{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T03:55:23Z","timestamp":1776052523504,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772363.3798823","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T01:55:28Z","timestamp":1776045328000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Grant, Verify, Revoke: A User-Centric Pattern for Blockchain Compliance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4126-624X","authenticated-orcid":false,"given":"Supriya","family":"Khadka","sequence":"first","affiliation":[{"name":"Centre for Computational Science and Mathematical Modelling, Coventry University, Coventry, Coventry, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Information Sciences and Technology, George Mason University, Fairfax, Virginia, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Andrick Adhikari Sanchari Das and Rinku Dewri. 2025. Natural Language Processing of Privacy Policies: A Survey. arXiv e-prints 0 (2025) 1\u201327\u00a0pages."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240916"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.5673790"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Rafael Belchior Andr\u00e9 Vasconcelos S\u00e9rgio Guerreiro and Miguel Correia. 2021. A survey on blockchain interoperability: Past present and future trends. Acm Computing Surveys (CSUR) 54 8 (2021) 1\u201341.","DOI":"10.1145\/3471140"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Marta Bell\u00e9s-Mu\u00f1oz Miguel Isabel Jose\u00a0Luis Mu\u00f1oz-Tapia Albert Rubio and Jordi Baylina. 2022. Circom: A circuit description language for building zero-knowledge applications. IEEE Transactions on Dependable and Secure Computing 20 6 (2022) 4733\u20134751.","DOI":"10.1109\/TDSC.2022.3232813"},{"key":"e_1_3_3_1_7_2","first-page":"781","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct { Non-Interactive} zero knowledge for a von neumann architecture. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX, San Diego, CA, USA, 781\u2013796."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"J.\u00a0B. Bernab\u00e9 J.\u00a0L. C\u00e1novas J.\u00a0L. Hern\u00e1ndez\u2010Ramos R.\u00a0T. Moreno and A. Skarmeta. 2019. Privacy\u2010Preserving Solutions for Blockchain: Review and Challenges. IEEE Access 7 (2019) 164908\u2013164940. 10.1109\/ACCESS.2019.2952172","DOI":"10.1109\/ACCESS.2019.2952172"},{"key":"e_1_3_3_1_9_2","series-title":"Lecture Notes in Computer Science","volume-title":"Financial Cryptography and Data Security","author":"Borisov Nikita","year":"2021","unstructured":"Nikita Borisov and Claudia Diaz (Eds.). 2021. Financial Cryptography and Data Security. Lecture Notes in Computer Science, Vol.\u00a012675. Springer, Berlin, Heidelberg."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2023.23017"},{"key":"e_1_3_3_1_11_2","unstructured":"Vitalik Buterin. 2016. Privacy on the Blockchain. https:\/\/blog.ethereum.org\/2016\/01\/15\/privacy-on-the-blockchain. Ethereum Foundation Blog."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2019.00023"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Mauro Conti E\u00a0Sandeep Kumar Chhagan Lal and Sushmita Ruj. 2018. A survey on security and privacy issues of bitcoin. IEEE communications surveys & tutorials 20 4 (2018) 3416\u20133452.","DOI":"10.1109\/COMST.2018.2842460"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/BuildSEC64048.2024.00019"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681864"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1177\/1071181322661032"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.669"},{"key":"e_1_3_3_1_18_2","unstructured":"European Parliament and Council of the European Union. 2016. Regulation (EU) 2016\/679 (General Data Protection Regulation). Official Journal of the European Union. Article 5(1)(c): Data minimisation."},{"key":"e_1_3_3_1_19_2","unstructured":"Financial Action Task Force (FATF). 2019. Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers. https:\/\/www.fatf-gafi.org\/en\/publications\/Fatfrecommendations\/Guidance-rba-virtual-assets.html. Establishes KYC\/AML obligations for virtual asset service providers."},{"key":"e_1_3_3_1_20_2","unstructured":"Rodrigo\u00a0Dutra Garcia Gowri Ramachandran Kealan Dunnett Raja Jurdak Caetano Ranieri Bhaskar Krishnamachari and Jo Ueyama. 2024. A Survey of Blockchain-Based Privacy Applications: An Analysis of Consent Management and Self-Sovereign Identity Approaches. arxiv:https:\/\/arXiv.org\/abs\/2411.16404\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2411.16404"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.5356100"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713263"},{"key":"e_1_3_3_1_23_2","first-page":"4981","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Gupta Naman","year":"2024","unstructured":"Naman Gupta, Kate Walsh, Sanchari Das, and Rahul Chatterjee. 2024. \" I really just leaned on my community for support\": Barriers, Challenges, and Coping Mechanisms Used by Survivors of { Technology-Facilitated} Abuse to Seek Social Support. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, USA, 4981\u20134998."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713798"},{"key":"e_1_3_3_1_25_2","unstructured":"iden3. 2025. snarkjs: zkSNARK implementation in JavaScript & WASM. https:\/\/github.com\/iden3\/snarkjs. Accessed: 2025-12-16."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","unstructured":"Georgy Ishmaev. 2021. Sovereignty Privacy and Ethics in Blockchain-Based Identity Management Systems. Ethics and Information Technology 23 3 (2021) 239\u2013252. 