{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:49:03Z","timestamp":1776782943500,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T00:00:00Z","timestamp":1590883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,11]]},"DOI":"10.1145\/3318464.3386127","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T17:12:33Z","timestamp":1590772353000},"page":"2227-2240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Confidentiality Support over Financial Grade Consortium Blockchain"],"prefix":"10.1145","author":[{"given":"Ying","family":"Yan","sequence":"first","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Changzheng","family":"Wei","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Xuepeng","family":"Guo","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Xuming","family":"Lu","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Xiaofu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Chenhui","family":"Zhou","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Xuyang","family":"Song","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Boran","family":"Zhao","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]},{"given":"Guofei","family":"Jiang","sequence":"additional","affiliation":[{"name":"Ant Financial Services Group, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,5,31]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In OSDI'16","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan OtextquoterightKeeffe , Mark L. Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. In OSDI'16 . Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan OtextquoterightKeeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In OSDI'16."},{"key":"e_1_3_2_2_2_1","volume-title":"FAST'19","author":"Bailleu Maurice","year":"2019","unstructured":"Maurice Bailleu , J\u00f6rg Thalheim , Pramod Bhatotia , Christof Fetzer , Michio Honda , and Kapil Vaswani . 2019 . SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution . In FAST'19 . Maurice Bailleu, J\u00f6rg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution. In FAST'19."},{"key":"e_1_3_2_2_3_1","volume-title":"Zexe: Enabling Decentralized Private Computation. IACR Cryptology ePrint Archive","author":"Bowe Sean","year":"2018","unstructured":"Sean Bowe , Alessandro Chiesa , Matthew Green , Ian Miers , Pratyush Mishra , and Howard Wu . 2018 . Zexe: Enabling Decentralized Private Computation. IACR Cryptology ePrint Archive (2018). Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu. 2018. Zexe: Enabling Decentralized Private Computation. IACR Cryptology ePrint Archive (2018)."},{"key":"e_1_3_2_2_4_1","volume-title":"Private data objects: an overview. arXiv preprint arXiv:1807.05686","author":"Bowman Mic","year":"2018","unstructured":"Mic Bowman , Andrea Miele , Michael Steiner , and Bruno Vavala . 2018. Private data objects: an overview. arXiv preprint arXiv:1807.05686 ( 2018 ). Mic Bowman, Andrea Miele, Michael Steiner, and Bruno Vavala. 2018. Private data objects: an overview. arXiv preprint arXiv:1807.05686 (2018)."},{"key":"e_1_3_2_2_5_1","volume-title":"R\u00fc diger Kapitza, and Alessandro Sorniotti","author":"Brandenburger Marcus","year":"2018","unstructured":"Marcus Brandenburger , Christian Cachin , R\u00fc diger Kapitza, and Alessandro Sorniotti . 2018 a. Blockchain and Trusted Computing: Problems, Pitfalls , and a Solution for Hyperledger Fabric. CoRR ( 2018). Marcus Brandenburger, Christian Cachin, R\u00fc diger Kapitza, and Alessandro Sorniotti. 2018a. Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric. CoRR (2018)."},{"key":"e_1_3_2_2_6_1","volume-title":"Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric. arXiv preprint arXiv:1805.08541","author":"Brandenburger Marcus","year":"2018","unstructured":"Marcus Brandenburger , Christian Cachin , R\u00fcdiger Kapitza , and Alessandro Sorniotti . 2018b. Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric. arXiv preprint arXiv:1805.08541 ( 2018 ). Marcus Brandenburger, Christian Cachin, R\u00fcdiger Kapitza, and Alessandro Sorniotti. 2018b. Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric. arXiv preprint arXiv:1805.08541 (2018)."},{"key":"e_1_3_2_2_7_1","volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS P).","author":"Cheng R.","unstructured":"R. Cheng , F. Zhang , J. Kos , W. He , N. Hynes , N. Johnson , A. Juels , A. Miller , and D. Song . 2019. