{"id":"https://openalex.org/W4389279206","doi":"https://doi.org/10.1145/3627106.3627110","title":"Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance","display_name":"Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance","publication_year":2023,"publication_date":"2023-12-02","ids":{"openalex":"https://openalex.org/W4389279206","doi":"https://doi.org/10.1145/3627106.3627110"},"language":"en","primary_location":{"id":"doi:10.1145/3627106.3627110","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3627106.3627110","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3627106.3627110","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3627106.3627110","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063345238","display_name":"Ke Wang","orcid":"https://orcid.org/0000-0001-5537-2483"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Wang","raw_affiliation_strings":["School of Computer Science, Peking University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089030314","display_name":"Jianbo Gao","orcid":"https://orcid.org/0000-0002-6760-5552"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I4210096250","display_name":"Beijing Institute of Big Data Research","ror":"https://ror.org/00s1sz824","country_code":"CN","type":"facility","lineage":["https://openalex.org/I20231570","https://openalex.org/I37796252","https://openalex.org/I4210096250"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbo Gao","raw_affiliation_strings":["School of Computer Science, Peking University, China and Peking University Chongqing Research Institute of Big Data, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, China and Peking University Chongqing Research Institute of Big Data, China","institution_ids":["https://openalex.org/I4210096250","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015272246","display_name":"Q. Edward Wang","orcid":"https://orcid.org/0009-0001-8333-2689"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiao Wang","raw_affiliation_strings":["School of Computer Science, Peking University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026151248","display_name":"Jiashuo Zhang","orcid":"https://orcid.org/0000-0002-8140-9208"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashuo Zhang","raw_affiliation_strings":["School of Computer Science, Peking University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100387790","display_name":"Yue Li","orcid":"https://orcid.org/0000-0002-4137-619X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Li","raw_affiliation_strings":["School of Computer Science, Peking University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["National Engineering Research Center For Software Engineering, Peking University, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center For Software Engineering, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107170492","display_name":"Zhong Chen","orcid":"https://orcid.org/0000-0002-5785-2912"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["School of Computer Science, Peking University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5063345238"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.9822,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.76237113,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"216","last_page":"228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.8190722465515137},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.7394810318946838},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6317609548568726},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5564207434654236},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5384236574172974},{"id":"https://openalex.org/keywords/resistance","display_name":"Resistance (ecology)","score":0.4485640525817871},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43242546916007996},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4208378195762634},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4155958890914917},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.41488611698150635},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17729127407073975},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.14605796337127686}],"concepts":[{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.8190722465515137},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.7394810318946838},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6317609548568726},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5564207434654236},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5384236574172974},{"id":"https://openalex.org/C57473165","wikidata":"https://www.wikidata.org/wiki/Q7315604","display_name":"Resistance (ecology)","level":2,"score":0.4485640525817871},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43242546916007996},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4208378195762634},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4155958890914917},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.41488611698150635},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17729127407073975},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.14605796337127686},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3627106.3627110","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3627106.3627110","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3627106.3627110","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3627106.3627110","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3627106.3627110","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3627106.3627110","source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3616018988","display_name":null,"funder_award_id":"62202011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4449585094","display_name":null,"funder_award_id":"62172010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7727894187","display_name":null,"funder_award_id":"2022YFB2703203","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389279206.pdf","grobid_xml":"https://content.openalex.org/works/W4389279206.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1481308465","https://openalex.org/W1502328873","https://openalex.org/W1568042310","https://openalex.org/W1595522037","https://openalex.org/W1600255172","https://openalex.org/W1607188293","https://openalex.org/W1888254701","https://openalex.org/W2031618446","https://openalex.org/W2057385274","https://openalex.org/W2094557617","https://openalex.org/W2106583429","https://openalex.org/W2116881075","https://openalex.org/W2133420971","https://openalex.org/W2165210192","https://openalex.org/W2496543269","https://openalex.org/W2507130841","https://openalex.org/W2559643681","https://openalex.org/W2593581261","https://openalex.org/W2977247807","https://openalex.org/W3090834155","https://openalex.org/W3113133964","https://openalex.org/W3198185738","https://openalex.org/W3214556590","https://openalex.org/W4309567662","https://openalex.org/W4313270705","https://openalex.org/W4402355466"],"related_works":["https://openalex.org/W2494121465","https://openalex.org/W4377233172","https://openalex.org/W1854749775","https://openalex.org/W2014125255","https://openalex.org/W4312971597","https://openalex.org/W2129556718","https://openalex.org/W1970818898","https://openalex.org/W4391222116","https://openalex.org/W4390678258","https://openalex.org/W2296702370"],"abstract_inverted_index":{"Decentralized":[0],"identity":[1,24],"(DID),":[2],"the":[3,19,23,39,47],"idea":[4],"of":[5,26,37],"giving":[6],"users":[7],"complete":[8],"control":[9],"over":[10],"their":[11],"identity-related":[12],"data,":[13],"is":[14],"being":[15],"used":[16],"to":[17],"solve":[18],"privacy":[20,40],"tension":[21],"in":[22],"management":[25],"decentralized":[27],"applications":[28],"(Dapps).":[29],"While":[30],"existing":[31],"approaches":[32,54],"do":[33],"an":[34],"excellent":[35],"job":[36],"solving":[38],"tension,":[41],"they":[42],"have":[43,55],"not":[44],"adequately":[45],"addressed":[46],"accountability":[48],"and":[49],"Sybil-resistance":[50],"issues.":[51],"Moreover,":[52],"these":[53],"a":[56],"considerable":[57],"gas":[58],"overhead,":[59],"making":[60],"them":[61],"impractical":[62],"for":[63],"Dapps.":[64]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
