{"id":"https://openalex.org/W7117100675","doi":"https://doi.org/10.1109/brains67003.2025.11302943","title":"Identity-Private Healthcare Data Sharing on Blockchain via Zero-Knowledge Proofs and Account Abstraction","display_name":"Identity-Private Healthcare Data Sharing on Blockchain via Zero-Knowledge Proofs and Account Abstraction","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W7117100675","doi":"https://doi.org/10.1109/brains67003.2025.11302943"},"language":null,"primary_location":{"id":"doi:10.1109/brains67003.2025.11302943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/brains67003.2025.11302943","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 7th Conference on Blockchain Research &amp;amp; Applications for Innovative Networks and Services (BRAINS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042296723","display_name":"Kun Li","orcid":"https://orcid.org/0009-0000-2744-7417"},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Kun Li","raw_affiliation_strings":["Maastricht University,Department of Advanced Computing Sciences,Maastricht,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Maastricht University,Department of Advanced Computing Sciences,Maastricht,The Netherlands","institution_ids":["https://openalex.org/I34352273"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014494157","display_name":"Ankur Lohachab","orcid":"https://orcid.org/0000-0002-5291-7860"},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ankur Lohachab","raw_affiliation_strings":["Maastricht University,Department of Advanced Computing Sciences,Maastricht,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Maastricht University,Department of Advanced Computing Sciences,Maastricht,The Netherlands","institution_ids":["https://openalex.org/I34352273"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027943658","display_name":"Visara Urovi","orcid":"https://orcid.org/0000-0003-2817-3950"},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Visara Urovi","raw_affiliation_strings":["Maastricht University,Department of Advanced Computing Sciences,Maastricht,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Maastricht University,Department of Advanced Computing Sciences,Maastricht,The Netherlands","institution_ids":["https://openalex.org/I34352273"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042296723"],"corresponding_institution_ids":["https://openalex.org/I34352273"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76485525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.814300000667572,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.814300000667572,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.06759999692440033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.017799999564886093,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.6100999712944031},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5881999731063843},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.49050000309944153},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4189000129699707},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4000999927520752},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.3732999861240387},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.37040001153945923},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.36739999055862427},{"id":"https://openalex.org/keywords/unique-identifier","display_name":"Unique identifier","score":0.35899999737739563}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.765999972820282},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.6100999712944031},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5758000016212463},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.49050000309944153},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4189000129699707},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40950000286102295},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4000999927520752},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3732999861240387},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.37040001153945923},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.36739999055862427},{"id":"https://openalex.org/C119839945","wikidata":"https://www.wikidata.org/wiki/Q6545185","display_name":"Unique