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts . In 2019 IEEE European Symposium on Security and Privacy (EuroS P). R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. 2019. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS P)."},{"key":"e_1_3_2_2_8_1","unstructured":"Intel Corp. 2015. AES-GCM Encryption Performance on Intel\u00ae Xeon\u00ae E5 v3 Processors. https:\/\/software.intel.com\/en-us\/articles\/aes-gcm-encryption-performance-on-intel-xeon-e5-v3-processors  Intel Corp. 2015. AES-GCM Encryption Performance on Intel\u00ae Xeon\u00ae E5 v3 Processors. https:\/\/software.intel.com\/en-us\/articles\/aes-gcm-encryption-performance-on-intel-xeon-e5-v3-processors"},{"key":"e_1_3_2_2_9_1","unstructured":"Intel Corp. 2020. Intel software guard extensions (intel sgx). https:\/\/software.intel.com\/en-us\/sgx  Intel Corp. 2020. Intel software guard extensions (intel sgx). https:\/\/software.intel.com\/en-us\/sgx"},{"key":"e_1_3_2_2_10_1","unstructured":"Microsoft Corp. 2018. Confidential Consortium Framework. https:\/\/microsoft.github.io\/CCF\/  Microsoft Corp. 2018. Confidential Consortium Framework. https:\/\/microsoft.github.io\/CCF\/"},{"key":"e_1_3_2_2_11_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. IACR Cryptology ePrint Archive ( 2016 ). Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"e_1_3_2_2_13_1","first-page":"800","volume":"200","unstructured":"Morris J Dworkin. 200 7. Sp 800 -- 838 d. recommendation for block cipher modes of operation: Galois\/counter mode (gcm) and gmac. (2007). Morris J Dworkin. 2007. Sp 800--38d. recommendation for block cipher modes of operation: Galois\/counter mode (gcm) and gmac. (2007).","journal-title":"Morris J Dworkin."},{"key":"e_1_3_2_2_14_1","volume-title":"ZoKrates-Scalable Privacy-Preserving Off-Chain Computations. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Eberhardt Jacob","unstructured":"Jacob Eberhardt and Stefan Tai . 2018. ZoKrates-Scalable Privacy-Preserving Off-Chain Computations. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) . Jacob Eberhardt and Stefan Tai. 2018. ZoKrates-Scalable Privacy-Preserving Off-Chain Computations. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)."},{"key":"e_1_3_2_2_15_1","volume-title":"ObliDB: Oblivious Query Processing using Hardware Enclaves. arXiv preprint arXiv:1710.00458","author":"Eskandarian Saba","year":"2017","unstructured":"Saba Eskandarian and Matei Zaharia . 2017. ObliDB: Oblivious Query Processing using Hardware Enclaves. arXiv preprint arXiv:1710.00458 ( 2017 ). Saba Eskandarian and Matei Zaharia. 2017. ObliDB: Oblivious Query Processing using Hardware Enclaves. arXiv preprint arXiv:1710.00458 (2017)."},{"key":"e_1_3_2_2_16_1","unstructured":"Ethereum. 2019. EVM Yellow Paper. https:\/\/github.com\/ethereum\/yellowpaper  Ethereum. 2019. EVM Yellow Paper. https:\/\/github.com\/ethereum\/yellowpaper"},{"key":"e_1_3_2_2_17_1","unstructured":"Ethereum. 2020. RLP wiki. https:\/\/github.com\/ethereum\/wiki\/wiki\/RLP  Ethereum. 2020. RLP wiki. https:\/\/github.com\/ethereum\/wiki\/wiki\/RLP"},{"key":"e_1_3_2_2_18_1","unstructured":"Ant Financial. 2019 a. AntDuoChain. https:\/\/www.ledgerinsights.com\/alipay-ant-double-chain-blockchain-supply-chain  Ant Financial. 2019 a. AntDuoChain. https:\/\/www.ledgerinsights.com\/alipay-ant-double-chain-blockchain-supply-chain"},{"key":"e_1_3_2_2_19_1","unstructured":"Ant Financial. 2019 b. Smart Contract Cloud IDE of Ant Financial. https:\/\/baas.cloud.alipay.com\/  Ant Financial. 2019 b. Smart Contract Cloud IDE of Ant Financial. https:\/\/baas.cloud.alipay.com\/"},{"key":"e_1_3_2_2_20_1","unstructured":"Google. 2019 a. Flatbuffers. https:\/\/google.github.io\/flatbuffers\/  Google. 2019 a. Flatbuffers. https:\/\/google.github.io\/flatbuffers\/"},{"key":"e_1_3_2_2_21_1","unstructured":"Google. 2019 b. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers  Google. 2019 b. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers"},{"key":"e_1_3_2_2_23_1","unstructured":"Tom Elvis Jedusor. 2016. Mimblewimble.  Tom Elvis Jedusor. 2016. Mimblewimble."},{"key":"e_1_3_2_2_24_1","volume-title":"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy (SP).","author":"Kosba A.","unstructured":"A. Kosba , A. Miller , E. Shi , Z. Wen , and C. Papamanthou . 2016 . Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy (SP). A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"e_1_3_2_2_26_1","volume-title":"Teechan: Payment Channels Using Trusted Execution Environments. CoRR","author":"Lind Joshua","year":"2016","unstructured":"Joshua Lind , Ittay Eyal , Peter R. Pietzuch , and Emin G\u00fc n Sirer . 