<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Towards Provable Provenance and Privacy-Preserving Queries in Decentralised Data Architectures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jesse Wright</string-name>
          <email>jesse.wright@cs.ox.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Oxford, Department of Computer Science</institution>
          ,
          <addr-line>Wolfson Building, Parks Rd, Oxford OX1 3QG</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Verifiable Credentials, SPARQL</institution>
          ,
          <addr-line>Zero Knowledge, Zero Knowledge Proof, RDF, JSON-LD</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>2</fpage>
      <lpage>6</lpage>
      <abstract>
        <p>This research investigates how to add provenance to SPARQL queries, and support queries over distributed sources - whilst minimising unecessary information disclosure. To achieve this, we employ Zero Knowledge Proof (ZKP) to minimise provenance, whilst retaining integrity guarantees - and Secure Multi-Party Computation (S)MPC to reduce data-sharing when querying across distributed data-stores. 1. Problem statement This work develops a standardised declarative query language (data sublanguage) for accessing graph database(s) alongside zero-knowledge verifiable provenance statements - including of data sourcing, integrity and derivations. Supported queries include “Is Jesse over 21 according to facts issued by EU or UK governments” - the verifiable response reveals only the answer: “yes.” This query language is first implemented in query engine(s) which evaluate queries over a locally indexed graph database. Support is then added for queries over the union of data residing across independent and potentially malicious graph-databases; by developing algorithms and architectures which minimize data disclosure between sources when planning and executing queries.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>2. Importance</title>
      <p>
        Verifiable Credentials (VCs) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] are seeing widespread adoption [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Driven by governments and
regulation - many Australian states have had digital drivers licenses [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] since 2016; in Europe eIDAS
(Electronic Identification, Authentication, and Trust Services) 2 regulation [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is mandating that all
EU citizens will have access to at least one European Digital Identity (EUDI) wallet [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]; and the UK’s
Data (Use and Access) Bill [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is likely to bring in parallel regulation to the UK in the form of the
Digital Verification Scheme (DVS). Verifiable Credentials are also becoming heavily relied upon for
supply chain traceability. The United Nations Transperancy Protocol (UNTP) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] - for instance - uses
Verifiable Credentials to prevent conterfeiting, support sustainiability audits and improve automated
decision making.
      </p>
      <p>
        Verifiable Credentials refer to a suite of W3C (World Wide Web Consortium), ISO (International
Standards Organisation) and IETF (Internet Engineering Task Force) standards for signing data.
As shown in Figure 1, there are three entities typically defined within these standards: the issuer –
responsible for creating and signing the data, the holder – who collects signed data from the issuer and
is usually the data subject, and the verifier – who the holder forwards the signed data to as needed.
In the Section 1 minimal example, the Solid Pod [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] is acting as a holder service. The format of the
credentials - and interfaces for transporting credentials between issuer, holder and verifier varies greatly
between the W3C, ISO and IETF standards.
      </p>
      <p>
        There are two primary ISO standards for Verifiable Credentials: the Mobile driving license (mDL)
specification [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the Cards and security devices for personal identification (ISO23220)
specification [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The mDL defines a fixed schema of approximately 30 attributes (including name, address, and
date of birth) for digital driver’s license’s that may be encoded as JSON or CBOR. ISO23220 extends
this to other identity documents, such as passports, residency permits, and building passes. Both
specifications fix the concepts that can be expressed to specific data models, and do not have a (formal
logical) semantics for the data encoded.
      </p>
      <p>
        The IETF is standardising JSON based Verifiable Credentials called SD-JWT-based Verifiable
Credentials [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] - based on JSON Web Tokens (JWT’s) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] which are commonly used for authentication
online. This standard does not restrict what can be expressed within credentials, but also does not
support formal semantic data models out-of-the-box
      </p>
      <p>
        The W3C Verifiable Credentials 2.0 Data Model [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] provides a general model for adding integrity
proofs to JSON-LD [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] documents. This standard does not restrict what statements can be made
within the credential - and by requiring the use of JSON-LD - supports RDF [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and formal semantics
out-of-the-box.
