{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:53:51Z","timestamp":1765486431958,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T00:00:00Z","timestamp":1585526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1756014"],"award-info":[{"award-number":["1756014"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,30]]},"DOI":"10.1145\/3341105.3373901","type":"proceedings-article","created":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:13:52Z","timestamp":1585484032000},"page":"316-323","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["PrivateEx"],"prefix":"10.1145","author":[{"given":"Lei","family":"Xu","sequence":"first","affiliation":[{"name":"University of Texas Rio Grande Valley"}]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]},{"given":"Zhimin","family":"Gao","sequence":"additional","affiliation":[{"name":"Auburn University at Montgomery"}]},{"given":"Keshav","family":"Kasichainula","sequence":"additional","affiliation":[{"name":"University of Houston"}]},{"given":"Miguel","family":"Fernandez","sequence":"additional","affiliation":[{"name":"University of Texas Rio Grande Valley"}]},{"given":"Bogdan","family":"Carbunar","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Houston"}]}],"member":"320","published-online":{"date-parts":[[2020,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_33"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"e_1_3_2_1_5_1","first-page":"1153","article-title":"Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware","volume":"2017","author":"Bentov Iddo","year":"2017","unstructured":"Iddo Bentov , Yan Ji , Fan Zhang , Yunqi Li , Xueyuan Zhao , Lorenz Breidenbach , Philip Daian , and Ari Juels . 2017 . Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware . IACR Cryptology ePrint Archive 2017 (2017), 1153 . Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, and Ari Juels. 2017. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. IACR Cryptology ePrint Archive 2017 (2017), 1153.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_7_1","volume-title":"Dash: A privacy centric cryptocurrency.","author":"Duffield Evan","year":"2015","unstructured":"Evan Duffield and Daniel Diaz . 2015 . Dash: A privacy centric cryptocurrency. (2015). https:\/\/www.dash.org Evan Duffield and Daniel Diaz. 2015. Dash: A privacy centric cryptocurrency. (2015). https:\/\/www.dash.org"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"e_1_3_2_1_9_1","volume-title":"TEX-A Securely Scalable Trustless Exchange. IACR Cryptology ePrint Archive","author":"Khalil Rami","year":"2019","unstructured":"Rami Khalil , Arthur Gervais , and Guillaume Felley . 2019. TEX-A Securely Scalable Trustless Exchange. IACR Cryptology ePrint Archive ( 2019 ). Rami Khalil, Arthur Gervais, and Guillaume Felley. 2019. TEX-A Securely Scalable Trustless Exchange. IACR Cryptology ePrint Archive (2019)."},{"key":"e_1_3_2_1_11_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_12_1","first-page":"1098","article-title":"Ring Signature Confidential Transactions for Monero","volume":"2015","author":"Noether Shen","year":"2015","unstructured":"Shen Noether . 2015 . Ring Signature Confidential Transactions for Monero . IACR Cryptology ePrint Archive 2015 (2015), 1098 . Shen Noether. 2015. Ring Signature Confidential Transactions for Monero. IACR Cryptology ePrint Archive 2015 (2015), 1098.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_17_1","unstructured":"SCIPR-Lab. 2017. libsnark: a C++ library for zkSNARK proofs. https:\/\/github.com\/scipr-lab\/libsnark  SCIPR-Lab. 2017. libsnark: a C++ library for zkSNARK proofs. https:\/\/github.com\/scipr-lab\/libsnark"},{"key":"e_1_3_2_1_18_1","volume-title":"0x: An open protocol for decentralized exchange on the Ethereum blockchain. URl: https:\/\/github.com\/0xProject\/whitepaper","author":"Warren Will","year":"2017","unstructured":"Will Warren and Amir Bandeali . 2017. 0x: An open protocol for decentralized exchange on the Ethereum blockchain. URl: https:\/\/github.com\/0xProject\/whitepaper ( 2017 ). Will Warren and Amir Bandeali. 2017. 0x: An open protocol for decentralized exchange on the Ethereum blockchain. URl: https:\/\/github.com\/0xProject\/whitepaper (2017)."}],"event":{"name":"SAC '20: The 35th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Brno Czech Republic","acronym":"SAC '20"},"container-title":["Proceedings of the 35th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3373901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3373901","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3373901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:11Z","timestamp":1750204451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3373901"}},"subtitle":["privacy preserving exchange of crypto-assets on blockchain"],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":16,"alternative-id":["10.1145\/3341105.3373901","10.1145\/3341105"],"URL":"https:\/\/doi.org\/10.1145\/3341105.3373901","relation":{},"subject":[],"published":{"date-parts":[[2020,3,30]]},"assertion":[{"value":"2020-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}