{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T19:52:45Z","timestamp":1773690765624,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363222","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1759-1776","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["zkay"],"prefix":"10.1145","author":[{"given":"Samuel","family":"Steffen","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Benjamin","family":"Bichsel","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Mario","family":"Gersbach","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Noa","family":"Melchior","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Petar","family":"Tsankov","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"N. Z. Aitzhan and D. Svetinovic. 2018. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures Blockchain and Anonymous Messaging Streams. IEEE Transactions on Dependable and Secure Computing (2018).  N. Z. Aitzhan and D. Svetinovic. 2018. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures Blockchain and Anonymous Messaging Streams. IEEE Transactions on Dependable and Secure Computing (2018).","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"e_1_3_2_2_2_1","volume-title":"Faceted Execution of Policy-agnostic Programs. In PLAS'13","author":"Austin Thomas H.","year":"2013","unstructured":"Thomas H. Austin , Jean Yang , Cormac Flanagan , and Armando Solar-Lezama . 2013 . Faceted Execution of Policy-agnostic Programs. In PLAS'13 . https:\/\/doi.org\/10.1145\/2465106.2465121 10.1145\/2465106.2465121 Thomas H. Austin, Jean Yang, Cormac Flanagan, and Armando Solar-Lezama. 2013. Faceted Execution of Policy-agnostic Programs. In PLAS'13. https:\/\/doi.org\/10.1145\/2465106.2465121"},{"key":"e_1_3_2_2_3_1","volume-title":"Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In CSF '08","author":"Backes Michael","year":"2008","unstructured":"Michael Backes and Dominique Unruh . 2008 . Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In CSF '08 . https:\/\/doi.org\/10.1109\/CSF.2008.20 10.1109\/CSF.2008.20 Michael Backes and Dominique Unruh. 2008. Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In CSF '08. https:\/\/doi.org\/10.1109\/CSF.2008.20"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243801"},{"key":"e_1_3_2_2_5_1","volume-title":"Automated Symbolic Proofs of Observational Equivalence. In CCS '15","author":"Basin David","year":"2015","unstructured":"David Basin , Jannik Dreier , and Ralf Sasse . 2015 . Automated Symbolic Proofs of Observational Equivalence. In CCS '15 . https:\/\/doi.org\/10.1145\/2810103.2813662 10.1145\/2810103.2813662 David Basin, Jannik Dreier, and Ralf Sasse. 2015. Automated Symbolic Proofs of Observational Equivalence. In CCS '15. https:\/\/doi.org\/10.1145\/2810103.2813662"},{"key":"e_1_3_2_2_6_1","unstructured":"Eli Ben-Sasson Iddo Bentov Yinon Horesh and Michael Riabzev. 2018. Scalable transparent and post-quantum secure computational integrity. Cryptology ePrint Archive. (2018). https:\/\/eprint.iacr.org\/2018\/046.  Eli Ben-Sasson Iddo Bentov Yinon Horesh and Michael Riabzev. 2018. Scalable transparent and post-quantum secure computational integrity. Cryptology ePrint Archive. (2018). https:\/\/eprint.iacr.org\/2018\/046."},{"key":"e_1_3_2_2_7_1","volume-title":"SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In CRYPTO '13","author":"Ben-Sasson Eli","year":"2013","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Daniel Genkin , Eran Tromer , and Madars Virza . 2013 . SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In CRYPTO '13 . Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza. 2013. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In CRYPTO '13."