{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:32:18Z","timestamp":1772299938986,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819544332","type":"print"},{"value":"9789819544349","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-4434-9_17","type":"book-chapter","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T23:02:52Z","timestamp":1762988572000},"page":"358-381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Decentralized Fair Exchange with\u00a0Advertising"],"prefix":"10.1007","author":[{"given":"Pierpaolo","family":"Della Monica","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Vitaletti","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Zecchini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141: Fair two-party computations via bitcoin deposits. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105\u2013121. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_8"},{"key":"17_CR2","unstructured":"Baecker, R., Gerhart, P., Katz, J., Schr\u00f6der, D.: Fair exchange for decentralized autonomous organizations via threshold adaptor signatures. Cryptology ePrint Archive, Paper 2025\/388 (2025)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-45741-3_14","volume-title":"Computer Security \u2013 ESORICS 2016","author":"W Banasik","year":"2016","unstructured":"Banasik, W., Dziembowski, S., Malinowski, D.: Efficient zero-knowledge contingent payments in cryptocurrencies without scripts. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 261\u2013280. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_14"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bauer, D.P.: ERC-721 nonfungible tokens. In: Getting Started with Ethereum: A Step-by-Step Guide to Becoming a Blockchain Developer, pp. 55\u201374. Apress, Berkeley (2022)","DOI":"10.1007\/978-1-4842-8045-4_5"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-17653-2_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"E Ben-Sasson","year":"2019","unstructured":"Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.P.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 103\u2013128. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_4"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"17_CR7","unstructured":"Bitcoin, W.: Hash Time Locked Contracts (2024)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Campanelli, M., Gennaro, R., Goldfeder, S., Nizzardo, L.: Zero-knowledge contingent payments revisited: attacks and payments for services. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 229\u2013243. ACM Press (2017)","DOI":"10.1145\/3133956.3134060"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1007\/978-3-030-45721-1_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"A Chiesa","year":"2020","unstructured":"Chiesa, A., Hu, Y., Maller, M., Mishra, P., Vesely, N., Ward, N.: Marlin: preprocessing zkSNARKs with universal and updatable SRS. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 738\u2013768. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_26"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/978-3-030-45721-1_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"A Chiesa","year":"2020","unstructured":"Chiesa, A., Ojha, D., Spooner, N.: Fractal: post-quantum and transparent recursive proofs from holography. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 769\u2013793. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_27"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: 18th ACM STOC, pp. 364\u2013369. ACM Press (1986)","DOI":"10.1145\/12130.12168"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Datta, T., Chen, B., Boneh, D.: VerITAS: verifying image transformations at scale. In: 2025 IEEE Symposium on Security and Privacy (SP), p. 97. IEEE Computer Society, Los Alamitos, CA, USA (2025)","DOI":"10.1109\/SP61157.2025.00097"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Della Monica, P., Visconti, I., Vitaletti, A., Zecchini, M.: Trust nobody: privacy-preserving proofs for edited photos with your laptop. In: 2025 IEEE Symposium on Security and Privacy (SP), p. 14. IEEE Computer Society, Los Alamitos, CA, USA (2025)","DOI":"10.1109\/SP61157.2025.00014"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Della Monica, P., Visconti, I., Vitaletti, A., Zecchini, M.: Public channel-based fair exchange protocols with advertising (2025). https:\/\/arxiv.org\/abs\/2503.10411","DOI":"10.1007\/978-981-95-4434-9_17"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Ebrahimi, S., Hassanizadeh, P.: VIMz: verifiable image manipulation using folding-based zkSNARKs. Cryptology ePrint Archive, Paper 2024\/1063 (2024). Accepted at Privacy Enhancing Technologies Symposium (PETS) 2025","DOI":"10.56553\/popets-2025-0065"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Eckey, L., Faust, S.: FairSwap: how to fairly exchange digital goods. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018, pp. 967\u2013984. ACM Press (2018)","DOI":"10.1145\/3243734.3243857"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Eckey, L., Faust, S., Schlosser, B.: OptiSwap: fast optimistic fair exchange. In: Sun, H.M., Shieh, S.P., Gu, G., Ateniese, G. (eds.) ASIACCS 2020, pp. 543\u2013557. ACM Press (2020)","DOI":"10.1145\/3320269.3384749"},{"key":"17_CR18","unstructured":"Gabizon, A., Williamson, Z.J., Ciobotaru, O.: PLONK: permutations over Lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive, Report 2019\/953 (2019)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Glaeser, N., Maffei, M., Malavolta, G., Moreno-Sanchez, P., Tairi, E., Thyagarajan, S.A.K.: Foundations of coin mixing services. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022, pp. 1259\u20131273. ACM Press (2022)","DOI":"10.1145\/3548606.3560637"},{"key":"17_CR21","unstructured":"Hafezi, H., Partap, A., Das, S., Bonneau, J.: Fair signature exchange. Cryptology ePrint Archive, Paper 2025\/059 (2025)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-030-88418-5_17","volume-title":"Computer Security \u2013 ESORICS 2021","author":"S He","year":"2021","unstructured":"He, S., Lu, Y., Tang, Q., Wang, G., Wu, C.Q.: Fair peer-to-peer content delivery via blockchain. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 348\u2013369. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_17"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Janin, S., Qin, K., Mamageishvili, A., Gervais, A.: Filebounty: fair data exchange. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &P W). IEEE (2020)","DOI":"10.1109\/EuroSPW51379.2020.00056"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-642-36594-2_27","volume-title":"Theory of Cryptography","author":"J Katz","year":"2013","unstructured":"Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Universally composable synchronous computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 477\u2013498. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36594-2_27"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: ZKCPlus: optimized fair-exchange protocol supporting practical and flexible data exchange. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021, pp. 3002\u20133021. ACM Press (2021)","DOI":"10.1145\/3460120.3484558"},{"key":"17_CR26","unstructured":"Liu, X., Zhang, J., Wang, Y., Yang, X., Yang, X.: SmartZKCP: towards practical data exchange marketplace against active attacks. Cryptology ePrint Archive, Paper 2024\/941 (2024). Accepted at International Conference on Blockchain Research and Applications (BCRA) 2024"},{"key":"17_CR27","unstructured":"Maxwell, G.: Zero knowledge contingent payment (2015)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Tairi, E., Moreno-Sanchez, P., Maffei, M.: A$$^2$$L: anonymous atomic locks for scalability in payment channel hubs. In: 2021 IEEE Symposium on Security and Privacy, pp. 1834\u20131851. IEEE Computer Society Press (2021)","DOI":"10.1109\/SP40001.2021.00111"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Tas, E.N., et al.: Atomic and fair data exchange via blockchain. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) ACM CCS 2024, pp. 3227\u20133241. ACM Press (2024)","DOI":"10.1145\/3658644.3690248"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Thyagarajan, S.A.K., Malavolta, G.: Lockable signatures for blockchains: scriptless scripts for all signatures. In: 2021 IEEE Symposium on Security and Privacy, pp. 937\u2013954. IEEE Computer Society Press (2021)","DOI":"10.1109\/SP40001.2021.00065"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Thyagarajan, S.A.K., Malavolta, G., Moreno-Sanchez, P.: Universal atomic swaps: secure exchange of coins across all blockchains. In: 2022 IEEE Symposium on Security and Privacy, pp. 1299\u20131316. IEEE Computer Society Press (2022)","DOI":"10.1109\/SP46214.2022.9833731"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Vanjani, N., Soni, P., Thyagarajan, S.A.K.: Functional adaptor signatures: beyond all-or-nothing blockchain-based payments. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) ACM CCS 2024, pp. 1493\u20131507. ACM Press (2024)","DOI":"10.1145\/3658644.3690240"},{"issue":"4","key":"17_CR33","doi-asserted-by":"publisher","first-page":"154","DOI":"10.46586\/tches.v2019.i4.154-179","volume":"2019","author":"RS Wahby","year":"2019","unstructured":"Wahby, R.S., Boneh, D.: Fast and simple constant-time hashing to the BLS12-381 elliptic curve. IACR TCHES 2019(4), 154\u2013179 (2019)","journal-title":"IACR TCHES"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-4434-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:02:27Z","timestamp":1769853747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-4434-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"ISBN":["9789819544332","9789819544349"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-4434-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]},"assertion":[{"value":"13 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Osaka","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cy2sec.comm.eng.osaka-u.ac.jp\/miyaji-lab\/event\/cans2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}