      </p>
      <p>
        ISO, W3C and IETF all support Selective Disclosure (SD) as a feature for preserving privacy when
using Verifiable Credentials. SD enables a holder to reveal a subset of facts within a credential to a
verifier and prove those facts are true without requiring the issuer to issue a new credential. SD is
commonly advertised as enabling privacy preserving age verification with digital drivers licenses [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
SD is typically implemented using the BBS signature scheme [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. The holder of a BBS signature can
generate zero-knowledge proofs of knowledge of the signature, while selectively revealing a subset of
the signed messages. This signature scheme is derived from the 2004 work of Boneh et. al [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. SD has
limited expressivity to proof of set containment. To support proving that one is over 18 - as promised in
mobile drivers licenses - issuers must sign the statement is_over_18 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] rather than holders deriving
this statement from a date of birth.
      </p>
      <p>
        As we discuss in Section 3, theory and tooling exists to support zero-knowledge proof of arbitrary
computations. There is clear demand for more advanced privacy features than SD in Verifiable
Credentials to support use-cases such as that presented in Section 1 and proof-of-age from birth date;
evidenced by active work on this topic in the Credentials Community Group (CCG) [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] with which
the author is actively engaged.
      </p>
      <p>
        Observing that verifiers must be able to describe the information they require from holders - it is
the authors view that the most sensible way to provide these privacy features is through a query
interface. Further, the query language must: use globally unique identifiers [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] to support distributed
data sources out of the box; be compatible with the Open World Assumption (OWA) [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] so that it is
not possible to produce invalid results by choosing to omit credentials from the input; and have clear
execution semantics [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] such that the expected results-set is well-defined whilst enabling query engine
implementations to be specialised to the deployment environment – this is the case with most query
languages such as SQL [22], SPARQL [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and Cypher [23]. Crucially, the semantics of the query must
not be dependent on the endpoint it is executed against, as is the case with query languages such as
GraphQL [24]. The SPARQL Protocol and RDF Query Language (SPARQL) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] supports these three
requirements.
      </p>
      <p>
        Ideally, the query language should capture provenance, including issuer signatures, natively within
the database and query result. This could be supported with the use of SPARQL 1.2 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] to discuss reified
terms (that is, statements about statements). This, the author intends to support a SPARQL 1.2 interface
with proof built-ins as part of this work.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <sec id="sec-3-1">
        <title>3.1. Zero Knowledge Cryptgraphy and zkSNARKS</title>
        <p>
          Contemporary Zero Knowledge Cryptographic techniques support more expressive proofs than Selective
Disclosure (SD). We outline a subset of techniques (abstractions) for creating Zero-Knowledge Succinct
Non-Interactive Argument of Knowledge (zkSNARK) [25]. zkSNARKs allow provers (holders) to
generate a full proof without interacting with the verifier. SD proofs generated from BBS Signatures [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]
are zkSNARKs.
        </p>
        <p>Zero Knowledge Arithmetic Circuits builders (ZK Circuits) [26] - such as circom [26], plonky3
and Halo 2 [27] provide an abstraction for creating zkSNARKs. Circuit builders generate zkSNARKs
proving whether a set of variables satisfies a given set of mathematical constraints. Which mathematical
expressions are supported in the constraints is dependent on the circuit builder - with circom [26]
supporting quadratic constraints. Gu et. al [28] prove that circuit builders can be used to generate
zkSNARKs of correct execution of SQL queries with their implementation of PoneglyphDB [28] using
the Halo 2 Circuit Compiler [27].</p>
        <p>Zero Knowledge Virtual Machines (ZKVMs) enable proof of correct execution of a given
instruction set. RISC Zero [29] is one such Zero Knowledge Virtual Machine which proves that a set of
outputs have been generated by correctly executing a RISC-V instruction set [30] - without revealing
any information about the input or execution trace. Since higher level languages including Rust can be
compiled into RISC-V instruction sets, it is possible to prove whether a set of outputs have come from
