{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:57:57Z","timestamp":1755035877617,"version":"3.37.3"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2055599"],"award-info":[{"award-number":["2055599"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/csf54842.2022.9919678","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:29:20Z","timestamp":1667525360000},"page":"211-226","source":"Crossref","is-referenced-by-count":4,"title":["Collusion-Preserving Computation without a Mediator"],"prefix":"10.1109","author":[{"given":"Michele","family":"Ciampi","sequence":"first","affiliation":[{"name":"University of Edinburgh"}]},{"given":"Yun","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Edinburgh"}]},{"given":"Vassilis","family":"Zikas","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"263","reference":[{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.28"},{"key":"ref13","first-page":"477","article-title":"Universally composable synchronous computation","volume":"7785","author":"katz","year":"2013","journal-title":"TCC 2013 10th Theory of Cryptography Conference ser Lecture Notes in Computer Science"},{"key":"ref34","first-page":"477","article-title":"Secure multiparty computation from SGX","volume":"10322","author":"bahmani","year":"2017","journal-title":"FC 2017 21st International Conference on Financial Cryptography and Data Security ser Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.75"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660374"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_24"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_19"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134106"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0212045"},{"journal-title":"The Cryptographic Strength of Tamper-Proof Hardware","year":"2015","author":"nilges","key":"ref32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"ref1","article-title":"Collusion-preserving computation without a mediator","author":"ciampi","year":"2020","journal-title":"Cryptology EPrint Archive Report 2010\/499"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_28"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1993806.1993832"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","article-title":"How to use bitcoin to design fair protocols","volume":"8617","author":"bentov","year":"2014","journal-title":"Advances in Cryptology - CRYPTO 2014 Part II ser Lecture Notes in Computer Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813712"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_3"},{"key":"ref42","article-title":"Intel SGX explained","author":"costan","year":"2016","journal-title":"Cryptology ePrint Archive Report 2016\/086"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978424"},{"journal-title":"On protocol security in the cryptographic model","year":"2003","author":"nielsen","key":"ref41"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/978-3-662-49896-5_25","article-title":"Fair and robust multi-party computation using a global transaction ledger","volume":"9666","author":"kiayias","year":"2016","journal-title":"Advances in Cryptology - EUROCRYPT 2016 Part II ser Lecture Notes in Computer Science"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_30"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_37"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_9"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/978-3-540-85174-5_28","article-title":"Collusion-free protocols in the mediated model","volume":"5157","author":"alwen","year":"2008","journal-title":"Advances in Cryptology-CRYPTO 2008 Ser Lecture Notes in Computer Science"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/s001459910006","article-title":"Universally composable security: A new paradigm for cryptographic protocols","author":"canetti","year":"2000","journal-title":"Cryptology ePrint Archive Report 2000\/067"},{"key":"ref4","first-page":"543","article-title":"Collusion-free protocols","author":"lepinski","year":"0","journal-title":"37th Annual ACM Symposium on Theory of Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011769"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1007\/978-3-642-03356-8_31","article-title":"Collusion-free multiparty computation in the mediated model","volume":"5677","author":"alwen","year":"2009","journal-title":"Advances in Cryptology - CRYPTO 2009 ser Lecture Notes in Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_16"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"}],"event":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2022,8,7]]},"location":"Haifa, Israel","end":{"date-parts":[[2022,8,10]]}},"container-title":["2022 IEEE 35th Computer Security Foundations Symposium (CSF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9919409\/9919636\/09919678.pdf?arnumber=9919678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:25:43Z","timestamp":1699485943000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9919678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/csf54842.2022.9919678","relation":{},"subject":[],"published":{"date-parts":[[2022,8]]}}}