2016 . Teechan: Payment Channels Using Trusted Execution Environments. CoRR (2016). Joshua Lind, Ittay Eyal, Peter R. Pietzuch, and Emin G\u00fc n Sirer. 2016. Teechan: Payment Channels Using Trusted Execution Environments. CoRR (2016)."},{"key":"e_1_3_2_2_27_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Matetic Sinisa","year":"2019","unstructured":"Sinisa Matetic , Karl W\u00fcst , Moritz Schneider , Kari Kostiainen , Ghassan Karame , and Srdjan Capkun . 2019 . BITE: Bitcoin Lightweight Client Privacy using Trusted Execution . In 28th USENIX Security Symposium (USENIX Security 19) . Sinisa Matetic, Karl W\u00fcst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, and Srdjan Capkun. 2019. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_2_2_28_1","volume-title":"Proof of Luck: an Efficient Blockchain Consensus Protocol. CoRR","author":"Milutinovic Mitar","year":"2017","unstructured":"Mitar Milutinovic , Warren He , Howard Wu , and Maxinder Kanwal . 2017. Proof of Luck: an Efficient Blockchain Consensus Protocol. CoRR ( 2017 ). Mitar Milutinovic, Warren He, Howard Wu, and Maxinder Kanwal. 2017. Proof of Luck: an Efficient Blockchain Consensus Protocol. CoRR (2017)."},{"key":"e_1_3_2_2_29_1","volume-title":"Ring SIgnature Confidential Transactions for Monero. IACR Cryptology ePrint Archive","author":"Noether Shen","year":"2015","unstructured":"Shen Noether . 2015. Ring SIgnature Confidential Transactions for Monero. IACR Cryptology ePrint Archive ( 2015 ). Shen Noether. 2015. Ring SIgnature Confidential Transactions for Monero. IACR Cryptology ePrint Archive (2015)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"M. Sabt M. Achemlal and A. Bouabdallah. 2015. Trusted Execution Environment: What It is and What It is Not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA.  M. Sabt M. Achemlal and A. Bouabdallah. 2015. Trusted Execution Environment: What It is and What It is Not. In 2015 IEEE Trustcom\/BigDataSE\/ISPA.","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_3_2_2_32_1","volume-title":"2014 IEEE Symposium on Security and Privacy.","author":"Sasson E. B.","unstructured":"E. B. Sasson , A. Chiesa , C. Garman , M. Green , I. Miers , E. Tromer , and M. Virza . 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin . In 2014 IEEE Symposium on Security and Privacy. E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In 2014 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_2_34_1","unstructured":"Solidity. 2019. Solidity manual. https:\/\/solidity.readthedocs.io\/  Solidity. 2019. Solidity manual. https:\/\/solidity.readthedocs.io\/"},{"key":"e_1_3_2_2_35_1","unstructured":"WebAssembly. 2019. WebAssembly Official Website. https:\/\/webassembly.org\/  WebAssembly. 2019. WebAssembly Official Website. https:\/\/webassembly.org\/"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274824"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080208"},{"key":"e_1_3_2_2_38_1","unstructured":"WikiPedia. 2019. Apache Thrift. https:\/\/en.wikipedia.org\/wiki\/Apache_Thrift  WikiPedia. 2019. Apache Thrift. https:\/\/en.wikipedia.org\/wiki\/Apache_Thrift"},{"key":"e_1_3_2_2_39_1","unstructured":"Wikipedia. 2019. Decentralized Application. https:\/\/en.wikipedia.org\/wiki\/Decentralized_application  Wikipedia. 2019. Decentralized Application. https:\/\/en.wikipedia.org\/wiki\/Decentralized_application"},{"key":"e_1_3_2_2_40_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez , and Ion Stoica . 2017 . Opaque: An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)."}],"event":{"name":"SIGMOD\/PODS '20: International Conference on Management of Data","location":"Portland OR USA","acronym":"SIGMOD\/PODS '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3386127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318464.3386127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:43Z","timestamp":1750199923000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3386127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,31]]},"references-count":39,"alternative-id":["10.1145\/3318464.3386127","10.1145\/3318464"],"URL":"https:\/\/doi.org\/10.1145\/3318464.3386127","relation":{},"subject":[],"published":{"date-parts":[[2020,5,31]]},"assertion":[{"value":"2020-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}