{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:03:41Z","timestamp":1725750221819},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3313574","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"594-604","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets."],"prefix":"10.1145","author":[{"given":"Hasini","family":"Gunasinghe","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Ashish","family":"Kundu","sequence":"additional","affiliation":[{"name":"IBM, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[{"name":"IBM, USA"}]},{"given":"Suresh","family":"Chari","sequence":"additional","affiliation":[{"name":"Unknown, USA"}]},{"given":"Kapil","family":"Singh","sequence":"additional","affiliation":[{"name":"IBM, USA"}]},{"given":"Dong","family":"Su","sequence":"additional","affiliation":[{"name":"Unknown, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"E. Androulaki S. Cocco and C. Ferris. 2018. Private and confidential transactions with Hyperledger Fabric. https:\/\/developer.ibm.com\/tutorials\/cl-blockchain-private-confidential-transactions-hyperledger-fabric-zero-knowledge-proof\/Accessed: 1-Nov-2018. E. Androulaki S. Cocco and C. Ferris. 2018. Private and confidential transactions with Hyperledger Fabric. https:\/\/developer.ibm.com\/tutorials\/cl-blockchain-private-confidential-transactions-hyperledger-fabric-zero-knowledge-proof\/Accessed: 1-Nov-2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"volume-title":"Archive: Listing for","year":"2018","author":"Ben-Sasson E.","key":"e_1_3_2_1_3_1","unstructured":"E. Ben-Sasson , I. Bentov , Y. Horesh , and M. Riabzev . 2018 . Scalable, transparent, and post-quantum secure computational integrity. In Cryptology ePrint Archive: Listing for 2018. E. Ben-Sasson, I. Bentov, Y. Horesh, and M. Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity. In Cryptology ePrint Archive: Listing for 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_5_1","unstructured":"David Birch. 2016. Putting identity on the blockchain.http:\/\/www.chyp.com\/putting-identity-on-the-blockchain-part-1-find-a-problem\/. David Birch. 2016. Putting identity on the blockchain.http:\/\/www.chyp.com\/putting-identity-on-the-blockchain-part-1-find-a-problem\/."},{"key":"e_1_3_2_1_6_1","unstructured":"D. Boneh. 1998. Twenty Years of Attacks on the RSA Cryptosystem. https:\/\/crypto.stanford.edu\/%7Edabo\/pubs\/papers\/RSA-survey.pdfAccessed: 22-Sept-2018. D. Boneh. 1998. Twenty Years of Attacks on the RSA Cryptosystem. https:\/\/crypto.stanford.edu\/%7Edabo\/pubs\/papers\/RSA-survey.pdfAccessed: 22-Sept-2018."},{"volume-title":"Proceedings on Privacy Enhancing Technologies.","author":"Brandao A.N.","key":"e_1_3_2_1_7_1","unstructured":"Luis T. A.N. Brandao , N. Christin , G. Danezis , and Anonymous .2015. Toward Mending Two Nation-Scale Brokered Identification Systems . In Proceedings on Privacy Enhancing Technologies. Luis T.A.N. Brandao, N. Christin, G. Danezis, and Anonymous.2015. Toward Mending Two Nation-Scale Brokered Identification Systems. In Proceedings on Privacy Enhancing Technologies."},{"volume-title":"IEEE Symposium on Security and Privacy.","author":"Bunz B.","key":"e_1_3_2_1_8_1","unstructured":"B. Bunz , J. Bootle , D. Boneh , A. Poelstra , P. Wuille , and G. Maxwell . 2018. Zerocash: Decentralized Anonymous Payments from Bitcoin . In IEEE Symposium on Security and Privacy. B. Bunz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell. 2018. Zerocash: Decentralized Anonymous Payments from Bitcoin. In IEEE Symposium on Security and Privacy."},{"first-page":"93","volume-title":"Proceedings of EUROCRYPT '01","author":"Camenisch J.","key":"e_1_3_2_1_9_1","unstructured":"J. Camenisch and A. Lysyanskaya . 2001. An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation . In Proceedings of EUROCRYPT '01 . 93 - 118 . J. Camenisch and A. Lysyanskaya. 2001. An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation. In Proceedings of EUROCRYPT '01. 93-118."},{"key":"e_1_3_2_1_10_1","unstructured":"R. Beaulieu et. al. 2013. The Simon and Speck Families of Lightweight Block Ciphers. https:\/\/eprint.iacr.org\/2013\/404.pdfAccessed: 22-Sept-2018. R. Beaulieu et. al. 2013. The Simon and Speck Families of Lightweight Block Ciphers. https:\/\/eprint.iacr.org\/2013\/404.pdfAccessed: 22-Sept-2018."},{"key":"e_1_3_2_1_11_1","unstructured":"Open Identity Exchange. {n. d.}. OIX - Open Identity Exchange. https:\/\/www.openidentityexchange.org\/Accessed: 22-Nov-2017. Open Identity Exchange. {n. d.}. OIX - Open Identity Exchange. https:\/\/www.openidentityexchange.org\/Accessed: 22-Nov-2017."},{"key":"e_1_3_2_1_12_1","unstructured":"Hyperledger Fabric. 2018. A Blockchain Platform for the Enterprise. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-1.3\/Accessed: 16-Oct-2018. Hyperledger Fabric. 2018. A Blockchain Platform for the Enterprise. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-1.3\/Accessed: 16-Oct-2018."