{"id":"https://openalex.org/W4415482228","doi":"https://doi.org/10.1109/tdsc.2025.3624710","title":"$\\mathsf {DisIMS}$ DisIMS: A Distributed Identity Management System via Blockchain","display_name":"$\\mathsf {DisIMS}$ DisIMS: A Distributed Identity Management System via Blockchain","publication_year":2025,"publication_date":"2025-10-23","ids":{"openalex":"https://openalex.org/W4415482228","doi":"https://doi.org/10.1109/tdsc.2025.3624710"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3624710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3624710","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038793808","display_name":"Zoey Ziyi Li","orcid":"https://orcid.org/0000-0002-6419-0734"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zoey Ziyi Li","raw_affiliation_strings":["Faculty of Engineering and Information Technology, University of Melbourne, Melbourne, VIC, Australia","Faculty of Engineering and Information Technology, University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Information Technology, University of Melbourne, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I165779595"]},{"raw_affiliation_string":"Faculty of Engineering and Information Technology, University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011853980","display_name":"Hui Cui","orcid":"https://orcid.org/0000-0002-5820-2233"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hui Cui","raw_affiliation_strings":["Department of Software Systems and Cybersecurity, Monash University, Melbourne, VIC, Australia","Department of Software Systems and Cybersecurity, Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Software Systems and Cybersecurity, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department of Software Systems and Cybersecurity, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032005367","display_name":"Alven C. Y. Leung","orcid":"https://orcid.org/0000-0001-5243-1302"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Alven C. Y. Leung","raw_affiliation_strings":["Hong Kong Polytechnic University, Hong Kong SAR, China","Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, Hong Kong SAR, China","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038304841","display_name":"Dennis Liu","orcid":"https://orcid.org/0000-0001-6906-7578"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU","HK"],"is_corresponding":false,"raw_author_name":"Dennis Y. W. Liu","raw_affiliation_strings":["Department of Software Systems and Cybersecurity, Monash University, Melbourne, VIC, Australia","Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Software Systems and Cybersecurity, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joseph K. Liu","raw_affiliation_strings":["Department of Software Systems and Cybersecurity, Monash University, Melbourne, VIC, Australia","Department of Software Systems and Cybersecurity, Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Software Systems and Cybersecurity, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department of Software Systems and Cybersecurity, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060534829","display_name":"Jiangshan Yu","orcid":"https://orcid.org/0000-0001-8006-7392"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiangshan Yu","raw_affiliation_strings":["University of Sydney, Sydney, NSW, Australia","University of Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":null,"display_name":"Dragan Ga\u0161evi\u0107","orcid":"https://orcid.org/0000-0001-9265-1908"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dragan Ga\u0161evi\u0107","raw_affiliation_strings":["Department of Human Centred Computing, Monash University, Melbourne, VIC, Australia","Department of Human Centred Computing, Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Human Centred Computing, Monash University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department of Human Centred Computing, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5038793808"],"corresponding_institution_ids":["https://openalex.org/I165779595"],"apc_list":null,"apc_paid":null,"fwci":3.3265,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.94304888,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"23","issue":"2","first_page":"2131","last_page":"2146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9578999876976013,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.932200014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.821399986743927},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.6247000098228455},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.5802000164985657},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5634999871253967},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5539000034332275},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.5509999990463257},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5478000044822693},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.48260000348091125},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.396699994802475},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3874000012874603}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.821399986743927},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.801800012588501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6959999799728394},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.6247000098228455},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5802000164985657},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5634999871253967},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5539