},{"key":"e_1_3_2_2_8_1","volume-title":"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. In SP '15","author":"Ben-Sasson Eli","year":"2015","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Matthew Green , Eran Tromer , and Madars Virza . 2015 . Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. In SP '15 . https:\/\/doi.org\/10.1109\/SP.2015.25 10.1109\/SP.2015.25 Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, and Madars Virza. 2015. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. In SP '15. https:\/\/doi.org\/10.1109\/SP.2015.25"},{"key":"e_1_3_2_2_9_1","volume-title":"SEC'14","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 . Succinct Non-interactive Zero Knowledge for a Von Neumann Architecture . In SEC'14 . http:\/\/dl.acm.org\/citation.cfm?id=2671225.2671275 Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct Non-interactive Zero Knowledge for a Von Neumann Architecture. In SEC'14. http:\/\/dl.acm.org\/citation.cfm?id=2671225.2671275"},{"key":"e_1_3_2_2_10_1","volume-title":"Scalable Zero Knowledge Via Cycles of Elliptic Curves. Algorithmica 4 (Dec","author":"Ben-Sasson Eli","year":"2017","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2017. Scalable Zero Knowledge Via Cycles of Elliptic Curves. Algorithmica 4 (Dec . 2017 ). https:\/\/doi.org\/10.1007\/s00453-016-0221-0 10.1007\/s00453-016-0221-0 Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2017. Scalable Zero Knowledge Via Cycles of Elliptic Curves. Algorithmica 4 (Dec. 2017). https:\/\/doi.org\/10.1007\/s00453-016-0221-0"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"e_1_3_2_2_13_1","volume-title":"Domain-Polymorphic Programming of Privacy-Preserving Applications. In PLAS'14","author":"Bogdanov Dan","year":"2014","unstructured":"Dan Bogdanov , Peeter Laud , and Jaak Randmets . 2014 . Domain-Polymorphic Programming of Privacy-Preserving Applications. In PLAS'14 . https:\/\/doi.org\/10.1145\/2637113.2637119 10.1145\/2637113.2637119 Dan Bogdanov, Peeter Laud, and Jaak Randmets. 2014. Domain-Polymorphic Programming of Privacy-Preserving Applications. In PLAS'14. https:\/\/doi.org\/10.1145\/2637113.2637119"},{"key":"e_1_3_2_2_14_1","volume-title":"Zexe: Enabling Decentralized Private Computation. IACR Cryptology ePrint Archive","author":"Bowe Sean","year":"2018","unstructured":"Sean Bowe , Alessandro Chiesa , Matthew Green , Ian Miers , Pratyush Mishra , and Howard Wu . 2018 . Zexe: Enabling Decentralized Private Computation. IACR Cryptology ePrint Archive (2018). Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu. 2018. Zexe: Enabling Decentralized Private Computation. IACR Cryptology ePrint Archive (2018)."},{"key":"e_1_3_2_2_15_1","unstructured":"Vitalik Buterin. 2016. Privacy on the Blockchain. Available from: https:\/\/blog.ethereum.org\/2016\/01\/15\/privacy-on-the-blockchain\/.  Vitalik Buterin. 2016. Privacy on the Blockchain. Available from: https:\/\/blog.ethereum.org\/2016\/01\/15\/privacy-on-the-blockchain\/."},{"key":"e_1_3_2_2_16_1","unstructured":"Vitalik Buterin and Christian Reitwiessner. 2017. EIP 197: Precompiled contracts for optimal ate pairing check on the elliptic curve alt_bn128. http:\/\/eips.ethereum.org\/EIPS\/eip-197 Accessed 2019-04--11.  Vitalik Buterin and Christian Reitwiessner. 2017. EIP 197: Precompiled contracts for optimal ate pairing check on the elliptic curve alt_bn128. http:\/\/eips.ethereum.org\/EIPS\/eip-197 Accessed 2019-04--11."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134010"},{"key":"e_1_3_2_2_18_1","volume-title":"Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR","author":"Cheng Raymond","year":"2018","unstructured":"Raymond Cheng , Fan Zhang , Jernej Kos , Warren He , Nicholas Hynes , Noah M. Johnson , Ari Juels , Andrew Miller , and Dawn Song . 2018 . Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR (2018). Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2018. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR (2018)."},{"key":"e_1_3_2_2_19_1","unstructured":"ConsenSys. 2018. Truffle Suite. https:\/\/truffleframework.com\/.  ConsenSys. 2018. Truffle Suite. https:\/\/truffleframework.com\/."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_2_21_1","volume-title":"ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In NDSS '15","author":"Demmler Daniel","year":"2015","unstructured":"Daniel Demmler , Thomas Schneider , and Michael Zohner . 2015 . ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In NDSS '15 . https:\/\/doi.org\/10.14722\/ndss.2015.23113 10.14722\/ndss.2015.23113 Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In NDSS '15. https:\/\/doi.org\/10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_2_22_1","volume-title":"SFCS '81","author":"Dolev D.","year":"1981","unstructured":"D. Dolev and A. C. Yao . 1981. On the security of public key protocols . In SFCS '81 . https:\/\/doi.org\/10.1109\/SFCS. 1981 .32 10.1109\/SFCS.1981.32 D. Dolev and A. C. Yao. 1981. On the security of public key protocols. In SFCS '81. https:\/\/doi.org\/10.1109\/SFCS.1981.32"},{"key":"e_1_3_2_2_23_1","volume-title":"ZoKrates - Scalable Privacy-Preserving Off-Chain Computations. In IEEE International Conference on Blockchain. http:\/\/www.ise.tu-berlin.de\/fileadmin\/fg308\/publications\/2018\/2018_eberhardt_ZoKrates.pdf","author":"Eberhardt Jacob","year":"2018","unstructured":"Jacob Eberhardt and Stefan Tai . 2018 . ZoKrates - Scalable Privacy-Preserving Off-Chain Computations. In IEEE International Conference on Blockchain. http:\/\/www.ise.tu-berlin.de\/fileadmin\/fg308\/publications\/2018\/2018_eberhardt_ZoKrates.pdf Jacob Eberhardt and Stefan Tai. 2018. ZoKrates - Scalable Privacy-Preserving Off-Chain Computations. In IEEE International Conference on Blockchain. http:\/\/www.ise.tu-berlin.de\/fileadmin\/fg308\/publications\/2018\/2018_eberhardt_ZoKrates.pdf"},{"key":"e_1_3_2_2_24_1","unstructured":"Ethereum Foundation. 2018. Solidity Documentation. https:\/\/solidity.readthedocs.io\/en\/v0.4.24\/. Accessed: 2018-08--23.  Ethereum Foundation. 2018. Solidity Documentation. https:\/\/solidity.readthedocs.io\/en\/v0.4.24\/. Accessed: 2018-08--23."},{"key":"e_1_3_2_2_25_1","unstructured":"Ethereum Foundation. 2019. web3.js Ethereum JavaScript API. https:\/\/github.com\/ethereum\/web3.js. Accessed 2019-05-07.  Ethereum Foundation. 2019. web3.js Ethereum JavaScript API. https:\/\/github.com\/ethereum\/web3.js. Accessed 2019-05-07."},{"key":"e_1_3_2_2_26_1","series-title":"SIAM J. Comput. 1 (Jan","volume-title":"Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions","author":"Feige Uriel","year":"1999","unstructured":"Uriel Feige , Dror Lapidot , and Adi Shamir . 1999. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions . SIAM J. Comput. 1 (Jan . 1999 ). https:\/\/doi.org\/10.1137\/S0097539792230010 10.1137\/S0097539792230010 Uriel Feige, Dror Lapidot, and Adi Shamir. 1999. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions. SIAM J. Comput. 1 (Jan. 1999). https:\/\/doi.org\/10.1137\/S0097539792230010"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_28_1","volume-title":"Bolt: Anonymous Payment Channels for Decentralized Currencies. In CCS '17","author":"Green Matthew","year":"2017","unstructured":"Matthew Green and Ian Miers . 2017 . Bolt: Anonymous Payment Channels for Decentralized Currencies. In CCS '17 . https:\/\/doi.org\/10.1145\/3133956.3134093 10.1145\/3133956.3134093 Matthew Green and Ian Miers. 