10.1007\/s10676-020-09563-x","DOI":"10.1007\/s10676-020-09563-x"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Supriya Khadka Dhiman Goswami and Sanchari Das. 2026. Poster: Privacy-Preserving Compliance Checks on Ethereum via Selective Disclosure. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2602.18539 1 (2026) 3\u00a0pages.","DOI":"10.2139\/ssrn.6275398"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Urvashi Kishnani Isabella Cardenas Jailene Castillo Rosalyn Conry Lukas Rodwin Rika Ruiz Matthew Walther and Sanchari Das. 2024. Towards perceived security perceived privacy and the universal design of e-payment applications. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.05446 1 (2024) 6\u00a0pages.","DOI":"10.2139\/ssrn.4887848"},{"key":"e_1_3_3_1_29_2","first-page":"444","volume-title":"International Conference on Information Systems Security","author":"Kishnani Urvashi","year":"2025","unstructured":"Urvashi Kishnani and Sanchari Das. 2025. Security and Privacy Assessment of US and Non-US Android E-Commerce Applications. In International Conference on Information Systems Security. Springer, Springer, Indore, Madhya Pradesh, India, 444\u2013454."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_24"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563196"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617102"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69035-3_53"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","unstructured":"Evan Krul Hye-young Paik Sushmita Ruj and Salil\u00a0S. Kanhere. 2024. SoK: Trusting Self-Sovereign Identity. Proceedings on Privacy Enhancing Technologies 2024 3 (July 2024) 297\u2013313. 10.56553\/popets-2024-0079","DOI":"10.56553\/popets-2024-0079"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Vinay Rishiwal Udit Agarwal Mano Yadav Aziz Alotaibi Preeti Yadav and Sudeep Tanwar. 2024. Blockchain-secure gaming environments: A comprehensive survey. IEEE Access 12 (2024) 183466\u2013183488.","DOI":"10.1109\/ACCESS.2024.3510467"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/BuildSEC64048.2024.00020"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2512.16394"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_3_1_40_2","first-page":"2797","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Sharma Tanusree","year":"2024","unstructured":"Tanusree Sharma, Lin Kyi, Yang Wang, and Asia\u00a0J Biega. 2024. \" I\u2019m not convinced that they don\u2019t collect more than is necessary\":{ User-Controlled} Data Minimization Design in Search Engines. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX, Philadelphia, PA, USA, 2797\u20132812."},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642464"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642291"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"Teck\u00a0Ming Tan and Saila Saraniemi. 2023. Trust in blockchain-enabled exchanges: Future directions in blockchain marketing. Journal of the Academy of marketing Science 51 4 (2023) 914\u2013939.","DOI":"10.1007\/s11747-022-00889-0"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Faiza Tazi and Sanchari Das. 2024. Evaluating telehealth for women in mexico: Privacy usability and integration challenges in remote healthcare. Usability and Integration Challenges in Remote Healthcare (July 15 2024) 1 (2024) 5\u00a0pages.","DOI":"10.2139\/ssrn.4952644"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/SWC50871.2021.00062"},{"key":"e_1_3_3_1_46_2","volume-title":"Verifiable Credentials Data Model v1.1","author":"(W3C) World Wide Web\u00a0Consortium","year":"2022","unstructured":"World Wide Web\u00a0Consortium (W3C). 2022. Verifiable Credentials Data Model v1.1. W3C Recommendation. World Wide Web Consortium (W3C). https:\/\/www.w3.org\/TR\/vc-data-model-1.1\/"},{"key":"e_1_3_3_1_47_2","unstructured":"Kevin Werbach. 2018. Trust but verify: Why the blockchain needs the law. Berkeley Technology Law Journal 33 2 (2018) 487\u2013550."},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642534"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"crossref","unstructured":"Markos Zachariadis Garrick Hileman and Susan\u00a0V Scott. 2019. Governance and control in distributed ledgers: Understanding the challenges facing blockchain technology in financial services. Information and organization 29 2 (2019) 105\u2013117.","DOI":"10.1016\/j.infoandorg.2019.03.001"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","unstructured":"Rui Zhang Rui Xue and Ling Liu. 2019. Security and privacy on blockchain. ACM Computing Surveys (CSUR) 52 3 (2019) 1\u201334. 10.1145\/3316481","DOI":"10.1145\/3316481"},{"key":"e_1_3_3_1_51_2","unstructured":"Guy Zyskind Oz Nathan and Alex Pentland. 2015. Enigma: Decentralized Computation Platform with Guaranteed Privacy. arxiv:https:\/\/arXiv.org\/abs\/1506.03471\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/1506.03471"}],"event":{"name":"CHI EA '26: Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems","location":"Barcelona , Spain","acronym":"CHI EA '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772363.3798823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T03:40:14Z","timestamp":1776051614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772363.3798823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":50,"alternative-id":["10.1145\/3772363.3798823","10.1145\/3772363"],"URL":"https:\/\/doi.org\/10.1145\/3772363.3798823","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}