{"id":"https://openalex.org/W7108200672","doi":"https://doi.org/10.1109/tdsc.2025.3638770","title":"Privacy-Preserving and Aggregated Proofs of Assets in Multiple Banks","display_name":"Privacy-Preserving and Aggregated Proofs of Assets in Multiple Banks","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7108200672","doi":"https://doi.org/10.1109/tdsc.2025.3638770"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3638770","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3638770","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Meng Jia","orcid":"https://orcid.org/0000-0003-3623-3490"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Jia","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Erjun Zhou","orcid":"https://orcid.org/0009-0001-3831-7789"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Erjun Zhou","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jielun Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jielun Zeng","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78682883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"3612","last_page":"3624"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.848800003528595,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.848800003528595,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.08889999985694885,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.007199999876320362,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.9581999778747559},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.8361999988555908},{"id":"https://openalex.org/keywords/balance","display_name":"Balance (ability)","score":0.47440001368522644},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4357999861240387},{"id":"https://openalex.org/keywords/balance-sheet","display_name":"Balance sheet","score":0.40119999647140503},{"id":"https://openalex.org/keywords/liability","display_name":"Liability","score":0.38530001044273376}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.9581999778747559},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.8361999988555908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6620000004768372},{"id":"https://openalex.org/C168031717","wikidata":"https://www.wikidata.org/wiki/Q1530280","display_name":"Balance (ability)","level":2,"score":0.47440001368522644},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4357999861240387},{"id":"https://openalex.org/C183206440","wikidata":"https://www.wikidata.org/wiki/Q46834","display_name":"Balance sheet","level":2,"score":0.40119999647140503},{"id":"https://openalex.org/C2777834853","wikidata":"https://www.wikidata.org/wiki/Q96776939","display_name":"Liability","level":2,"score":0.38530001044273376},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.36070001125335693},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29679998755455017},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.26820001006126404},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.25290000438690186},{"id":"https://openalex.org/C105605280","wikidata":"https://www.wikidata.org/wiki/Q7249999","display_name":"Proof complexity","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3638770","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3638770","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W35289019","https://openalex.org/W1538440442","https://openalex.org/W2008472274","https://openalex.org/W2612871929","https://openalex.org/W2736188416","https://openalex.org/W2913435035","https://openalex.org/W2979437559","https://openalex.org/W3141585064","https://openalex.org/W3142890126","https://openalex.org/W3158918373","https://openalex.org/W3185684768","https://openalex.org/W3208203740","https://openalex.org/W3210540511","https://openalex.org/W3213435350","https://openalex.org/W4250022584","https://openalex.org/W4293783385","https://openalex.org/W4298171975","https://openalex.org/W4310390388","https://openalex.org/W4312750639","https://openalex.org/W4321606809","https://openalex.org/W4388857500","https://openalex.org/W4388858092","https://openalex.org/W4393034225","https://openalex.org/W4400035832","https://openalex.org/W4409833427"],"related_works":[],"abstract_inverted_index":{"Proof":[0],"of":[1,66,95,113,119,129,132,146],"reserves/assets":[2],"is":[3,167,193],"widely":[4],"used":[5],"for":[6,115,121],"visa":[7],"application,":[8],"loan,":[9],"and":[10,39,75,79,92,106,117,149,187],"auction":[11],"in":[12,36,46,97,140,195],"practice,":[13],"where":[14,135],"provers":[15,136,161],"display":[16],"balance":[17,107,166],"proofs":[18,65,94,112,118,131],"generated":[19],"by":[20,73],"banks":[21,38,59,116,142,150],"to":[22,24,41,60,154],"verifiers":[23],"prove":[25,42,69,163],"their":[26],"balances.":[27],"In":[28,86],"real":[29],"world,":[30],"a":[31,53,81,103,126,170],"prover":[32,54],"usually":[33],"deposits":[34],"money":[35],"multiple":[37,98,141],"needs":[40],"her/his":[43,70],"total":[44],"balances":[45,71,139],"those":[47,58],"banks.":[48,99],"Based":[49],"on":[50,184],"existing":[51],"technologies,":[52],"can":[55,137,162],"either":[56],"request":[57],"interactively":[61],"generate":[62],"an":[63],"aggregated":[64,93,130,165],"assets":[67,96,120,133],"or":[68,177],"one":[72],"one,":[74],"they":[76],"are":[77],"inefficient":[78],"have":[80],"low":[82],"privacy":[83],"protection":[84],"effect.":[85],"this":[87],"paper,":[88],"we":[89,101,124],"present":[90],"privacy-preserving":[91],"Specifically,":[100],"design":[102],"liability":[104],"auditing":[105],"proving":[108],"architecture":[109],"that":[110,191],"supports":[111],"liabilities":[114],"provers.":[122],"Then,":[123],"propose":[125],"generic":[127],"construction":[128],"scheme,":[134],"aggregate":[138],"without":[143,172],"the":[144,160,164,174,178,188],"help":[145],"any":[147],"bank":[148,179],"do":[151],"not":[152],"need":[153],"interact":[155],"with":[156],"each":[157],"other.":[158],"Moreover,":[159],"more":[168],"than":[169],"threshold":[171],"exposing":[173],"specific":[175],"values":[176],"information.":[180],"We":[181],"conduct":[182],"experiments":[183],"our":[185],"system":[186],"results":[189],"demonstrate":[190],"it":[192],"suitable":[194],"practice.":[196]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-03T00:00:00"}