the correct execution of any Rust code - provided there are no system calls. There numerous other
ZKVMs including Ceno [31], SP1 [32], Nexus21, Powdr [33] and ZkMIPS [34].</p>
        <p>zkSNARKs for RDF Datasets - Braun et al. [35] have developed a set of zkSNARK capabilities
for RDF terms and datasets which do not depend on circuit or ZKVM abstractions. Specifically, they
support proof of numeric bounds on terms, equality of terms between triples, set non-membership and
selective disclosure at a term level. These proofs can be generated in subsecond speeds on consumer
hardware. Whilst not directly shown in Braun et al. [35] - the capability of proving equality of terms
between triples and selective disclosure at a term level implies the ability to prove that a BGP pattern is
satisfiable by data across a set of credentials.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Distributed query evaluation with (secure) multi-party computation ((S)MPC)</title>
        <p>We now present prior work on distributed query evaluation with (S)MPC. This includes a discussion of
Domain Specific Languages (DSLs) for (S)MPC [ 36] and distributed database implementations that use
(S)MPC.</p>
        <p>There are more than a dozen (S)MPC DSLs. These include the Secure Multiparty Computation
Language (SMCL) [37] which was developed as declarative programming language for Secure
Multiparty Computations, but does not contain descriptions for the security assumptions required for MPC
calculations. Wys* [38] - co-developed by Microsoft Research and the University of Maryland presents
a DSL for (S)MPC which provides program logic to reason about the correctness and security of (S)MPC
programs.</p>
        <p>Most work on (S)MPC over distributed storage is targeted at relational databses, typically with SQL
as the query interface. This work includes SMCQL [39], Conclave [40] and Senate [41]. SMCQL is a
framework for executing SQL series over a Private Data Network (PDN) [39], where a user submits a
query to an honest broker which the orchestrates the Secure Multi-Party Computation over the Private
Data Network with an honest-but-curious threat model. SMCQL supports joins, aggregations and
group-by queries. Conclave [40] supports a similar set of operations to SMCQL but allows weakening of
its security model to achieve improved performance. Senate was developed after SMCQL and Conclave,
and through the planning protocol developed – which enables more parallelisation of computation,
and compartmentalisation to identify when subsets of nodes work towards a particular result – has a
performance that is orders of magnitude faster than SMCQL and Conclave. Senate additionally supports
a stronger malicious security guarantee.</p>
        <p>There is work supporting SMPC over fragments of SPARQL. The Secure Framework for Graph
Outsourcing and SPARQL Evaluation (GOOSE) [42] uses secure multi-party computation to achieve the
following features: no cloud node can learn the graph; no cloud node can learn at the same time the
query and the query answers; and, an external network observer cannot learn the graph, the query, or
the query answers. However, GOOSE is limited to support Unions of Conjunctions of Regular Path
Queries (UCRPQ) and does not support common numeric or build-in operations such as COUNT, SUM
and AVG. Further, GOOSE requires an honest broker to design the query plan and communicate it to
the compute cluster of graph databases. GOOSE also has a fixed assumption that the graph databases
executing the query are honest-but-curious. That is, the databases can be trusted to execute the plan
given to them by the broker.</p>
        <p>SMPG: Secure Multi Party Computation on Graph Databases [43] has been produced as a position
paper and prototype for automatically executing MPC evaluation of Cypher queries [23] over Neo4J [44]
databases. SMPG is built using Conclave and so has matching weak security assumptions in addition
to performance and expressivity challenges. Cypher [23] is problematic for distributed queries as
identifiers are local to the database. Consequently, queries often must explicitly disambiguate entities
by identifying the which node it occurs in within queries MATCH(node1:label1). This is not amenable
to one of our driving goals which is to abstract away all underlying architectures to the greatest extend
possible and have a pure data-layer for systems to work with.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Research question(s) and hypotheses</title>
      <p>This research aims to develop standardised declarative query language (data sublanguage) supporting
zero-knowledge verifiable provenance statements – which shall herein be referred to as a verifiable
data sublanguage.</p>
      <sec id="sec-4-1">
        <title>Research Question</title>
        <p>Which logic profiles of verifiable data sublanguages aford computationally eficient query-engine
implementations against given configurations of data and identity infrastructure?
Sub Questions (RQs)
1. Which logical profiles can be supported by a query engine implementing a verifiable data
sublanguage for a single graph database.