identifier","level":3,"score":0.35899999737739563},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.328000009059906},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2874999940395355},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.28369998931884766},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C2779194965","wikidata":"https://www.wikidata.org/wiki/Q11711607","display_name":"Ixabepilone","level":5,"score":0.2791000008583069},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C139458680","wikidata":"https://www.wikidata.org/wiki/Q12184942","display_name":"Interoperation","level":3,"score":0.27079999446868896},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2596000134944916},{"id":"https://openalex.org/C197129107","wikidata":"https://www.wikidata.org/wiki/Q1921621","display_name":"Merge (version control)","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/brains67003.2025.11302943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/brains67003.2025.11302943","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 7th Conference on Blockchain Research &amp;amp; Applications for Innovative Networks and Services (BRAINS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4394976794719696}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1885156594","https://openalex.org/W2022932831","https://openalex.org/W2496543269","https://openalex.org/W2744999500","https://openalex.org/W2886332328","https://openalex.org/W2946488372","https://openalex.org/W2963509939","https://openalex.org/W2963693643","https://openalex.org/W2963993810","https://openalex.org/W2967483719","https://openalex.org/W2982300697","https://openalex.org/W2987069389","https://openalex.org/W2990094262","https://openalex.org/W3040978927","https://openalex.org/W3129114628","https://openalex.org/W3144896584","https://openalex.org/W3189412839","https://openalex.org/W4238168673","https://openalex.org/W4245534785","https://openalex.org/W4288345394","https://openalex.org/W4295007736","https://openalex.org/W4360981976","https://openalex.org/W4385486688","https://openalex.org/W4399269510","https://openalex.org/W4399688473","https://openalex.org/W4401386949","https://openalex.org/W4405181278","https://openalex.org/W4408650479"],"related_works":[],"abstract_inverted_index":{"Blockchains":[0],"are":[1],"considered":[2],"for":[3,129,166,196],"healthcare":[4,197],"data":[5],"sharing":[6],"due":[7],"to":[8,125,180],"their":[9],"immutability,":[10],"decentralization,":[11],"and":[12,20,27,40,64,71,85,102,104,113,143,174],"auditability.":[13],"However,":[14],"ledger":[15],"transparency":[16],"exposes":[17],"on-chain":[18,147],"identifiers":[19,84],"activity":[21],"metadata,":[22,148],"enabling":[23,80],"linkage":[24],"across":[25],"pseudonyms":[26],"inference":[28,145],"over":[29,146],"user":[30],"behavior.":[31],"Prior":[32],"work":[33],"has":[34],"primarily":[35],"focused":[36],"on":[37,95],"content":[38],"confidentiality":[39],"access":[41],"control,":[42],"while":[43,191],"leaving":[44],"identity":[45],"unlinkability":[46],"insufficiently":[47],"addressed.":[48],"To":[49],"this":[50],"end,":[51],"we":[52],"present":[53],"an":[54],"approach":[55,68,150],"that":[56],"integrates":[57],"Account":[58],"ion":[59],"(AA),":[60],"zeroknowledge":[61],"proofs":[62],"(Groth16),":[63],"Pedersen":[65],"commitments.":[66],"The":[67],"embeds":[69],"proof-":[70],"commitment-based":[72],"verification":[73],"into":[74],"programmable":[75],"smart":[76],"contract":[77],"accounts":[78],"(SCAs),":[79],"authentication":[81],"without":[82,171],"disclosing":[83],"decoupling":[86],"transactions":[87],"from":[88],"static":[89],"keys.":[90],"We":[91],"develop":[92],"a":[93,108,161],"proof-of-concept":[94],"the":[96,118,121,130,133,152,193],"Polygon":[97],"Amoy":[98],"testnet":[99],"using":[100],"Circom":[101],"Solidity,":[103],"evaluate":[105],"privacy":[106,172],"under":[107],"global,":[109],"passive,":[110],"external,":[111],"static,":[112],"computationally":[114],"bounded":[115],"attacker.":[116],"For":[117],"ERC-4337":[119,167],"comparison,":[120,132],"attacker":[122,134],"is":[123],"assumed":[124],"know":[126],"user-SCA":[127],"mappings;":[128],"account-shuffling":[131],"knows":[135],"one":[136],"SCA":[137],"per":[138],"user.":[139],"Using":[140],"entropy":[141,154],"metrics":[142],"clustering-based":[144],"our":[149],"achieves":[151],"maximum":[153],"of":[155],"$\\log":[156],"_{2}(10)":[157],"\\approx":[158],"3.32$":[159],"in":[160],"ten-user":[162],"setting":[163],"(versus":[164],"0":[165],"as":[168],"specified,":[169],"i.e.,":[170],"extensions)":[173],"substantially":[175],"reduces":[176],"clustering":[177],"accuracy":[178],"relative":[179],"address":[181],"shuffling":[182],"(ARI":[183],"$0.468":[184],"\\rightarrow":[185,189],"0.038$,":[186],"NMI":[187],"$0.653":[188],"0.177$),":[190],"maintaining":[192],"auditability":[194],"required":[195],"governance.":[198]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-12-24T00:00:00"}
