{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:54:28Z","timestamp":1773482068010,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-05849,RGPAS-507908,DGDND-00085"],"award-info":[{"award-number":["RGPIN-05849,RGPAS-507908,DGDND-00085"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384752","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"558-571","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["BOREALIS: Building Block for Sealed Bid Auctions on Blockchains"],"prefix":"10.1145","author":[{"given":"Erik-Oliver","family":"Blass","sequence":"first","affiliation":[{"name":"Airbus, Munich, Germany"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"40","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)","author":"Aggarwal G.","year":"2004"},{"key":"e_1_3_2_1_2_1","first-page":"246","volume-title":"International Conference on Database Theory","author":"Aggarwal G.","year":"2005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/800061.808726"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_1_6_1","volume-title":"The world's largest blockchain auction house for NFTs","year":"2019"},{"key":"e_1_3_2_1_7_1","volume-title":"Efficient implementation of the Non-Interactive Zero-Knowledge proofs invented by Groth and Sahai","author":"Bazin R.","year":"2016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1964.tb04103.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_15"},{"key":"e_1_3_2_1_13_1","unstructured":"Bitinfocharts. Bitcoin (BTC) price stats and information 2019. https:\/\/bitinfocharts.com\/bitcoin\/.  Bitinfocharts. Bitcoin (BTC) price stats and information 2019. https:\/\/bitinfocharts.com\/bitcoin\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_16_1","volume-title":"Social network analysis and mining for business applications. ACM Transactions on Intelligent Systems and Technology (TIST), 2(3):22","author":"Bonchi F.","year":"2011"},{"key":"e_1_3_2_1_17_1","volume-title":"Source code","author":"BOREALIS.","year":"2019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_16"},{"key":"e_1_3_2_1_19_1","first-page":"49","volume-title":"Auctions","author":"Brandt F.","year":"2010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319726"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626497000292"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134092"},{"key":"e_1_3_2_1_24_1","first-page":"416","volume-title":"12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2--4, 2007","author":"Damg\u00e5rd I.","year":"2007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2009.028031"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_15"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150535"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.02.004"},{"key":"e_1_3_2_1_30_1","volume-title":"Ethereum Average Block Time Chart","year":"2019"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_33"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_22"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_36_1","first-page":"415","volume-title":"27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul,Turkey, April 13--17, 2008. Proceedings","author":"Groth J.","year":"2008"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978421"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_16"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_21"},{"key":"e_1_3_2_1_45_1","first-page":"87","volume-title":"International Conference on Financial Cryptography","author":"Lipmaa H.","year":"2002"},{"key":"e_1_3_2_1_46_1","unstructured":"MIRACL. Cryptographic SDK 2018. https:\/\/github.com\/miracl\/MIRACL.  MIRACL. Cryptographic SDK 2018. https:\/\/github.com\/miracl\/MIRACL."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_23"},{"key":"e_1_3_2_1_49_1","volume-title":"Ukrainian ministry carries out first blockchain transactions","year":"2017"},{"key":"e_1_3_2_1_50_1","first-page":"148","volume-title":"Electronic. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15--19,1999","author":"Schoenmakers B.","year":"1999"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_17"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.112"},{"key":"e_1_3_2_1_53_1","first-page":"112","volume-title":"BFT Replication. In Open Problems in Network Security","author":"Vukolic M.","year":"2015"},{"key":"e_1_3_2_1_54_1","volume-title":"Enigma: Decentralized computation platform with guaranteed privacy.arXiv preprint arXiv:1506.03471","author":"Zyskind G.","year":"2015"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":53,"alternative-id":["10.1145\/3320269.3384752","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384752","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}