000034332275},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.5509999990463257},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5478000044822693},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.48260000348091125},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.396699994802475},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3874000012874603},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.37220001220703125},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.36719998717308044},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.36010000109672546},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.3555000126361847},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3407000005245209},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33489999175071716},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.32589998841285706},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.32120001316070557},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3199999928474426},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C136810230","wikidata":"https://www.wikidata.org/wiki/Q188961","display_name":"Decentralization","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C198783460","wikidata":"https://www.wikidata.org/wiki/Q629173","display_name":"Management system","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26750001311302185},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.25999999046325684},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.250900000333786},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3624710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3624710","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W159162986","https://openalex.org/W1520146006","https://openalex.org/W1931152882","https://openalex.org/W2014239329","https://openalex.org/W2031618446","https://openalex.org/W2139910984","https://openalex.org/W2148828749","https://openalex.org/W2152924492","https://openalex.org/W2165210192","https://openalex.org/W2211385226","https://openalex.org/W2519173433","https://openalex.org/W2520201040","https://openalex.org/W2765635759","https://openalex.org/W2884325794","https://openalex.org/W2913105718","https://openalex.org/W2964062734","https://openalex.org/W2964250737","https://openalex.org/W3005766641","https://openalex.org/W3011999141","https://openalex.org/W3046073225","https://openalex.org/W3081512183","https://openalex.org/W3161931372","https://openalex.org/W3198185738","https://openalex.org/W3210082821","https://openalex.org/W4283376241","https://openalex.org/W4300127641","https://openalex.org/W4362686174","https://openalex.org/W4388458693","https://openalex.org/W4388600727","https://openalex.org/W4406972519","https://openalex.org/W4407305844"],"related_works":[],"abstract_inverted_index":{"The":[0],"increasing":[1],"incidents":[2],"of":[3,55,64],"data":[4,8],"breaches":[5],"and":[6,36,53,114,157,184],"personal":[7],"misuse":[9],"highlight":[10],"the":[11,24,37,60,139],"urgent":[12],"need":[13],"for":[14,27,42,138,207],"robust":[15],"identity":[16,29,97,121],"management":[17,98,122],"systems.":[18],"Self-Sovereign":[19],"Identity":[20],"(SSI)":[21],"emerges":[22],"as":[23],"future":[25],"solution":[26],"digital":[28],"management,":[30],"underpinned":[31],"by":[32,74,83,172,176],"anonymous":[33],"credentials":[34,198],"(AC)":[35],"distributed":[38,96],"ledger":[39],"technology":[40],"(DLT)":[41],"security":[43,62],"measures.":[44],"However,":[45],"current":[46,140],"SSI":[47,103],"models":[48],"only":[49],"achieve":[50],"partial":[51],"decentralization":[52],"none":[54],"them":[56],"can":[57],"fully":[58],"meet":[59],"complex":[61],"requirements":[63],"real-world":[65,208],"applications.":[66],"In":[67],"this":[68,91],"paper,":[69],"we":[70,93],"address":[71],"these":[72],"limitations":[73],"constructing":[75],"a":[76,95,101],"Decentralized":[77],"Anonymous":[78],"Credential":[79],"(DAC)":[80],"scheme":[81],"inspired":[82],"large":[84],"universe":[85],"attribute-based":[86],"cryptographic":[87],"primitives.":[88],"Building":[89],"on":[90,106,151,181,188,191],"foundation,":[92],"design":[94],"system":[99,104],"(DisIMS),":[100],"comprehensive":[102],"built":[105],"blockchain,":[107],"achieving":[108],"attribute":[109],"flexibility,":[110],"anonymity,":[111],"unlinkability,":[112],"revocability":[113],"selective":[115],"disclosure.":[116],"Compared":[117],"to":[118,128,133,179,186,196],"earlier":[119],"blockchain-based":[120],"systems,":[123],"our":[124],"DisIMS":[125,150,205],"allows":[126],"users":[127],"selectively":[129],"link":[130],"previous":[131],"transactions":[132],"generate":[134],"verifiable":[135],"eligibility":[136],"proofs":[137],"transaction":[141],"without":[142],"leaking":[143],"their":[144],"real":[145],"identities.":[146],"We":[147],"also":[148],"implement":[149],"both":[152],"permissioned":[153],"(Hyperledger":[154],"Fabric":[155,183],"v2.5)":[156],"permissionless":[158],"(Ethereum":[159],"Sepolia":[160],"testnet)":[161],"blockchains.":[162],"Experimental":[163],"results":[164],"show":[165],"that":[166],"batch":[167,209],"verification":[168,171,210],"outperforms":[169],"single":[170],"reducing":[173],"execution":[174],"times":[175],"approximately":[177],"76%":[178],"81%":[180],"Hyperledger":[182],"50%":[185],"71%":[187],"Ethereum,":[189],"based":[190],"200":[192],"tests":[193],"with":[194],"10":[195],"50":[197,200],"containing":[199],"attributes":[201],"each,":[202],"which":[203],"demonstrates":[204],"practicality":[206],"scenarios.":[211]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-23T00:00:00"}
