{"id":"https://openalex.org/W7127342260","doi":"https://doi.org/10.1007/978-981-95-6419-4_3","title":"IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain","display_name":"IdentityGuardian: A Distributed Regulatory Scheme for Identity Privacy Protection in Blockchain","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7127342260","doi":"https://doi.org/10.1007/978-981-95-6419-4_3"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-95-6419-4_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-6419-4_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030237295","display_name":"Haosu Cheng","orcid":"https://orcid.org/0000-0002-5851-8617"},"institutions":[{"id":"https://openalex.org/I59483232","display_name":"Shandong University of Finance and Economics","ror":"https://ror.org/02e2nnq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I59483232"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haosu Cheng","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]},{"raw_affiliation_string":"Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124925001","display_name":"Guanquan Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I59483232","display_name":"Shandong University of Finance and Economics","ror":"https://ror.org/02e2nnq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I59483232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanquan Shi","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China","Shandong Technology Innovation Center of Social Governance Intelligence, Shandong University of Finance and Economics, Jinan, 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]},{"raw_affiliation_string":"Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]},{"raw_affiliation_string":"Shandong Technology Innovation Center of Social Governance Intelligence, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124967385","display_name":"Kangkang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I59483232","display_name":"Shandong University of Finance and Economics","ror":"https://ror.org/02e2nnq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I59483232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kangkang Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China","Shandong Technology Innovation Center of Social Governance Intelligence, Shandong University of Finance and Economics, Jinan, 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]},{"raw_affiliation_string":"Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]},{"raw_affiliation_string":"Shandong Technology Innovation Center of Social Governance Intelligence, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124950587","display_name":"Wenyu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I59483232","display_name":"Shandong University of Finance and Economics","ror":"https://ror.org/02e2nnq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I59483232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyu Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]},{"raw_affiliation_string":"Shandong Key Laboratory of Blockchain Finance, Shandong University of Finance and Economics, Jinan, 250014, China","institution_ids":["https://openalex.org/I59483232"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030237295"],"corresponding_institution_ids":["https://openalex.org/I59483232"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.59160839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"42","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9023000001907349,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9023000001907349,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.050200000405311584,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.00839999970048666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7376000285148621},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6362000107765198},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.6057999730110168},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5794000029563904},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5065000057220459},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.49880000948905945},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4814999997615814},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.46860000491142273},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.42809998989105225},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4244999885559082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8208000063896179},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7601000070571899},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7376000285148621},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6362000107765198},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.6057999730110168},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5794000029563904},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5065000057220459},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.49880000948905945},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4814999997615814},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.46860000491142273},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.42809998989105225},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4244999885559082},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.3930000066757202},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.37790000438690186},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.36309999227523804},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.358599990606308},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.35019999742507935},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.34630000591278076},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34209999442100525},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.33820000290870667},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32679998874664307},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C142685569","wikidata":"https://www.wikidata.org/wiki/Q1086961","display_name":"Bilinear map","level":3,"score":0.31299999356269836},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.3084000051021576},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.29190000891685486},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.2881999909877777},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.2791999876499176},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2671999931335449},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.26089999079704285}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-95-6419-4_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-95-6419-4_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7672885656356812,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2565287832","https://openalex.org/W2955349104","https://openalex.org/W3090607068","https://openalex.org/W3160872014","https://openalex.org/W4391641496"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-02-07T06:11:34.122080","created_date":"2026-02-04T00:00:00"}
