{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T19:52:41Z","timestamp":1773690761940,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833732","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"179-197","source":"Crossref","is-referenced-by-count":67,"title":["ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Steffen","sequence":"first","affiliation":[{"name":"ETH Zurich,Switzerland"}]},{"given":"Benjamin","family":"Bichsel","sequence":"additional","affiliation":[{"name":"ETH Zurich,Switzerland"}]},{"given":"Roger","family":"Baumgartner","sequence":"additional","affiliation":[{"name":"ETH Zurich,Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich,Switzerland"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2637113.2637119"},{"key":"ref12","article-title":"On the size of pairing-based non-interactive arguments","author":"groth","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"ref15","article-title":"Zcash Protocol Specification","author":"hopwood","year":"2021","journal-title":"Electric Coin Company"},{"key":"ref58","article-title":"Aby2.0: Improved mixed-protocol secure two-party computation","author":"patra","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1255329.1255333"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339818"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_28"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"ref10","article-title":"zkay v0.2: Practical Data Privacy for Smart Contracts","author":"baumann","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792230010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243786"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2969418"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"ref45","article-title":"Ring signature confidential transactions for monero","author":"noether","year":"2015","journal-title":"Cryptology ePrint Archive"},{"key":"ref48","article-title":"BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs","author":"guan","year":"2020","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref42","article-title":"Many-out-of-many proofs and applications to anonymous zether","author":"diamond","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS52497.2021.9569822"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00068"},{"key":"ref43","author":"kerber","year":"2020","journal-title":"Kachina - Foundations of Private Smart Contracts"},{"key":"ref49","article-title":"ZETH: On Integrating Zerocash on Ethereum","author":"rondelet","year":"2019","journal-title":"arXiv 1904 00905"},{"key":"ref8","article-title":"smartFHE: Privacy-preserving smart contracts from fully homomorphic encryption","author":"solomon","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363222"},{"key":"ref4","first-page":"1353","article-title":"Arbitrum: Scalable, private smart contracts","author":"kalodner","year":"2018","journal-title":"27thUSENIX Security Symposium (USENIX Security 18)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref6","author":"b\u00fcnz","year":"2019","journal-title":"Zether TowardsPrivacy in a Smart Contract World"},{"key":"ref5","article-title":"Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution","volume":"abs 1804 5141","author":"cheng","year":"2018","journal-title":"CoRR"},{"key":"ref40","article-title":"The Eth2 vision","year":"2021"},{"key":"ref35","article-title":"libsnark: a C++ library for zkSNARK proofs","year":"2021"},{"key":"ref34","article-title":"jsnark: A Java library for zk-SNARK circuits","author":"kosba","year":"2021"},{"key":"ref37","article-title":"Uniswap decentralized trading protocol","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"ref31","article-title":"Transparent snarks from dark compilers","author":"b\u00fcnz","year":"2019","journal-title":"Cryptology ePrint Archive"},{"key":"ref30","article-title":"Marlin: Preprocessing zksnarks with universal and updatable srs","author":"chiesa","year":"2019","journal-title":"Cryptology ePrint Archive"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1007\/978-3-030-34578-5_23","article-title":"Quisquis: A New Design for Anonymous Cryptocurrencies","author":"fauzi","year":"2019","journal-title":"Advances in Cryptology - ASIACRYPT 2019"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1090\/pspum\/020\/0316385","article-title":"Class number, a theory of factorization, and genera","volume":"20","author":"shanks","year":"1971","journal-title":"Proc Symp Pure Math"},{"key":"ref2","article-title":"The limits of blockchain democracy: A transatlantic perspective on blockchain voting systems","author":"hermstr\u00fcwer","year":"2020","journal-title":"TTLF Working Papers"},{"key":"ref1","article-title":"Blockchain: Opportunities for health care","author":"krawiec","year":"2016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451755"},{"key":"ref38","article-title":"The ridiculously high cost of Gas on Ethereum","author":"rozen","year":"2021","journal-title":"CoinGeek Editorial"},{"key":"ref24","article-title":"Baby jubjub elliptic curve","author":"whitehat","year":"2019"},{"key":"ref23","article-title":"EIP-197: Precompiled contracts for optimal ate pairing check on the elliptic curve alt_bn128","author":"buterin","year":"2017"},{"key":"ref26","article-title":"Bulletproofs: Short proofs for confidential transactions and more","author":"b\u00fcnz","year":"2017","journal-title":"Cryptology ePrint Archive"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"key":"ref22","article-title":"Pairing-friendly elliptic curves of prime order","author":"barreto","year":"2005","journal-title":"Cryptology ePrint Archive"},{"key":"ref21","article-title":"Known Attacks - Ethereum Smart Contract Best Practices","year":"2021"},{"key":"ref28","article-title":"Libra: Succinct zero-knowledge proofs with optimal prover computation","author":"xie","year":"2019","journal-title":"Cryptology ePrint Archive"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339817"},{"key":"ref29","article-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge","author":"gabizon","year":"2019","journal-title":"Cryptology ePrint Archive"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054019"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833732.pdf?arnumber=9833732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:16:46Z","timestamp":1699485406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833732","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}