{"id":"https://openalex.org/W4405974255","doi":"https://doi.org/10.1109/tdsc.2024.3524760","title":"DidTrust: Privacy-Preserving Trust Management for Decentralized Identity","display_name":"DidTrust: Privacy-Preserving Trust Management for Decentralized Identity","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4405974255","doi":"https://doi.org/10.1109/tdsc.2024.3524760"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3524760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3524760","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101587445","display_name":"Jie Yin","orcid":"https://orcid.org/0000-0002-4891-7593"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Yin","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x2019;an, China","State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009050006","display_name":"Yang Xiao","orcid":"https://orcid.org/0000-0002-0946-3197"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Xiao","raw_affiliation_strings":["State Key Laboratory of Integrated ServicesNetworks, School of Cyber Engineering, Engineering Research Center of Trusted Digital Economy, Universities of Shaanxi Province, Xidian University, Xi&#x2019;an, China","State Key Laboratory of Integrated ServicesNetworks, School of Cyber Engineering, and the Engineering Research Center of Trusted Digital Economy, Universities of Shaanxi Province, XidianUniversity, XianChina"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated ServicesNetworks, School of Cyber Engineering, Engineering Research Center of Trusted Digital Economy, Universities of Shaanxi Province, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated ServicesNetworks, School of Cyber Engineering, and the Engineering Research Center of Trusted Digital Economy, Universities of Shaanxi Province, XidianUniversity, XianChina","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101709392","display_name":"Jie Feng","orcid":"https://orcid.org/0000-0002-5474-3286"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Feng","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x2019;an, China","State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101467712","display_name":"Mengmeng Yang","orcid":"https://orcid.org/0000-0002-6411-2971"},"institutions":[{"id":"https://openalex.org/I4210101388","display_name":"Health Sciences and Nutrition","ror":"https://ror.org/0152bt112","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4210101388","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mengmeng Yang","raw_affiliation_strings":["Commonwealth Scientific and Industrial Research Organization, Canberra, ACT, Australia","Commonwealth Scientific and Industrial Research Organization, Australia"],"affiliations":[{"raw_affiliation_string":"Commonwealth Scientific and Industrial Research Organization, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I4210101388"]},{"raw_affiliation_string":"Commonwealth Scientific and Industrial Research Organization, Australia","institution_ids":["https://openalex.org/I4210101388"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101845665","display_name":"Qingqi Pei","orcid":"https://orcid.org/0000-0001-7614-1422"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingqi Pei","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x2019;an, China","State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks and Shaanxi KeyLaboratory of Blockchain and Secure Computing, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100709723","display_name":"Xun Yi","orcid":"https://orcid.org/0000-0001-7351-5724"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xun Yi","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101587445"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":22.3639,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.99186979,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"22","issue":"3","first_page":"3105","last_page":"3120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5939881205558777},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5855339765548706},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5801703929901123},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.5791156888008118},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5328118801116943},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.498291015625},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.44816210865974426},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3468899428844452},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.2040163278579712}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5939881205558777},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5855339765548706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5801703929901123},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5791156888008118},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5328118801116943},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.