{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T14:12:32Z","timestamp":1771078352377,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031692307","type":"print"},{"value":"9783031692314","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-69231-4_12","type":"book-chapter","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T08:25:35Z","timestamp":1732868735000},"page":"170-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ZeroAuction: Zero-Deposit Sealed-Bid Auction via\u00a0Delayed Execution"],"prefix":"10.1007","author":[{"given":"Haoqian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Michelle","family":"Yeo","sequence":"additional","affiliation":[]},{"given":"Vero","family":"Estrada-Gali\u00f1anes","sequence":"additional","affiliation":[]},{"given":"Bryan","family":"Ford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS, pp. 394\u2013403. IEEE Computer Society (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"issue":"4","key":"12_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptol."},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-99073-6_5","volume-title":"Computer Security","author":"E-O Blass","year":"2018","unstructured":"Blass, E.-O., Kerschbaum, F.: Strain: a secure auction for blockchains. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 87\u2013110. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_5"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/978-3-319-96884-1_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Bonneau, J., B\u00fcnz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 757\u2013788. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25"},{"key":"12_CR5","volume":"65","author":"B Chen","year":"2022","unstructured":"Chen, B., Li, X., Xiang, T., Wang, P.: Sbrac: blockchain-based sealed-bid auction with bidding price privacy and public verifiability. J. Inf. Secur. Appl. 65, 103082 (2022)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/s00145-017-9254-z","volume":"31","author":"SG Choi","year":"2018","unstructured":"Choi, S.G., Dachman-Soled, D., Malkin, T., Wee, H.: A black-box construction of non-malleable encryption from semantically secure encryption. J. Cryptol. 31(1), 172\u2013201 (2018)","journal-title":"J. Cryptol."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Coretti, S., Dodis, Y., Tackmann, B., Venturi, D.: Non-malleable encryption: Simpler, shorter, stronger. IACR Cryptol. ePrint Arch. 772 (2015)","DOI":"10.1007\/978-3-662-49096-9_13"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-44987-6_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"G Di Crescenzo","year":"2001","unstructured":"Di Crescenzo, G., Katz, J., Ostrovsky, R., Smith, A.: Efficient and non-interactive non-malleable commitment. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 40\u201359. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_4"},{"key":"12_CR9","unstructured":"Das, S., Awathare, N., Ren, L., Ribeiro, V.J., Bellur, U.: Better late than never; scaling computation in blockchains by delaying execution. arXiv preprint arXiv:2005.11791 (2020)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-43725-1_13","volume-title":"Financial Cryptography and Data Security","author":"S Eskandari","year":"2020","unstructured":"Eskandari, S., Moosavi, S., Clark, J.: SoK: transparent dishonesty: front-running attacks on blockchain. In: Bracciali, A., Clark, J., Pintore, F., R\u00f8nne, P.B., Sala, M. (eds.) FC 2019. LNCS, vol. 11599, pp. 170\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43725-1_13"},{"key":"12_CR11","unstructured":"Gasper (2022). https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/gasper\/. Accessed 03 Oct 2022"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-00305-0_1","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"HS Galal","year":"2018","unstructured":"Galal, H.S., Youssef, A.M.: Succinctly verifiable sealed-bid auction smart contract. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Livraga, G., Rios, R. (eds.) DPM\/CBT -2018. LNCS, vol. 11025, pp. 3\u201319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00305-0_1"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Galal, H.S., Youssef, A.M.: Verifiable sealed-bid auction on the ethereum blockchain. In: Zohar, A., Eyal, I., Teague, V., Clark, J., Bracciali, A., Pintore, F., Sala, M. (eds.) FC 2018. LNCS, vol. 10958, pp. 265\u2013278. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_18","DOI":"10.1007\/978-3-662-58820-8_18"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-030-43725-1_14","volume-title":"Financial Cryptography and Data Security","author":"HS Galal","year":"2020","unstructured":"Galal, H.S., Youssef, A.M.: Trustee: full privacy preserving vickrey auction on top of ethereum. In: Bracciali, A., Clark, J., Pintore, F., R\u00f8nne, P.B., Sala, M. (eds.) FC 2019. LNCS, vol. 11599, pp. 190\u2013207. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43725-1_14"},{"key":"12_CR15","unstructured":"Kharif, O.: Cryptokitties mania overwhelms ethereum network\u2019s processing (2017). https:\/\/www.bloomberg.com\/news\/articles\/2017-12-04\/cryptokitties-quickly-becomes-most-widely-used-ethereum-app"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kr\u00f3l, M., Sonnino, A., Tasiopoulos, A., Psaras, I., Rivi\u00e8re, E.: Pastrami: privacy-preserving, auditable, scalable & trustworthy auctions for multiple items. In: Proceedings of the 21st International Middleware Conference, pp. 296\u2013310 (2020)","DOI":"10.1145\/3423211.3425669"},{"key":"12_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-030-80851-8_3","volume-title":"Applied Cryptography in Computer and Communications","author":"G Lu","year":"2021","unstructured":"Lu, G., Zhang, Y., Lu, Z., Shao, J., Wei, G.: Blockchain-based sealed-bid domain name auction protocol. In: Chen, B., Huang, X. (eds.) AC3 2021. LNICST, vol. 386, pp. 25\u201338. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-80851-8_3"},{"issue":"1","key":"12_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/JCIT.2019010102","volume":"21","author":"MI Mehar","year":"2019","unstructured":"Mehar, M.I., et al.: Understanding a revolutionary and flawed grand experiment in blockchain: the dao attack. J. Cases Inf. Technol. (JCIT) 21(1), 19\u201332 (2019)","journal-title":"J. Cases Inf. Technol. (JCIT)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Momeni, P.: Fairblock: preventing blockchain front-running with minimal overheads. Master\u2019s thesis, University of Waterloo (2022)","DOI":"10.1007\/978-3-031-25538-0_14"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-3-540-76900-2_32","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"R Pass","year":"2007","unstructured":"Pass, R., Shelat, A., Vaikuntanathan, V.: Relations among notions of non-malleability for encryption. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 519\u2013535. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-76900-2_32"},{"key":"12_CR21","unstructured":"Pietrzak, K.: Simple verifiable delay functions. In: ITCS. LIPIcs, vol.\u00a0124, pp. 60:1\u201360:15. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2019)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Ragab, H., Milburn, A., Razavi, K., Bos, H., Giuffrida, C.: Crosstalk: speculative data leaks across cores are real. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1852\u20131867. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00020"},{"key":"12_CR23","unstructured":"Schwartzbach, N.I.: Deposit schemes for incentivizing behavior in finite games of perfect information. CoRR arxiv:2107.08748 (2021)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Tyagi, N., Arun, A., Freitag, C., Wahby, R., Bonneau, J., Mazi\u00e8res, D.: Riggs: decentralized sealed-bid auctions. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 1227\u20131241 (2023)","DOI":"10.1145\/3576915.3623182"},{"key":"12_CR25","unstructured":"Van\u00a0Bulck, J., et al.: Foreshadow: extracting the keys to the intel SGX kingdom with transient Out-of-Order execution. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 991\u20131008 (2018)"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-540-70936-7_23","volume-title":"Theory of Cryptography","author":"H Wee","year":"2007","unstructured":"Wee, H.: One-way permutations, interactive hashing and statistically hiding commitments. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 419\u2013433. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_23"},{"issue":"2014","key":"12_CR27","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Xing, B.C., Shanahan, M., Leslie-Hurd, R.: Intel$$\\text{\\textregistered} $$ software guard extensions (intel$$\\text{\\textregistered} $$ SGX) software support for dynamic memory allocation inside an enclave. In: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, pp. 1\u20139 (2016)","DOI":"10.1145\/2948618.2954330"},{"key":"12_CR29","doi-asserted-by":"publisher","unstructured":"Zhang, H., Merino, L.H., Qu, Z., Bastankhah, M., Estrada-Gali\u00f1anes, V., Ford, B.: F3B: a low-overhead blockchain architecture with per-transaction front-running protection. In: Bonneau, J., Weinberg, S.M. (eds.) 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), vol.\u00a0282, pp. 3:1\u20133:23. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl (2023). https:\/\/doi.org\/10.4230\/LIPIcs.AFT.2023.3, https:\/\/drops.dagstuhl.de\/opus\/volltexte\/2023\/19192","DOI":"10.4230\/LIPIcs.AFT.2023.3"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69231-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T09:04:25Z","timestamp":1732871065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69231-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9783031692307","9783031692314"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69231-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}