{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:55:07Z","timestamp":1773294907136,"version":"3.50.1"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702294"],"award-info":[{"award-number":["61702294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["17-1-1-10-jch"],"award-info":[{"award-number":["17-1-1-10-jch"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019598","name":"Applied Basic Research Fund of Qingdao","doi-asserted-by":"publisher","award":["61702294"],"award-info":[{"award-number":["61702294"]}],"id":[{"id":"10.13039\/501100019598","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019598","name":"Applied Basic Research Fund of Qingdao","doi-asserted-by":"publisher","award":["17-1-1-10-jch"],"award-info":[{"award-number":["17-1-1-10-jch"]}],"id":[{"id":"10.13039\/501100019598","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,9,10]]},"abstract":"<jats:p>Most of the existing identity management is the centralized architecture that has to validate, certify, and manage identity in a centralized approach by trusted authorities. Decentralized identity is causing widespread public concern because it enables to give back control of identity to clients, and the client then has the ability to control when, where, and with whom they share their credentials. A decentralized solution atop on blockchain will bypass the centralized architecture and address the single point of the failure problem. To our knowledge, blockchain is an inherited pseudonym but it cannot achieve anonymity and auditability directly. In this paper, we approach the problem of decentralized identity management starting from the designated-verifier anonymous credential (DVAC in short). DVAC would assist to build a new practical decentralized identity management with anonymity and auditability. Apart from the advantages of the conventional anonymous credential, the main advantage of the proposed DVAC atop blockchain is that the issued cryptographic token will be divided into shares at the issue phase and will be combined at the showing credential phase. Further, the smooth projective hash function (<jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mi mathvariant=\"sans-serif\">SPHF<\/a:mi>\n                     <\/a:math>\n                  <\/jats:inline-formula> in short) is regarded as a designated-verifier zero-knowledge proof system. Thus, we introduce the <jats:inline-formula>\n                     <d:math xmlns:d=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\">\n                        <d:mi mathvariant=\"sans-serif\">SPHF<\/d:mi>\n                     <\/d:math>\n                  <\/jats:inline-formula> to achieve the designated verifiability without compromising the privacy of clients. Finally, the security of the proposed DVAC is proved along with theoretical and experimental evaluations.<\/jats:p>","DOI":"10.1155\/2021\/2807395","type":"journal-article","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T19:05:09Z","timestamp":1631300709000},"page":"1-15","source":"Crossref","is-referenced-by-count":3,"title":["Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9236-5642","authenticated-orcid":true,"given":"Xudong","family":"Deng","sequence":"first","affiliation":[{"name":"College of Computer Science & Technology, Qingdao University, Qingdao 266071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2474-910X","authenticated-orcid":true,"given":"Chengliang","family":"Tian","sequence":"additional","affiliation":[{"name":"College of Computer Science & Technology, Qingdao University, Qingdao 266071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6381-623X","authenticated-orcid":true,"given":"Fei","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science & Technology, Qingdao University, Qingdao 266071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7538-338X","authenticated-orcid":true,"given":"Hequn","family":"Xian","sequence":"additional","affiliation":[{"name":"College of Computer Science & Technology, Qingdao University, Qingdao 266071, China"}]}],"member":"311","reference":[{"issue":"7","key":"1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MC.2003.1212687","article-title":"Net passport: a security analysis","volume":"36","author":"R. O. Microsoft","year":"2003","journal-title":"Computer"},{"key":"2","article-title":"Final report on diginotar hack shows total compromise of ca servers","author":"D. Fisher","year":"2012"},{"key":"3","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"S. Nakamoto","year":"2008"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23253"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.009"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2012.2221931"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"issue":"12","key":"9","first-page":"495","article-title":"Efficient proofs for cnf formulas on attributes in pairing-based anonymous credential system","volume":"E96-A","author":"N. Begum","year":"2012","journal-title":"ICE Transactions on Fundamentals of Electronics Communications and Computer ences"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15898-8_13"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3040776"},{"issue":"9","key":"12","article-title":"Liberty alliance project-gemeinschaftliche identit\u00e4tsverwaltung","volume":"27","author":"C. Buchholz","year":"2003","journal-title":"Datenschutz und Datensicherheit"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762479"},{"key":"14","article-title":"Centralized authentication services","volume-title":"Encyclopedia of Information Assurance","author":"W. Stackpole","year":"2011"},{"issue":"2","key":"15","first-page":"029101:1","article-title":"Multi-key FHE for multi-bit messages","volume":"61","author":"Z. Li","year":"2018","journal-title":"Science China Information Sciences"},{"key":"16","article-title":"A decentralized public key infrastructure with identity retention. IACR Cryptol","author":"C. Fromknecht","year":"2014"},{"key":"17","first-page":"181","article-title":"A global naming and storage system secured by blockchains","author":"M. Ali"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23272","article-title":"Coconut: threshold issuance selective disclosure credentials with applications to distributed ledgers","author":"A. Sonnino","year":"2019"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/cvcbt50464.2020.00010"},{"key":"23","first-page":"65","article-title":"Zkledger: privacy-preserving auditing for distributed ledgers","author":"N. Narula"},{"key":"24","first-page":"63","article-title":"Pretp: privacy-preserving electronic toll pricing","author":"J. Balasch"},{"key":"25","article-title":"The phantom tollbooth: privacy-preserving electronic toll collection in the presence of driver collusion","author":"S. Meiklejohn"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_4"},{"key":"27","first-page":"138","article-title":"Two-round PAKE protocol over lattices without NIZK","volume-title":"Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers, Volume 11449 of Lecture Notes in Computer Science","author":"Z. Li","year":"2018"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2019.2939836"},{"issue":"2","key":"29","doi-asserted-by":"crossref","first-page":"844","DOI":"10.1109\/JIOT.2020.3008773","article-title":"Building low-interactivity multi-factor authenticated key exchange for industrial internet-of-things","volume":"8","author":"Z. Li","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_25"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368342"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11145-7_14"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_6"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/2807395.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/2807395.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/2807395.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T15:07:31Z","timestamp":1634051251000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/2807395\/"}},"subtitle":[],"editor":[{"given":"Vishal","family":"Sharma","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"references-count":34,"alternative-id":["2807395","2807395"],"URL":"https:\/\/doi.org\/10.1155\/2021\/2807395","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9,10]]}}}