2017. Bolt: Anonymous Payment Channels for Decentralized Currencies. In CCS '17. https:\/\/doi.org\/10.1145\/3133956.3134093"},{"key":"e_1_3_2_2_30_1","volume-title":"Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. Cryptology ePrint Archive, Report 2017\/540. https:\/\/eprint.iacr.org\/2017\/540.","author":"Groth Jens","year":"2017","unstructured":"Jens Groth and Mary Maller . 2017 . Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. Cryptology ePrint Archive, Report 2017\/540. https:\/\/eprint.iacr.org\/2017\/540. Jens Groth and Mary Maller. 2017. Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. Cryptology ePrint Archive, Report 2017\/540. https:\/\/eprint.iacr.org\/2017\/540."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Ethan Heilman Foteini Baldimtsi and Sharon Goldberg. 2016. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. (2016).  Ethan Heilman Foteini Baldimtsi and Sharon Goldberg. 2016. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. (2016).","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"e_1_3_2_2_32_1","volume-title":"KEVM: A Complete Semantics of the Ethereum Virtual Machine. In CSF'18","author":"Hildenbrandt Everett","year":"2018","unstructured":"Everett Hildenbrandt , Manasvi Saxena , Xiaoran Zhu , Nishant Rodrigues , Philip Daian , Dwight Guth , Brandon Moore , Yi Zhang , Daejun Park , Andrei c Stefuanescu , and Grigore Rocsu . 2018 . KEVM: A Complete Semantics of the Ethereum Virtual Machine. In CSF'18 . IEEE. Everett Hildenbrandt, Manasvi Saxena, Xiaoran Zhu, Nishant Rodrigues, Philip Daian, Dwight Guth, Brandon Moore, Yi Zhang, Daejun Park, Andrei cStefuanescu, and Grigore Rocsu. 2018. KEVM: A Complete Semantics of the Ethereum Virtual Machine. In CSF'18. IEEE."},{"key":"e_1_3_2_2_33_1","unstructured":"Harry Hodges. 2017. Medical data and the rise of blockchain. Available from: https:\/\/www.bookingbug.com\/blog\/5-ways-blockchain-will-change-the-face-of-retail\/. Accessed: 2019-05--11.  Harry Hodges. 2017. Medical data and the rise of blockchain. Available from: https:\/\/www.bookingbug.com\/blog\/5-ways-blockchain-will-change-the-face-of-retail\/. Accessed: 2019-05--11."},{"key":"e_1_3_2_2_34_1","volume-title":"Felten","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S. Matthew Weinberg , and Edward W . Felten . 2018 . Arbitrum : Scalable, private smart contracts. In USENIX Security . Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In USENIX Security."},{"key":"e_1_3_2_2_35_1","volume-title":"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In SP '16","author":"Kosba A.","year":"2016","unstructured":"A. Kosba , A. Miller , E. Shi , Z. Wen , and C. Papamanthou . 2016 . Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In SP '16 . https:\/\/doi.org\/10.1109\/SP. 2016 .55 10.1109\/SP.2016.55 A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In SP '16. https:\/\/doi.org\/10.1109\/SP.2016.55"},{"key":"e_1_3_2_2_36_1","volume-title":"ObliVM: A Programming Framework for Secure Computation. In SP '15","author":"Liu C.","year":"2015","unstructured":"C. Liu , X. S. Wang , K. Nayak , Y. Huang , and E. Shi . 2015 . ObliVM: A Programming Framework for Secure Computation. In SP '15 . https:\/\/doi.org\/10.1109\/SP. 2015 .29 10.1109\/SP.2015.29 C. Liu, X. S. Wang, K. Nayak, Y. Huang, and E. Shi. 2015. ObliVM: A Programming Framework for Secure Computation. In SP '15. https:\/\/doi.org\/10.1109\/SP.2015.29"},{"key":"e_1_3_2_2_37_1","volume-title":"Fairplay-a Secure Two-party Computation System. In SSYM'04","author":"Malkhi Dahlia","year":"2004","unstructured":"Dahlia Malkhi , Noam Nisan , Benny Pinkas , and Yaron Sella . 2004 . Fairplay-a Secure Two-party Computation System. In SSYM'04 . http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251395 Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. 