2. When implementing this verifiable data sublanguage across a distributed set of graph
databases:
a) what is the minimal set of information that can be shared (disclosed) between the
graph databases in computing the result, and
b) what logical profiles of the verifiable data sublanguage from RQ1 can be eficiently
supported for given configurations of graph databases.</p>
        <p>RQ1 is expected to use Zero Knowledge Proof (ZKP) techniques, RQ2 is expected to develop federated
query planning and execution engines that apply Secure Multi-Party Computation (SMPC).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Preliminary results</title>
      <p>
        We are currently progressing on RQ1 and have not yet started RQ2. So far, we have developed an
extension of SPARQL 1.1 that supports zero-knowledge proof that a SELECT query result is correct.
Specifically, we prove that results are computed from a knowledge base comprising facts signed by a
given set of issuers. For the architecture we develop, facts are ingested into the knowledge base from
W3C Verifiable Credentials [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] signed using the ed25519 signature algorithm [45]. We have implemented
this SPARQL extension in the RISCZero Zero Knowledge Virtual Machine (ZKVM), benchmarked the
implementation, and outline the performance improvements that can be made to make a production
ready implementation of the SPARQL extension in a near-term timescale.
      </p>
      <p>The RISCZero implementation supports all spec compliant SPARQL 1.1 SELECT Queries. We have
benchmarked the implementation on a range of machines and found the execution time too slow for
production evironments. For example, a Macbook Air machine running macOS Sequoia 15.4.1 with an
M1 chip and 16GB of memory takes approximately 7.5 minutes to execute the query SELECT * WHERE
{ ?s ?p ?o } over a single credential containing 23 triples. This was expected as the goal of the ZKVM
implementation was to design the SPARQL SELECT interface and prove the feasibility of implementing
the interface.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Evaluation</title>
      <p>The theoretical complexity analyses will be performed in the same manner as the SPARQL complexity
analyses have been performed by Perez et. al. [46] for SPARQL and Horrocks et. al. [47] for rule-based
inference profiles such as SROIQ.</p>
      <p>For experimental evaluations we have developed zkSPARQL bench dataset1 which consists of the
Lehigh University Benchmark (LUBM) [48] and Berlin SPARQL Benchmark (BSBM) [49] with the
1https://github.com/jeswr/zkSPARQL-bench/
datasets partitioned and signed to form sets of credentials.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Reflections and future work</title>
      <p>We have so far designed the SPARQL 1.1 SELECT interface and prove the feasibility of implementing
the interface against a centralised database.</p>
      <p>Future work is to support the ASK and CONSTRUCT query methods; and to support the TSV, CSV
and XML results formats for SELECT queries. Moreover, there is also future work to support SPARQL
1.2, including the development of built-ins to support surfacing proof statements as assertions on reified
triples. We also need to begin work on supporting query across distributed databases using (S)MPC.</p>
      <p>
        We are also working to develop more eficient implementations SPARQL 1.1 SELECT interface
with an explicit goal of brinigng the proof time below 1 second when executing common queries over
datasets with less than 1000 triples. To do this we are developing implementations that do not rely on
a ZKVM. For simple queries such as BGP pattern matching we are working with Braun et al. [35] to
directly use properties of BBS+ [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] signatures to generate the proof. For more complex queries, for
instance requiring string operations, we are developing circuit-based implementations - which Gu et.
al [28] show to be eficient in their SQL work.
      </p>
      <p>Declaration on Generative AI
During the preparation of this work, the author(s) used ChatGPT, Claude in order to: discover related
work, Grammar and spelling check, Paraphrase and reword. After using this tool/service, the author
reviewed and edited the content as needed and takes full responsibility for the publication’s content.
Acknowledgements
This student is supervised by Sir Nigel Shadbolt and Professor Jun Zhao and funded by the Department
of Computer Science, University of Oxford.</p>
      <sec id="sec-7-1">
        <title>ISWC 2006, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 30–43.</title>
        <p>[22] C. J. Date, A Guide to the SQL Standard, Addison-Wesley Longman Publishing Co., Inc., 1989.