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"R. Gennaro C. Gentry B. Parno and M. Raykova. 2013. Quadratic Span Programs and Succinct NIZKs without PCPs. In EUROCRYPT. R. Gennaro C. Gentry B. Parno and M. Raykova. 2013. Quadratic Span Programs and Succinct NIZKs without PCPs. In EUROCRYPT.","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_1_15_1","unstructured":"GOV.UK. 2018. Introducing GOV.UK Verify. https:\/\/www.gov.uk\/government\/publications\/introducing-govuk-verify\/introducing-govuk-verifyAccessed: 22-Sept-2018. GOV.UK. 2018. Introducing GOV.UK Verify. https:\/\/www.gov.uk\/government\/publications\/introducing-govuk-verify\/introducing-govuk-verifyAccessed: 22-Sept-2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"H. Gunasinghe A. Kundu E. Bertino H. Krawczyk K. Singh S. Chari and D. Su. 2019. PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. https:\/\/www.cerias.purdue.edu\/assets\/pdf\/bibtex_archive\/2019-01.pdfAccessed: 15-Feb-2019. H. Gunasinghe A. Kundu E. Bertino H. Krawczyk K. Singh S. Chari and D. Su. 2019. PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. https:\/\/www.cerias.purdue.edu\/assets\/pdf\/bibtex_archive\/2019-01.pdfAccessed: 15-Feb-2019.","DOI":"10.1145\/3308558.3313574"},{"key":"e_1_3_2_1_17_1","unstructured":"Ahmed Kosba. 2017. jsnark. https:\/\/github.com\/akosba\/jsnarkAccessed: 22-Nov-2017. Ahmed Kosba. 2017. jsnark. https:\/\/github.com\/akosba\/jsnarkAccessed: 22-Nov-2017."},{"volume-title":"IEEE Symposium on Security and Privacy.","author":"Kosba A.","key":"e_1_3_2_1_18_1","unstructured":"A. Kosba , A. Miller , and E. Shi . 2014. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts .. In IEEE Symposium on Security and Privacy. A. Kosba, A. Miller, and E. Shi. 2014. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_19_1","unstructured":"S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System."},{"key":"e_1_3_2_1_20_1","unstructured":"Nat. 2010. Is Expressing Levels Enough for LOA2+?https:\/\/nat.sakimura.org\/2010\/09\/03\/is-expressing-levels-enough-for-loa2\/Accessed: 22-Sept-2018. Nat. 2010. Is Expressing Levels Enough for LOA2+?https:\/\/nat.sakimura.org\/2010\/09\/03\/is-expressing-levels-enough-for-loa2\/Accessed: 22-Sept-2018."},{"key":"e_1_3_2_1_21_1","unstructured":"United States Postal Office. 2014. FCCX Briefing. https:\/\/csrc.nist.gov\/csrc\/media\/events\/ispab-june-2014-meeting\/documents\/ispab_jun2014_fccx-briefing_glair.pdfAccessed: 22-Sept-2018. United States Postal Office. 2014. FCCX Briefing. https:\/\/csrc.nist.gov\/csrc\/media\/events\/ispab-june-2014-meeting\/documents\/ispab_jun2014_fccx-briefing_glair.pdfAccessed: 22-Sept-2018."},{"key":"e_1_3_2_1_22_1","unstructured":"OpenID. 2017. Welcome to OpenID Connect. http:\/\/openid.net\/connect\/Accessed: 22-Nov-2017. OpenID. 2017. Welcome to OpenID Connect. http:\/\/openid.net\/connect\/Accessed: 22-Nov-2017."},{"key":"e_1_3_2_1_23_1","unstructured":"scipr lab. 2017. C++ library for zkSNARKs. https:\/\/github.com\/scipr-lab\/libsnarkAccessed: 22-Nov-2017. scipr lab. 2017. C++ library for zkSNARKs. https:\/\/github.com\/scipr-lab\/libsnarkAccessed: 22-Nov-2017."},{"key":"e_1_3_2_1_24_1","unstructured":"Prabath Siriwardena. 2017. A Deeper Look Into Bitcoin Internals. https:\/\/medium.facilelogin.com\/pay-with-bitcoin-to-play-with-a-fidget-spinner-86b7b43414c0Accessed: 22-Sept-2018. Prabath Siriwardena. 2017. A Deeper Look Into Bitcoin Internals. https:\/\/medium.facilelogin.com\/pay-with-bitcoin-to-play-with-a-fidget-spinner-86b7b43414c0Accessed: 22-Sept-2018."},{"key":"e_1_3_2_1_25_1","unstructured":"Prabath Siriwardena. 2017. Identity on Blockchain (Part I). https:\/\/medium.facilelogin.com\/identity-on-blockchain-part-i-a59d7abe75c0Accessed: 22-Sept-2018. Prabath Siriwardena. 2017. Identity on Blockchain (Part I). https:\/\/medium.facilelogin.com\/identity-on-blockchain-part-i-a59d7abe75c0Accessed: 22-Sept-2018."},{"key":"e_1_3_2_1_26_1","unstructured":"sovrin. 2017. Identity For All. https:\/\/sovrin.org\/Accessed: 22-Nov-2017. sovrin. 2017. Identity For All. https:\/\/sovrin.org\/Accessed: 22-Nov-2017."},{"key":"e_1_3_2_1_27_1","unstructured":"European Union. 2016. General Data Protection Regulation. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679Accessed: 22-Sept-2018. European Union. 2016. General Data Protection Regulation. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679Accessed: 22-Sept-2018."}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco CA USA","acronym":"WWW '19"},"container-title":["The World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3313574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T06:33:02Z","timestamp":1681799582000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3313574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":27,"alternative-id":["10.1145\/3308558.3313574","10.1145\/3308558"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3313574","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}