2004. Fairplay-a Secure Two-party Computation System. In SSYM'04. http:\/\/dl.acm.org\/citation.cfm?id=1251375.1251395"},{"key":"e_1_3_2_2_38_1","volume-title":"SP '13","author":"Miers I.","year":"2013","unstructured":"I. Miers , C. Garman , M. Green , and A. D. Rubin . 2013. Zerocoin: Anonymous Distributed E-Cash from Bitcoin . In SP '13 . https:\/\/doi.org\/10.1109\/SP. 2013 .34 10.1109\/SP.2013.34 I. Miers, C. Garman, M. Green, and A. D. Rubin. 2013. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In SP '13. https:\/\/doi.org\/10.1109\/SP.2013.34"},{"key":"e_1_3_2_2_39_1","volume-title":"Myers","author":"Myers Andrew C.","year":"1999","unstructured":"Andrew C. Myers and Andrew C . Myers . 1999 . JFlow: Practical Mostly-static Information Flow Control. In POPL '99. https:\/\/doi.org\/10.1145\/292540.292561 10.1145\/292540.292561 Andrew C. Myers and Andrew C. Myers. 1999. JFlow: Practical Mostly-static Information Flow Control. In POPL '99. https:\/\/doi.org\/10.1145\/292540.292561"},{"key":"e_1_3_2_2_40_1","volume-title":"PLAS'07","author":"Nielsen Janus Dam","unstructured":"Janus Dam Nielsen and Michael I. Schwartzbach . 2007. A domain-specific programming language for secure multiparty computation . In PLAS'07 . https:\/\/doi.org\/10.1145\/1255329.1255333 10.1145\/1255329.1255333 Janus Dam Nielsen and Michael I. Schwartzbach. 2007. A domain-specific programming language for secure multiparty computation. In PLAS'07. https:\/\/doi.org\/10.1145\/1255329.1255333"},{"key":"e_1_3_2_2_41_1","unstructured":"Mike Orcutt. 2017. How Blockchain Could Give Us a Smarter Energy Grid. Accessed: 2019-05-09. Available from: https:\/\/www.technologyreview.com\/s\/609077\/how-blockchain-could-give-us-a-smarter-energy-grid\/.  Mike Orcutt. 2017. How Blockchain Could Give Us a Smarter Energy Grid. Accessed: 2019-05-09. Available from: https:\/\/www.technologyreview.com\/s\/609077\/how-blockchain-could-give-us-a-smarter-energy-grid\/."},{"key":"e_1_3_2_2_42_1","volume-title":"Pinocchio: Nearly Practical Verifiable Computation. In SP '13","author":"Parno B.","year":"2013","unstructured":"B. Parno , J. Howell , C. Gentry , and M. Raykova . 2013 . Pinocchio: Nearly Practical Verifiable Computation. In SP '13 . https:\/\/doi.org\/10.1109\/SP. 2013 .47 10.1109\/SP.2013.47 B. Parno, J. Howell, C. Gentry, and M. Raykova. 2013. Pinocchio: Nearly Practical Verifiable Computation. In SP '13. https:\/\/doi.org\/10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_43_1","volume-title":"Mixed-Mode Multiparty Computations. In SP '14","author":"Rastogi A.","year":"2014","unstructured":"A. Rastogi , M. A. Hammer , and M. Hicks . 2014. Wysteria: A Programming Language for Generic , Mixed-Mode Multiparty Computations. In SP '14 . https:\/\/doi.org\/10.1109\/SP. 2014 .48 10.1109\/SP.2014.48 A. Rastogi, M. A. Hammer, and M. Hicks. 2014. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. In SP '14. https:\/\/doi.org\/10.1109\/SP.2014.48"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_2_45_1","unstructured":"Benedikt Scheungraber. 2018. Eliminate the hassle of flight delay compensation by using smart contracts. Available from: https:\/\/medium.com\/cashlink-crypto\/eliminate-the-hassle-of-flight-delay-compensation-by-using-smart-contracts-a5db3b5c3ed.  Benedikt Scheungraber. 2018. Eliminate the hassle of flight delay compensation by using smart contracts. Available from: https:\/\/medium.com\/cashlink-crypto\/eliminate-the-hassle-of-flight-delay-compensation-by-using-smart-contracts-a5db3b5c3ed."},{"key":"e_1_3_2_2_46_1","unstructured":"Muyao Shen. 2018. Crypto Valley Declares Blockchain Voting Trial a `Success'. Available from: https:\/\/www.coindesk.com\/crypto-valley-declares-blockchain-voting-trial-a-success\/.  