{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:00:54Z","timestamp":1770224454107,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030003043","type":"print"},{"value":"9783030003050","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00305-0_1","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:55:57Z","timestamp":1536216957000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Succinctly Verifiable Sealed-Bid Auction Smart Contract"],"prefix":"10.1007","author":[{"given":"Hisham S.","family":"Galal","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"1_CR1","unstructured":"Digital assets in ethereum blockchain. \n                      https:\/\/tokenmarket.net\/blockchain\/ethereum\/assets\/"},{"key":"1_CR2","unstructured":"Ethereum gaslimit history (2018). \n                      https:\/\/etherscan.io\/chart\/gaslimit"},{"key":"1_CR3","unstructured":"Python-based system for zk-snark based verifiable computations and smart contracts (2018). \n                      https:\/\/github.com\/Charterhouse\/pysnark"},{"key":"1_CR4","unstructured":"Top 100 cryptocurrencies by market capitalization (2018). \n                      https:\/\/coinmarketcap.com"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: IEEE Symposium on Security and Privacy (SP), pp. 443\u2013458. IEEE (2014)","DOI":"10.1109\/SP.2014.35"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"key":"1_CR7","unstructured":"Ben-Sasson, E., Chiesa, A., Genkin, D., Kfir, S., Tromer, E., Virza, M.: libsnark (2014). \n                      https:\/\/github.com\/scipr-lab\/libsnark"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Green, M., Tromer, E., Virza, M.: Secure sampling of public parameters for succinct zero knowledge proofs. In: IEEE Symposium on Security and Privacy (SP), pp. 287\u2013304. IEEE (2015)","DOI":"10.1109\/SP.2015.25"},{"key":"1_CR9","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Succinct non-interactive zero knowledge for a von neumann architecture. In: USENIX Security Symposium, pp. 781\u2013796 (2014)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"1_CR11","unstructured":"Blass, E.-O., Kerschbaum, F.: Strain: A secure auction for blockchains. Cryptology ePrint Archive, Report 2017\/1044 (2017). \n                      https:\/\/eprint.iacr.org\/2017\/1044"},{"key":"1_CR12","unstructured":"Bonneau, J., Clark, J., Goldfeder, S.: On bitcoin as a public randomness source. IACR Cryptology ePrint Archive 2015, 1015 (2015)"},{"key":"1_CR13","unstructured":"Bowe, S., Gabizon, A., Green, M.D.: A multi-party protocol for constructing the public parameters of the pinocchio zk-snark. Technical report, TR 2017\/602, IACR (2017)"},{"key":"1_CR14","unstructured":"Bowe, S., Gabizon, A., Miers, I.: Scalable multi-party computation for zk-snark parameters in the random beacon model (2017)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Campanelli, M., Gennaro, R., Goldfeder, S., Nizzardo, L.: Zero-knowledge contingent payments revisited: attacks and payments for services. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 229\u2013243. ACM (2017)","DOI":"10.1145\/3133956.3134060"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Galal, H., Youssef, A.: Verifiable sealed-bid auction on the ethereum blockchain. In: International Conference on Financial Cryptography and Data Security, Trusted Smart Contracts Workshop. Springer (2018)","DOI":"10.1007\/978-3-662-58820-8_18"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858. IEEE (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"1_CR18","unstructured":"Krishna, V.: Auction Theory. Academic Press (2009)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Bentov, I.: Amortizing secure computation with penalties. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 418\u2013429. ACM (2016)","DOI":"10.1145\/2976749.2978424"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Vaikuntanathan, V., Vasudevan, P.N.: Improvements to secure computation with penalties. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 406\u2013417. ACM (2016)","DOI":"10.1145\/2976749.2978421"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269. ACM (2016)","DOI":"10.1145\/2976749.2978309"},{"key":"1_CR22","unstructured":"Maxwell, G.: Zero knowledge contingent payment (2011). \n                      https:\/\/en.bitcoin.it\/wiki\/Zero_Knowledge_Contingent_Payment\n                      \n                    . Accessed 05 Jan 2016"},{"key":"1_CR23","unstructured":"Mayer, H.: zk-snark explained: Basic principles (2016). \n                      https:\/\/blog.coinfabrik.com\/wp-content\/uploads\/2017\/03\/zkSNARK-explained_basic_principles.pdf"},{"key":"1_CR24","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"1_CR25","unstructured":"Snchez, D.C.: Raziel: private and verifiable smart contracts on blockchains. Cryptology ePrint Archive, Report 2017\/878 (2017). \n                      https:\/\/eprint.iacr.org\/2017\/878"},{"key":"1_CR26","unstructured":"Reitwiessner, C., Buterin, V.: Elliptic curve pairing operations (2017). \n                      https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-197.md"},{"key":"1_CR27","unstructured":"Reitwiessner, C., Buterin, V.: Elliptic curve point addition and scalar multiplication operations (2017). \n                      https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-196.md"},{"key":"1_CR28","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Paper 151, 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Paper"},{"key":"1_CR29","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Enigma: decentralized computation platform with guaranteed privacy. arXiv preprint \n                      arXiv:1506.03471\n                      \n                     (2015)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00305-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T02:44:37Z","timestamp":1583203477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00305-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030003043","9783030003050"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00305-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CBT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cryptocurrencies and Blockchain Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cbt2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}