[23] N. Francis, A. Green, P. Guagliardo, L. Libkin, T. Lindaaker, V. Marsault, S. Plantikow, M. Rydberg,
P. Selmer, A. Taylor, Cypher: An evolving query language for property graphs, in: Proceedings of
the 2018 international conference on management of data, 2018, pp. 1433–1445.
[24] R. Taelman, M. Vander Sande, R. Verborgh, Graphql-ld: linked data querying with graphql, in:</p>
        <p>ISWC2018, the 17th International Semantic Web Conference, 2018, pp. 1–4.
[25] E. Ben-Sasson, A. Chiesa, E. Tromer, M. Virza, Succinct {Non-Interactive} zero knowledge for a
von neumann architecture, in: 23rd USENIX Security Symposium (USENIX Security 14), 2014, pp.
781–796.
[26] M. Bellés-Muñoz, M. Isabel, J. L. Muñoz-Tapia, A. Rubio, J. Baylina, Circom: A circuit description
language for building zero-knowledge applications, IEEE Transactions on Dependable and Secure
Computing 20 (2022) 4733–4751.
[27] Halo2 Contributors, The halo2 book, 2025. URL: https://zcash.github.io/halo2/, accessed:
2025-0513.
[28] B. Gu, J. Fang, F. Nawab, Poneglyphdb: Eficient non-interactive zero-knowledge proofs for
arbitrary sql-query verification, Proc. ACM Manag. Data 3 (2025). URL: https://doi.org/10.1145/
3709713. doi:10.1145/3709713.
[29] RISC Zero, Universal zero knowledge, 2025. URL: https://risczero.com/, accessed: 2025-05-13.
[30] D. Kanter, Risc-v ofers simple, modular isa, Microprocessor Report 1 (2016) 1–5.
[31] T. Liu, Z. Zhang, Y. Zhang, W. Hu, Y. Zhang, Ceno: Non-uniform, segment and parallel
zeroknowledge virtual machine, Journal of Cryptology 38 (2025) 17.
[32] U. Roy, Introducing sp1: A performant, 100% open-source, contributor-friendly zkvm, 2024. URL:
https://blog.succinct.xyz/introducing-sp1/, accessed: 2025-05-13.
[33] Powdr Contributors, Powdr documentation, 2025. URL: https://docs.powdr.org, accessed:
2025-0513.
[34] ZKM Contributors, Zkm architecture, 2025. URL: https://docs.zkm.io/zkm-architecture, accessed:
2025-05-13.
[35] C. H.-J. Braun, T. Käfer, RDF-based Semantics for Selective Disclosure and Zero-knowledge Proofs
on Verifiable Credentials, in: Proceedings of the 21st Extended Semantic Web Conference (ESWC
2025), CEUR Workshop Proceedings, CEUR-WS.org, 2025. URL: https://2025.eswc-conferences.org/,
to appear.
[36] A. C.-C. Yao, How to generate and exchange secrets, in: 27th annual symposium on foundations
of computer science (Sfcs 1986), IEEE, 1986, pp. 162–167.
[37] M. Silaghi, Smc tutorial, https://cs.fit.edu/~msilaghi/SMC/tutorial.htm, ???? Accessed: 2025-05-18.
[38] A. Rastogi, N. Swamy, M. Hicks, Wys*: a dsl for verified secure multi-party computations, in:</p>
        <p>International Conference on Principles of Security and Trust, Springer, 2019, pp. 99–122.
[39] J. Bater, G. Elliott, C. Eggen, S. Goel, A. Kho, J. Rogers, Smcql: secure querying for federated
databases, Proc. VLDB Endow. 10 (2017) 673–684. URL: https://doi.org/10.14778/3055330.3055334.
doi:10.14778/3055330.3055334.
[40] N. Volgushev, M. Schwarzkopf, B. Getchell, M. Varia, A. Lapets, A. Bestavros, Conclave: secure
multi-party computation on big data, in: Proceedings of the Fourteenth EuroSys Conference 2019,
2019, pp. 1–18.
[41] R. Poddar, S. Kalra, A. Yanai, R. Deng, R. A. Popa, J. M. Hellerstein, Senate: a
{MaliciouslySecure}{MPC} platform for collaborative analytics, in: 30th USENIX Security Symposium (USENIX
Security 21), 2021, pp. 2129–2146.
