{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:27:38Z","timestamp":1750138058303,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031226762"},{"type":"electronic","value":"9783031226779"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22677-9_10","type":"book-chapter","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T09:04:32Z","timestamp":1673341472000},"page":"170-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme"],"prefix":"10.1007","author":[{"given":"Yanran","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,11]]},"reference":[{"unstructured":"Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin. https:\/\/bitcoin.org\/bitcoin.pdf 4 (2008)","key":"10_CR1"},{"issue":"2014","key":"10_CR2","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow pap. 151(2014), 1\u201332 (2014)","journal-title":"Ethereum project yellow pap."},{"doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: EUROSYS, pp. 1\u201315 (2018)","key":"10_CR3","DOI":"10.1145\/3190508.3190538"},{"unstructured":"Erc-20 token standard. https:\/\/ethereum.org\/en\/developers\/docs\/standards\/tokens\/erc-20 (2022)","key":"10_CR4"},{"unstructured":"Erc-721 token standard. https:\/\/ethereum.org\/en\/developers\/docs\/standards\/tokens\/erc-721 (2022)","key":"10_CR5"},{"doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (SFCS), pp. 160\u2013164. IEEE (1982)","key":"10_CR6","DOI":"10.1109\/SFCS.1982.38"},{"unstructured":"Yakoubov, S.: A gentle introduction to yao\u2019s garbled circuits. preprint on webpage at https:\/\/web.mit.edu\/sonka89\/www\/papers\/2017ygc.pdf (2017)","key":"10_CR7"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-32009-5_38","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"I Damg\u00e5rd","year":"2012","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643\u2013662. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_38"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-40203-6_1","volume-title":"Computer Security \u2013 ESORICS 2013","author":"I Damg\u00e5rd","year":"2013","unstructured":"Damg\u00e5rd, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority \u2013 or: breaking the SPDZ limits. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 1\u201318. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_1"},{"doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: Network and Distributed System Security Symposium (NDSS) (2015)","key":"10_CR10","DOI":"10.14722\/ndss.2015.23113"},{"unstructured":"Mohassel, P., Rindal, P.: ABY3: a mixed protocol framework for machine learning. In: Conference on Computer and Communications Security (CCS), pp. 35\u201352 (2018)","key":"10_CR11"},{"doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","key":"10_CR12","DOI":"10.1145\/359168.359176"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/18.335890","volume":"40","author":"A Beimel","year":"1994","unstructured":"Beimel, A., Chor, B.: Universally ideal secret-sharing schemes. IEEE Trans. Inf. Theory 40(3), 786\u2013794 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. Cryptology ePrint Archive (2005)","key":"10_CR14"},{"unstructured":"Binance order matching examples. https:\/\/docs.binance.org\/match-examples.html (2022)","key":"10_CR15"},{"issue":"2\u20133","key":"10_CR16","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1561\/3300000019","volume":"2","author":"D Evans","year":"2018","unstructured":"Evans, D., et al.: A pragmatic introduction to secure multi-party computation. Found. Trends Priv. Secur. 2(2\u20133), 70\u2013246 (2018)","journal-title":"Found. Trends Priv. Secur."},{"unstructured":"Phiri, K.K., et al.: Linear (t, n) secret sharing scheme based on single polynomial. Int. J. Appl. Eng. Res. 13(14), 11600\u201311605 (2018)","key":"10_CR17"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45539-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"R Cramer","year":"2000","unstructured":"Cramer, R., Damg\u00e5rd, I., Maurer, U.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316\u2013334. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_22"},{"doi-asserted-by":"crossref","unstructured":"Keller, M.: MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1575\u20131590 (2020)","key":"10_CR19","DOI":"10.1145\/3372297.3417872"},{"key":"10_CR20","volume-title":"Cosmos whitepaper","author":"J Kwon","year":"2019","unstructured":"Kwon, J., et al.: Cosmos whitepaper. A Netw. Distrib, Ledgers (2019)"},{"key":"10_CR21","first-page":"2327","volume":"21","author":"G Wood","year":"2016","unstructured":"Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White Paper 21, 2327\u20134662 (2016)","journal-title":"White Paper"},{"doi-asserted-by":"crossref","unstructured":"Bailie, A.H., Thomas, S.: Interledger: creating a standard for payments. In: Proceedings of the 25th International Conference Companion on World Wide Web (WWW), pp. 281\u2013282 (2016)","key":"10_CR22","DOI":"10.1145\/2872518.2889307"},{"doi-asserted-by":"crossref","unstructured":"Zamyatin, A., Harz, D., et al.: XCLAIM: trustless, interoperable, cryptocurrency-backed assets. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 193\u2013210. IEEE (2019)","key":"10_CR23","DOI":"10.1109\/SP.2019.00085"},{"unstructured":"Btcrelay\u2019s documentation. http:\/\/btc-relay.readthedocs.io\/en\/latest (2022)","key":"10_CR24"},{"unstructured":"Saberhagen, N.V.: CryptoNote v 2.0 (2013)","key":"10_CR25"},{"doi-asserted-by":"crossref","unstructured":"Wang, Q., et al.: Preserving transaction privacy in bitcoin. FGCS 107, 793\u2013804 (2020)","key":"10_CR26","DOI":"10.1016\/j.future.2017.08.026"},{"doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.: Zerocoin: anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397\u2013411. IEEE (2013)","key":"10_CR27","DOI":"10.1109\/SP.2013.34"},{"unstructured":"Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 459\u2013474. IEEE (2014)","key":"10_CR28"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-662-58820-8_5","volume-title":"Financial Cryptography and Data Security","author":"S Bowe","year":"2019","unstructured":"Bowe, S., Gabizon, A., Green, M.D.: A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 64\u201377. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_5"},{"issue":"3","key":"10_CR30","first-page":"1","volume":"52","author":"R Zhang","year":"2019","unstructured":"Zhang, R., et al.: Security and privacy on blockchain. CSUR 52(3), 1\u201334 (2019)","journal-title":"Security and privacy on blockchain. CSUR"},{"doi-asserted-by":"crossref","unstructured":"Rujia Li et al.: Sok: TEE-assisted confidential smart contract. PETS 2022, 711\u2013731 (2022)","key":"10_CR31","DOI":"10.56553\/popets-2022-0093"},{"doi-asserted-by":"crossref","unstructured":"Kosba, A., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839\u2013858. IEEE (2016)","key":"10_CR32","DOI":"10.1109\/SP.2016.55"},{"doi-asserted-by":"crossref","unstructured":"Cheng, R., et al.: Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contracts. In: 2019 IEEE European Symposium on Security and Privacy (EuroSP), pp. 185\u2013200. IEEE (2019)","key":"10_CR33","DOI":"10.1109\/EuroSP.2019.00023"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22677-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T22:40:45Z","timestamp":1728686445000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22677-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031226762","9783031226779"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22677-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"11 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}