{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:04Z","timestamp":1773512584027,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003150","name":"Fonds Qu\u00e9b\u00e9cois de la Recherche sur la Nature et les Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003150","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813674","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"720-731","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Provisions"],"prefix":"10.1145","author":[{"given":"Gaby G.","family":"Dagher","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]},{"given":"Benedikt","family":"B\u00fcnz","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Joseph","family":"Bonneau","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384044"},{"key":"e_1_3_2_1_2_1","volume-title":"CRC","author":"Belenkiy M.","year":"2011","unstructured":"M. Belenkiy . E-Cash. In Handbook of Financial Cryptography and Security . CRC , 2011 . M. Belenkiy. E-Cash. In Handbook of Financial Cryptography and Security. CRC, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_1_4_1","volume-title":"Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy","author":"Bonneau J.","year":"2015","unstructured":"J. Bonneau , A. Miller , J. Clark , A. Narayanan , J. A. Kroll , and E. W. Felten . Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy , 2015 . J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy, 2015."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_18"},{"key":"e_1_3_2_1_6_1","volume-title":"Version 1.0.","author":"Research Certicom","year":"2000","unstructured":"Certicom Research . SEC 2: Recommended Elliptic Curve Domain Parameters , Version 1.0. , 2000 . Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0., 2000."},{"key":"e_1_3_2_1_7_1","volume-title":"CRYPTO","author":"Chaum D.","year":"1982","unstructured":"D. Chaum . Blind signatures for untraceable payments . In CRYPTO , 1982 . D. Chaum. Blind signatures for untraceable payments. In CRYPTO, 1982."},{"key":"e_1_3_2_1_8_1","volume-title":"EVT","author":"Chaum D.","year":"2008","unstructured":"D. Chaum , R. Carback , J. Clark , A. Essex , S. Popoveniuc , R. L. Rivest , P. Y. A. Ryan , E. Shen , and A. T. Sherman . Scantegrity II: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes . In EVT , 2008 . D. Chaum, R. Carback, J. Clark, A. Essex, S. Popoveniuc, R. L. Rivest, P. Y. A. Ryan, E. Shen, and A. T. Sherman. Scantegrity II: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes. In EVT, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"CRYPTO","author":"Chaum D.","year":"1992","unstructured":"D. Chaum and T. P. Pedersen . Wallet databases with observers . In CRYPTO , 1992 . D. Chaum and T. P. Pedersen. Wallet databases with observers. In CRYPTO, 1992."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646759.705842"},{"key":"e_1_3_2_1_11_1","volume-title":"IACR Cryptology ePrint Archive","author":"Dagher G.","year":"2015","unstructured":"G. Dagher , B. B\u00fcnz , J. Bonneau , J. Clark , and D. Boneh . Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges (full version). Technical report , IACR Cryptology ePrint Archive , 2015 . G. Dagher, B. B\u00fcnz, J. Bonneau, J. Clark, and D. Boneh. Provisions: Privacy-preserving proofs of solvency for bitcoin exchanges (full version). Technical report, IACR Cryptology ePrint Archive, 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100272"},{"key":"e_1_3_2_1_14_1","volume-title":"Technical maturity, reliability, implicit taxes, and wealth creation. login: The magazine of Usenix & Sage, 26(8)","author":"Geer D.","year":"2001","unstructured":"D. Geer . Technical maturity, reliability, implicit taxes, and wealth creation. login: The magazine of Usenix & Sage, 26(8) , 2001 . D. Geer. Technical maturity, reliability, implicit taxes, and wealth creation. login: The magazine of Usenix & Sage, 26(8), 2001."},{"key":"e_1_3_2_1_15_1","volume-title":"Princeton","author":"Goldfeder S.","year":"2014","unstructured":"S. Goldfeder . Better wallet security for bitcoin. Technical report , Princeton , March 2014 . S. Goldfeder. Better wallet security for bitcoin. Technical report, Princeton, March 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14303-8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866366"},{"key":"e_1_3_2_1_18_1","volume-title":"Dell SecureWorks Counter Threat Unit","author":"Litke P.","year":"2014","unstructured":"P. Litke and J. Stewart . Cryptocurrency-stealing malware landscape. Technical report , Dell SecureWorks Counter Threat Unit , 2014 . P. Litke and J. Stewart. Cryptocurrency-stealing malware landscape. Technical report, Dell SecureWorks Counter Threat Unit, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/648115.746428"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_21_1","unstructured":"R. C. Merkle. Secrecy Authentication and Public Key Systems. PhD thesis Stanford 1979.   R. C. Merkle. Secrecy Authentication and Public Key Systems. PhD thesis Stanford 1979."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_3"},{"key":"e_1_3_2_1_23_1","volume-title":"Unpublished","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin : A peer-to-peer electionic cash system . Unpublished , 2008 . S. Nakamoto. Bitcoin: A peer-to-peer electionic cash system. Unpublished, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_25_1","volume-title":"CRC","author":"Parhonyi R.","year":"2011","unstructured":"R. Parhonyi . Micropayment Systems . In Handbook of Financial Cryptography and Security . CRC , 2011 . R. Parhonyi. Micropayment Systems. In Handbook of Financial Cryptography and Security. CRC, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/646756.705507"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.32"},{"key":"e_1_3_2_1_29_1","volume-title":"Feb.","author":"Wilcox Z.","year":"2014","unstructured":"Z. Wilcox . Proving your bitcoin reserves. https:\/\/iwilcox.me.uk\/2014\/proving-bitcoin-reserves , Feb. 2014 . Z. Wilcox. Proving your bitcoin reserves. https:\/\/iwilcox.me.uk\/2014\/proving-bitcoin-reserves, Feb. 2014."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813674","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813674"}},"subtitle":["Privacy-preserving Proofs of Solvency for Bitcoin Exchanges"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":29,"alternative-id":["10.1145\/2810103.2813674","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813674","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}