[42] R. Ciucanu, P. Lafourcade, : A secure framework for graph outsourcing and sparql evaluation,
in: IFIP Annual Conference on Data and Applications Security and Privacy, Springer, 2020, pp.
347–366.
[43] N. Al-Juaid, A. Lisitsa, S. Schewe, Smpg: Secure multi party computation on graph databases., in:</p>
        <p>ICISSP, 2022, pp. 463–471.
[44] J. J. Miller, Graph database applications and concepts with neo4j, in: Proceedings of the southern
association for information systems conference, Atlanta, GA, USA, volume 2324, 2013, pp. 141–147.
[45] M. Sporny, D. Longley, G. Bernstein, Data integrity ecdsa cryptosuites v1.0, 2025. URL: https:
//www.w3.org/TR/vc-di-ecdsa/.
[46] J. Pérez, M. Arenas, C. Gutierrez, Semantics and complexity of sparql, in: International semantic
web conference, Springer, 2006, pp. 30–43.
[47] I. Horrocks, O. Kutz, U. Sattler, The even more irresistible sroiq., Kr 6 (2006) 57–67.
[48] Y. Guo, Z. Pan, J. Heflin, Lubm: A benchmark for owl knowledge base systems, Journal of Web</p>
        <p>Semantics 3 (2005) 158–182.
[49] C. Bizer, A. Schultz, The berlin sparql benchmark, International Journal on Semantic Web and
Information Systems (IJSWIS) 5 (2009) 1–24.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Harris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Seaborne</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
          <article-title>Prudh́ommeaux, SPARQL 1.1 Query Language</article-title>
          ,
          <source>W3C Recommendation, W3C</source>
          ,
          <year>2013</year>
          . https://www.w3.org/TR/sparql11-query/.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Hartig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Seaborne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Taelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Tanon</surname>
          </string-name>
          ,
          <article-title>Sparql 1.2 query language</article-title>
          , https: //www.w3.org/TR/sparql12-query/,
          <year>2025</year>
          . W3C Working Draft.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Sambra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Mansour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hawke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zereba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Greco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghanem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zagidulin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aboulnaga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Berners-Lee</surname>
          </string-name>
          ,
          <article-title>Solid: a platform for decentralized social applications based on linked data</article-title>
          ,
          <source>MIT CSAIL &amp; Qatar Computing Research Institute, Tech. Rep</source>
          . (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sporny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Longley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chadwick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Steele</surname>
          </string-name>
          ,
          <source>Verifiable credentials data model v2.0</source>
          ,
          <year>2024</year>
          . URL: https://www.w3.org/TR/2024/CRD-vc
          <string-name>
            <surname>-</surname>
          </string-name>
          data
          <source>-model-2</source>
          .
          <fpage>0</fpage>
          -
          <lpage>20240416</lpage>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wright</surname>
          </string-name>
          , Disambiguating data wallets,
          <year>2025</year>
          . URL: https://blog.jeswr.org/
          <year>2025</year>
          /02/14/data-wallets,
          <source>accessed on May 31</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Personal</surname>
          </string-name>
          identification
          <article-title>- ISO-compliant driving licence - Part 5: Mobile driving licence (mDL) application</article-title>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          ,
          <article-title>Regulation (eu) no 910/2014 of the european parliament and of the council of 23 july 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive</article-title>
          <year>1999</year>
          /93/ec,
          <year>2014</year>
          . URL: https://eur-lex.europa.eu/legal-content/EN/ TXT/?uri=CELEX:32014R0910,
          <source>oficial Journal of the European Union, L</source>
          <volume>257</volume>
          ,
          <year>28</year>
          .8.
          <year>2014</year>
          , p.