498291015625},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.44816210865974426},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3468899428844452},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2040163278579712},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3524760","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3524760","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1496983640","https://openalex.org/W1499934958","https://openalex.org/W1520914943","https://openalex.org/W1524288918","https://openalex.org/W1986050400","https://openalex.org/W2007259720","https://openalex.org/W2013252044","https://openalex.org/W2038010772","https://openalex.org/W2120600729","https://openalex.org/W2235832317","https://openalex.org/W2402235285","https://openalex.org/W2542747939","https://openalex.org/W2560696915","https://openalex.org/W2794685135","https://openalex.org/W2921581504","https://openalex.org/W2964062734","https://openalex.org/W2969043484","https://openalex.org/W2975766084","https://openalex.org/W3014044251","https://openalex.org/W3036664055","https://openalex.org/W3036803688","https://openalex.org/W3047114037","https://openalex.org/W3059807238","https://openalex.org/W3108672920","https://openalex.org/W3135672624","https://openalex.org/W3138603542","https://openalex.org/W3141591825","https://openalex.org/W3167290409","https://openalex.org/W3209723788","https://openalex.org/W4210520566","https://openalex.org/W4225283349","https://openalex.org/W4226049484","https://openalex.org/W4282834981","https://openalex.org/W4285506551","https://openalex.org/W4295725587","https://openalex.org/W4312549091","https://openalex.org/W4312877737","https://openalex.org/W4321366457","https://openalex.org/W4365790479","https://openalex.org/W4383200098","https://openalex.org/W4386558805","https://openalex.org/W4390422162","https://openalex.org/W4394896790","https://openalex.org/W4401211368","https://openalex.org/W4402156512","https://openalex.org/W6678832241"],"related_works":["https://openalex.org/W1807703735","https://openalex.org/W4238930562","https://openalex.org/W4313185140","https://openalex.org/W2124644269","https://openalex.org/W4226026616","https://openalex.org/W1532113758","https://openalex.org/W3016057931","https://openalex.org/W2046178677","https://openalex.org/W2070501633","https://openalex.org/W2584827882"],"abstract_inverted_index":{"Decentralized":[0],"identity":[1,12,108],"(DID)":[2],"is":[3,42],"rapidly":[4],"emerging":[5],"as":[6,27,33],"a":[7,34,105,123,159,178],"promising":[8],"alternative":[9],"to":[10,63,73,94,118,171,198],"centralized":[11],"infrastructure,":[13],"offering":[14],"numerous":[15],"real-world":[16],"applications.":[17],"However,":[18],"existing":[19],"DID":[20],"systems":[21],"are":[22,49],"confronted":[23],"with":[24],"trust":[25,45,71,96,109,119,146,193],"concerns,":[26],"any":[28],"distributed":[29],"node":[30],"can":[31],"act":[32],"credential":[35],"issuer":[36],"and":[37,67,91,116,136,144,181,187],"be":[38,172],"considered":[39],"trusted,":[40],"which":[41],"impractical.":[43],"Effective":[44],"management":[46,110],"(TM)":[47],"protocols":[48,79],"critical":[50],"for":[51,163],"system":[52],"trustworthiness":[53],"but":[54],"face":[55],"two":[56],"primary":[57],"challenges:":[58],"preserving":[59],"user":[60],"feedback":[61,124,131,160],"privacy":[62,115,126],"meet":[64],"regulation":[65],"requirements":[66],"building":[68],"resilience":[69,117],"against":[70,142],"attacks":[72],"prevent":[74],"manipulation.":[75],"While":[76],"privacy-preserving":[77],"TM":[78],"effectively":[80],"safeguard":[81],"sensitive":[82],"data,":[83],"they":[84],"often":[85],"obscure":[86],"feedback,":[87],"hindering":[88],"anomaly":[89],"detection":[90,149,195],"complicating":[92],"efforts":[93],"counter":[95],"attacks.":[97,120],"To":[98,154],"address":[99],"these":[100],"issues,":[101],"we":[102,157],"propose":[103],"DidTrust,":[104],"novel":[106],"decentralized":[107],"protocol":[111,128],"that":[112,129],"bridges":[113],"data":[114,125,132],"DidTrust":[121,170],"features":[122],"preservation":[127],"conceals":[130],"while":[133,190],"maintaining":[134],"authorizability":[135],"verifiability.":[137],"It":[138],"also":[139],"implements":[140],"countermeasures":[141],"cooperative":[143],"individual":[145],"attacks,":[147],"improving":[148],"accuracy":[150],"without":[151],"compromising":[152],"privacy.":[153],"improve":[155],"efficiency,":[156],"introduce":[158],"compression":[161],"module":[162],"large-scale":[164],"sparse":[165],"matrices.":[166],"Rigorous":[167],"analysis":[168],"proves":[169],"universally":[173],"composable":[174],"(UC)":[175],"secure":[176],"under":[177],"malicious":[179],"model,":[180],"experiments":[182],"demonstrate":[183],"its":[184],"improved":[185],"computational":[186],"storage":[188],"efficiency":[189],"achieving":[191],"higher":[192],"attack":[194],"rates":[196],"compared":[197],"BC-Trust.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