Muyao Shen. 2018. Crypto Valley Declares Blockchain Voting Trial a `Success'. Available from: https:\/\/www.coindesk.com\/crypto-valley-declares-blockchain-voting-trial-a-success\/."},{"key":"e_1_3_2_2_47_1","unstructured":"Lydia Torne and Sophie Sheldon. 2018. Medical data and the rise of blockchain. Available from: http:\/\/www.pharmatimes.com\/web_exclusives\/medical_data_and_the_rise_of_blockchain_1243441. Accessed: 2019-05-09.  Lydia Torne and Sophie Sheldon. 2018. Medical data and the rise of blockchain. Available from: http:\/\/www.pharmatimes.com\/web_exclusives\/medical_data_and_the_rise_of_blockchain_1243441. Accessed: 2019-05-09."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_2_49_1","volume-title":"Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In USENIX Security.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In USENIX Security. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In USENIX Security."},{"key":"e_1_3_2_2_50_1","unstructured":"Kevin Wang and Ali Safavi. 2017. Blockchain is empowering the future of insurance. Available from: https:\/\/techcrunch.com\/2016\/10\/29\/blockchain-is-empowering-the-future-of-insurance\/.  Kevin Wang and Ali Safavi. 2017. Blockchain is empowering the future of insurance. Available from: https:\/\/techcrunch.com\/2016\/10\/29\/blockchain-is-empowering-the-future-of-insurance\/."},{"key":"e_1_3_2_2_51_1","volume-title":"Global-Scale Secure Multiparty Computation. In CCS '17","author":"Wang Xiao","year":"2017","unstructured":"Xiao Wang , Samuel Ranellucci , and Jonathan Katz . 2017 . Global-Scale Secure Multiparty Computation. In CCS '17 . https:\/\/doi.org\/10.1145\/3133956.3133979 10.1145\/3133956.3133979 Xiao Wang, Samuel Ranellucci, and Jonathan Katz. 2017. Global-Scale Secure Multiparty Computation. In CCS '17. https:\/\/doi.org\/10.1145\/3133956.3133979"},{"key":"e_1_3_2_2_52_1","volume-title":"Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv:1812.08829 [cs] (Dec","author":"Wang Yuepeng","year":"2018","unstructured":"Yuepeng Wang , Shuvendu K. Lahiri , Shuo Chen , Rong Pan , Isil Dillig , Cody Born , and Immad Naseer . 2018. Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv:1812.08829 [cs] (Dec . 2018 ). http:\/\/arxiv.org\/abs\/1812.08829 Yuepeng Wang, Shuvendu K. Lahiri, Shuo Chen, Rong Pan, Isil Dillig, Cody Born, and Immad Naseer. 2018. Formal Specification and Verification of Smart Contracts for Azure Blockchain. arXiv:1812.08829 [cs] (Dec. 2018). http:\/\/arxiv.org\/abs\/1812.08829"},{"key":"e_1_3_2_2_53_1","unstructured":"Gavin Wood. 2016. Ethereum: a Secure Decentralised Generalised Transaction Ledger.  Gavin Wood. 2016. Ethereum: a Secure Decentralised Generalised Transaction Ledger."},{"key":"e_1_3_2_2_54_1","volume-title":"Dynamic Information Flow for Database-backed Applications. In PLDI '16","author":"Yang Jean","year":"2016","unstructured":"Jean Yang , Travis Hance , Thomas H. Austin , Armando Solar-Lezama , Cormac Flanagan , and Stephen Chong . 2016 . Precise , Dynamic Information Flow for Database-backed Applications. In PLDI '16 . Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, and Stephen Chong. 2016. Precise, Dynamic Information Flow for Database-backed Applications. In PLDI '16."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103669"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:33Z","timestamp":1750203873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363222"}},"subtitle":["Specifying and Enforcing Data Privacy in Smart Contracts"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":54,"alternative-id":["10.1145\/3319535.3363222","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363222","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}