          <fpage>73</fpage>
          -
          <lpage>114</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          , European digital identity, https://commission.europa.eu/ strategy-and-policy/priorities-2019
          <article-title>-2024/europe-fit-digital-age/european-digital-identity_en, 2025</article-title>
          . Accessed:
          <fpage>2025</fpage>
          -05-13.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] Data (use and access) bill</article-title>
          [hl], https://bills.parliament.uk/bills/3825,
          <year>2024</year>
          . Bill [HL]
          <article-title>40, introduced in the House of Lords</article-title>
          , UK Parliament,
          <year>2024</year>
          -
          <fpage>25</fpage>
          session.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>UN/CEFACT, Un transparency protocol (untp) specification, 2025</article-title>
          . URL: https://uncefact.github.io/ spec-untp/, accessed:
          <fpage>2025</fpage>
          -05-13.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 1: Generic system architectures of mobile eID systems</article-title>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Fett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yasuda</surname>
          </string-name>
          , B. Campbell,
          <article-title>Selective Disclosure for JWTs (SD-JWT), Internet-Draft draft-ietfoauth-selective-</article-title>
          <string-name>
            <surname>disclosure-</surname>
          </string-name>
          jwt-
          <volume>19</volume>
          , Internet Engineering Task Force,
          <year>2025</year>
          . URL: https://datatracker. ietf.org/doc/draft-ietf
          <article-title>-oauth-selective-disclosure-jwt/</article-title>
          , work in Progress.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>M. B. Jones</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Bradley</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <article-title>Sakimura, JSON Web Token (JWT)</article-title>
          ,
          <source>RFC 7519</source>
          ,
          <year>2015</year>
          . URL: https://www. rfc-editor.
          <source>org/info/rfc7519. doi:10</source>
          .17487/RFC7519.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sporny</surname>
          </string-name>
          , G. Kellogg,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lanthaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Longley</surname>
          </string-name>
          ,
          <article-title>Json-ld 1.1 - a json-based serialization for linked data</article-title>
          , https://www.w3.org/TR/json-ld11/,
          <year>2020</year>
          . W3C Recommendation.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Wood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lanthaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cyganiak</surname>
          </string-name>
          ,
          <source>RDF 1.1 Concepts</source>
          and
          <string-name>
            <given-names>Abstract</given-names>
            <surname>Syntax</surname>
          </string-name>
          ,
          <source>W3C Recommendation 25 February</source>
          <year>2014</year>
          (
          <year>2014</year>
          ). URL: https://www.w3.org/TR/rdf11-concepts/.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <article-title>Department for Science, Innovation and Technology, Government Digital Service, Department for Transport, Ministry of Defence, Ofice for Veterans' Afairs, Digital driving licence coming this year</article-title>
          ,
          <year>2025</year>
          . URL: https://www.gov.uk/government/news/digital-driving
          <article-title>-licence-coming-this-year</article-title>
          , accessed:
          <fpage>2025</fpage>
          -05-13.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T.</given-names>
            <surname>Looker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kalos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Whitehead</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Lodder, The BBS Signature Scheme, Internet-Draft draft-irtfcfrg-bbs-</article-title>
          <source>signatures-08, Internet Research Task Force (IRTF)</source>
          ,
          <year>2025</year>
          . URL: https://identity.foundation/ bbs-signature/
          <article-title>draft-irtf-cfrg-bbs-signatures.html, work in Progress.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D.</given-names>
            <surname>Boneh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Boyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shacham</surname>
          </string-name>
          , Short group signatures, in: Annual international cryptology conference, Springer,
          <year>2004</year>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>W3C</given-names>
            <surname>Credentials Community</surname>
          </string-name>
          <string-name>
            <surname>Group</surname>
          </string-name>
          , Credentials community group, https://www.w3.org/ community/credentials/,
          <year>2025</year>
          . Accessed:
          <fpage>2025</fpage>
          -05-31.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>N.</given-names>
            <surname>Drummond</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shearer</surname>
          </string-name>
          , The open world assumption, in: eSI workshop:
          <article-title>the closed world of databases meets the open world of the semantic web</article-title>
          , volume
          <volume>15</volume>
          ,
          <year>2006</year>
          , p.
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pérez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Arenas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <article-title>Semantics and complexity of sparql</article-title>
          , in: I.
          <string-name>
            <surname>Cruz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Decker</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Allemang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Preist</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Schwabe</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Mika</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Uschold</surname>
            ,
            <given-names>L. M.</given-names>
          </string-name>
          <string-name>
            <surname>Aroyo</surname>
          </string-name>
          (Eds.), The Semantic Web -
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>