{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T04:14:48Z","timestamp":1774412088223,"version":"3.50.1"},"reference-count":17,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>In recent years, with the development of blockchain technology and increased awareness of personal privacy, Self-Sovereign Identity (SSI) has become a hot topic. SSI gives customers more autonomy over their personal information, allowing them to control who can access and use their personal information. This provides customers with higher levels of privacy protection, as their data are no longer controlled by centralized institutions. To address the credit assessment needs of financial institutions, this paper proposes a Customer Self-Sovereign Identity and access-control framework (CSSI) based on SSI technology. Customers can securely store assessable assets and credit data on the blockchain using this framework. These data are then linked to a digital account address. With customer authorization, financial institutions processing loan applications can comprehensively evaluate customers\u2019 repayment capabilities and conduct risk management by accessing this credit data. CSSI assists financial institutions in optimizing complex and repetitive processes involved in customer credit assessment and loan origination through SSI and access control, thereby reducing unnecessary risks.<\/jats:p>","DOI":"10.3390\/cryptography9010009","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T08:57:48Z","timestamp":1738054668000},"page":"9","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions"],"prefix":"10.3390","volume":"9","author":[{"given":"Hsia-Hung","family":"Ou","sequence":"first","affiliation":[{"name":"Master Program of International Sport Affairs, National Taiwan Sport University, Taoyuan 333325, Taiwan"}]},{"given":"Guan-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, National Chung Hsing University, Taichung 402, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3367-6317","authenticated-orcid":false,"given":"Iuon-Chang","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, National Chung Hsing University, Taichung 402, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Amler, H., Eckey, L., Faust, S., Kaiser, M., Sandner, P., and Schlosser, B. (2021, January 27\u201330). DeFi-ning DeFi: Challenges & Pathway. Proceedings of the 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France.","DOI":"10.1109\/BRAINS52497.2021.9569795"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2018.3191268","article-title":"User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection","volume":"51","author":"Isaak","year":"2018","journal-title":"Computer"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ou, H.H., Pan, C.H., Tseng, Y.M., and Lin, I.C. (2024). Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced Security. Appl. Sci., 14.","DOI":"10.3390\/app14093551"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1016\/j.future.2019.09.010","article-title":"Blockchain-Based Data Privacy Management with Nudge Theory in Open Banking","volume":"110","author":"Wang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Lin, I.C., Kuo, Y.H., Chang, C.C., Liu, J.C., and Chang, C.C. (2024). Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality. Symmetry, 16.","DOI":"10.3390\/sym16020147"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.23919\/JCC.2019.08.004","article-title":"A consortium blockchain paradigm on hyperledger-based peer-to-peer lending system","volume":"16","author":"Zeng","year":"2019","journal-title":"China Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","article-title":"Smart Contract Development: Challenges and Opportunities","volume":"47","author":"Zou","year":"2021","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"200895","DOI":"10.1016\/j.fsidi.2019.200895","article-title":"Identifying Suspicious Addresses in Bitcoin Thefts","volume":"31","author":"Wu","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"126802","DOI":"10.1109\/ACCESS.2022.3225884","article-title":"Perpetual Contract NFT as Collateral for DeFi Composability","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6800938","DOI":"10.1155\/2022\/6800938","article-title":"Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior","volume":"2022","author":"Song","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"137198","DOI":"10.1109\/ACCESS.2020.3011656","article-title":"An Information-Centric Networking Based Registry for Decentralized Identifiers and Verifiable Credentials","volume":"8","author":"Alzahrani","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"78135","DOI":"10.1109\/ACCESS.2023.3299047","article-title":"Orchestrating Digital Wallets for On- and Off-Chain Decentralized Identity Management","volume":"11","author":"Kersic","year":"2023","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Egelund-M\u00fcller, B., Elsman, M., Henglein, F., and Ross, O. (2016, January 11\u201314). Automated Execution of Financial Contracts on Blockchains. Proceedings of the International Conference on Information Systems, Dublin, Ireland.","DOI":"10.2139\/ssrn.2898670"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/CJECE.2020.2970737","article-title":"Decentralized Identifiers and Verifiable Credentials for Smartphone Anticounterfeiting and Decentralized IMEI Database","volume":"43","author":"Omar","year":"2020","journal-title":"Can. J. Electr. Comput. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., and Pentland, A. (2015, January 21\u201322). Decentralizing Privacy: Using Blockchain to Protect Personal Data. Proceedings of the 2015 IEEE Security and Privacy Workshops, San Jose, CA, USA.","DOI":"10.1109\/SPW.2015.27"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1016\/j.future.2019.05.040","article-title":"LoC \u2014A new financial loan management system based on smart contracts","volume":"100","author":"Wang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1857","DOI":"10.1587\/transinf.2021NGP0006","article-title":"Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data","volume":"E104D","author":"Cho","year":"2021","journal-title":"IEICE Trans. Inf. Syst."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/9\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:37:39Z","timestamp":1759919859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,28]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["cryptography9010009"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9010009","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,28]]}}}