys.io. https:\/\/consensys.io\/blockchain-use-cases\/digital-identity. [Accessed 11-08-2024]."},{"key":"e_1_3_3_1_8_2","unstructured":"Tian Daphne. December 21 2022. Zero-knowledge proofs explained in 3 examples \u2014 circularise.com. https:\/\/www.circularise.com\/blogs\/zero-knowledge-proofs-explained-in-3-examples. [Accessed 27-04-2024]."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICV50876.2021.9388428"},{"key":"e_1_3_3_1_10_2","unstructured":"Paul K. 2021. Digital Identity Management: What Is It & Why Is It Important for Enterprises? - TrustGrid \u2014 trustgrid.com. https:\/\/trustgrid.com\/digital-identity-management-what-is-it-why-is-it-important-for-enterprises\/. [Accessed 16-04-2024]."},{"key":"e_1_3_3_1_11_2","unstructured":"Ferhat Kochan. 2023. How to Use Keccak256 Hash Function with Solidity | QuickNode \u2014 quicknode.com. https:\/\/www.quicknode.com\/guides\/ethereum-development\/smart-contracts\/how-to-use-keccak256-with-solidity. [Accessed 22-04-2024]."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Shu\u00a0Yun Lim Pascal\u00a0Tankam Fotsing Abdullah Almasri Omar Musa Miss Laiha\u00a0Mat Kiah Tan\u00a0Fong Ang and Reza Ismail. 2018. Blockchain technology the identity management and authentication service disruptor: a survey. International Journal on Advanced Science Engineering and Information Technology 8 4-2 (2018) 1735\u20131745.","DOI":"10.18517\/ijaseit.8.4-2.6838"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Yang Liu Debiao He Mohammad\u00a0S Obaidat Neeraj Kumar Muhammad\u00a0Khurram Khan and Kim-Kwang\u00a0Raymond Choo. 2020. Blockchain-based identity management systems: A review. Journal of network and computer applications 166 (2020) 102731.","DOI":"10.1016\/j.jnca.2020.102731"},{"key":"e_1_3_3_1_14_2","unstructured":"Daniel McIntosh. 2018. We need to talk about data: how digital monopolies arise and why they have power and influence. J. Tech. L. & Pol\u2019y 23 (2018) 185."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE51541.2021.9582551"},{"key":"e_1_3_3_1_17_2","unstructured":"Antti Poikola Kai Kuikkaniemi Ossi Kuittinen Harri Honko Aleksi Knuutila and Viivi L\u00e4hteenoja. 2020. MyData\u2013an introduction to human-centric use of personal data (3rd. (2020)."},{"key":"e_1_3_3_1_18_2","unstructured":"Javelin Strategy\u00a0& Research. 2022. Identity Fraud Losses Total $52 Billion in 2021 Impacting 42 Million U.S. Adults \u2014 javelinstrategy.com. https:\/\/javelinstrategy.com\/press-release\/identity-fraud-losses-total-52-billion-2021-impacting-42-million-us-adults. [Accessed 16-04-2024]."},{"key":"e_1_3_3_1_19_2","unstructured":"NIST researchers. December 20 2021. Blockchain \u2014 nist.gov. https:\/\/www.nist.gov\/blockchain. [Accessed 22-04-2024]."},{"key":"e_1_3_3_1_20_2","unstructured":"Aaron S. Jul 07 2023. What is Truffle? Definition & Meaning | Crypto Wiki \u2014 bitdegree.org. https:\/\/www.bitdegree.org\/crypto\/learn\/crypto-terms\/what-is-truffle. [Accessed 27-04-2024]."},{"key":"e_1_3_3_1_21_2","unstructured":"sagarboina. [n. d.]. e-Estonia: The power and potential of digital identity - Thomson Reuters Institute \u2014 thomsonreuters.com. https:\/\/www.thomsonreuters.com\/en-us\/posts\/news-and-media\/e-estonia-power-potential-digital-identity\/. [Accessed 11-03-2024]."},{"key":"e_1_3_3_1_22_2","unstructured":"Abylay Satybaldy Mariusz Nowostawski and J\u00f8rgen Ellingsen. 2020. Self-sovereign identity systems: Evaluation framework. Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2 9.6\/11.7 11.6\/SIG 9.2. 2 International Summer School Windisch Switzerland August 19\u201323 2019 Revised Selected Papers 14 (2020) 447\u2013461."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Abylay Satybaldy Anushka Subedi and Mariusz Nowostawski. 2022. A framework for online document verification using self-sovereign identity technology. Sensors 22 21 (2022) 8408.","DOI":"10.3390\/s22218408"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Chang\u00a0Soo Sung and Joo\u00a0Yeon Park. 2021. Understanding of blockchain-based identity management system adoption in the public sector. Journal of Enterprise Information Management 34 5 (2021) 1481\u20131505.","DOI":"10.1108\/JEIM-12-2020-0532"},{"key":"e_1_3_3_1_25_2","unstructured":"Hasan Syed. 2019. Power to The People: How Blockchain Based Digital Identity Can Empower Disadvantaged Individuals. (2019)."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10299"},{"key":"e_1_3_3_1_27_2","unstructured":"Alchemy Team. 2022. Alchemy SDK Quickstart \u2014 docs.alchemy.com. https:\/\/docs.alchemy.com\/reference\/alchemy-sdk-quickstart. [Accessed 22-04-2024]."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Xiaohui Yang and Wenjie Li. 2020. A zero-knowledge-proof-based digital identity management scheme in blockchain. Computers & Security 99 (2020) 102050.","DOI":"10.1016\/j.cose.2020.102050"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:47Z","timestamp":1750298207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":27,"alternative-id":["10.1145\/3723178.3723258","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723258","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}