{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:56Z","timestamp":1750220816177,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T00:00:00Z","timestamp":1562457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1800088"],"award-info":[{"award-number":["1800088"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,7]]},"DOI":"10.1145\/3343147.3343171","type":"proceedings-article","created":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T19:51:28Z","timestamp":1565985088000},"page":"52-59","source":"Crossref","is-referenced-by-count":0,"title":["Private and Secure Mixing in Credit Networks"],"prefix":"10.1145","author":[{"given":"Lalitha Muthu","family":"Subramanian","sequence":"first","affiliation":[{"name":"Department of Computer Science, New Mexico State University, USA"}]},{"given":"Guruprasad","family":"Eswaraiah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New Mexico State University, USA"}]},{"given":"Roopa","family":"Vishwanathan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New Mexico State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abe M. Ohkubo M. and Suzuki K. 1-out-of-n signatures from a variety of keys. IEICE Transactions 87-A 1 (2004) 131--140.  Abe M. Ohkubo M. and Suzuki K. 1-out-of-n signatures from a variety of keys. IEICE Transactions 87-A 1 (2004) 131--140."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_1_3_1","unstructured":"Coinbase. https:\/\/www.coinbase.com\/.  Coinbase. https:\/\/www.coinbase.com\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Bonneau J. Narayanan A. Miller A. Clark J. Kroll J. A. and Felten E. W. Mixcoin: Anonymity for bitcoin with accountable mixes. IACR Cryptology ePrint Archive 2014 (2014) 77.  Bonneau J. Narayanan A. Miller A. Clark J. Kroll J. A. and Felten E. W. Mixcoin: Anonymity for bitcoin with accountable mixes. IACR Cryptology ePrint Archive 2014 (2014) 77.","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"e_1_3_2_1_5_1","first-page":"991","volume-title":"USENIX Security Symposium","author":"Bulck J. V.","year":"2018"},{"key":"e_1_3_2_1_6_1","unstructured":"Canetti R. Universally composable security: A new paradigm for cryptographic protocols. IACR Cryptology ePrint Archive 2000 (2000) 67.  Canetti R. Universally composable security: A new paradigm for cryptographic protocols. IACR Cryptology ePrint Archive 2000 (2000) 67."},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Ed. Apress","author":"Dannen C.","year":"2017"},{"key":"e_1_3_2_1_8_1","unstructured":"Dziembowski S. Eckey L. Faust S. and Malinowski D. Perun: Virtual payment channels over cryptographic currencies. Tech. rep. IACR Cryptology ePrint Archive 2017: 635 2017.  Dziembowski S. Eckey L. Faust S. and Malinowski D. Perun: Virtual payment channels over cryptographic currencies. Tech. rep. IACR Cryptology ePrint Archive 2017: 635 2017."},{"key":"e_1_3_2_1_9_1","unstructured":"Feigenbaum J. Overview of interactive proof systems and zero-knowledge. Contemporary Cryptology: The Science of Information Integrity (1992) 423--439.  Feigenbaum J. Overview of interactive proof systems and zero-knowledge. Contemporary Cryptology: The Science of Information Integrity (1992) 423--439."},{"key":"e_1_3_2_1_10_1","unstructured":"Gu K. and Wu N. Constant size traceable ring signature scheme without random oracles. IACR Cryptology ePrint Archive 2018 (2018) 288.  Gu K. and Wu N. Constant size traceable ring signature scheme without random oracles. IACR Cryptology ePrint Archive 2018 (2018) 288."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Heilman E. Baldimtsi F. Alshenibr L. Scafuro A. and Goldberg S. Tumblebit: An untrusted tumbler for bitcoin-compatible anonymous payments. IACR Cryptology ePrint Archive 2016 (2016) 575.  Heilman E. Baldimtsi F. Alshenibr L. Scafuro A. and Goldberg S. Tumblebit: An untrusted tumbler for bitcoin-compatible anonymous payments. IACR Cryptology ePrint Archive 2016 (2016) 575.","DOI":"10.14722\/ndss.2017.23086"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Lind J. Eyal I. Kelbert F. Naor O. Pietzuch P. and Sirer E. G. Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv:1707.05454 (2017).  Lind J. Eyal I. Kelbert F. Naor O. Pietzuch P. and Sirer E. G. Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv:1707.05454 (2017).","DOI":"10.1145\/3211890.3211904"},{"key":"e_1_3_2_1_15_1","unstructured":"Malavolta G. Moreno-Sanchez P. Kate A. and Maffei M. Silentwhispers: Enforcing security and privacy in decentralized credit networks. IACR Cryptology ePrint Archive 2016 (2016) 1054.  Malavolta G. Moreno-Sanchez P. Kate A. and Maffei M. Silentwhispers: Enforcing security and privacy in decentralized credit networks. IACR Cryptology ePrint Archive 2016 (2016) 1054."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134096"},{"volume-title":"Post on Bitcoin forum","year":"2013","author":"Maxwell G.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Maxwell G. Coinswap: Transaction graph disjoint trustless trading. CoinSwap: Transactiongraphdisjointtrustlesstrading (October 2013) (2013).  Maxwell G. Coinswap: Transaction graph disjoint trustless trading. CoinSwap: Transactiongraphdisjointtrustlesstrading (October 2013) (2013)."},{"key":"e_1_3_2_1_19_1","unstructured":"Maxwell G. and Poelstra A. Borromean ring signatures 2015.  Maxwell G. and Poelstra A. Borromean ring signatures 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0031"},{"key":"e_1_3_2_1_21_1","unstructured":"Panwar G. Misra S. and Vishwanathan R. Blanc: Blockchain-based anonymous and decentralized credit networks. IACR Cryptology ePrint Archive 2019 (2019) 14. 10.1145\/3292006.3300034   Panwar G. Misra S. and Vishwanathan R. Blanc: Blockchain-based anonymous and decentralized credit networks. IACR Cryptology ePrint Archive 2019 (2019) 14. 10.1145\/3292006.3300034"},{"key":"e_1_3_2_1_22_1","unstructured":"Poon J. and Dryja T. The bitcoin lightning network: Scalable off-chain instant payments. See https:\/\/lightning. network\/lightning-network-paper. pdf (2016).  Poon J. and Dryja T. The bitcoin lightning network: Scalable off-chain instant payments. See https:\/\/lightning. network\/lightning-network-paper. pdf (2016)."},{"key":"e_1_3_2_1_23_1","unstructured":"Ripple website. www.ripple.com 2015.  Ripple website. www.ripple.com 2015."},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"ASIACRYPT","author":"Rivest R. L.","year":"2001"},{"key":"e_1_3_2_1_25_1","unstructured":"Roos S. Moreno-Sanchez P. Kate A. and Goldberg I. Settling payments fast and private: Efficient decentralized routing for path-based transactions. CoRR (2017).  Roos S. Moreno-Sanchez P. Kate A. and Goldberg I. Settling payments fast and private: Efficient decentralized routing for path-based transactions. CoRR (2017)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23415"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_29_1","unstructured":"Stellar website. https:\/\/www.stellar.org\/.  Stellar website. https:\/\/www.stellar.org\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Tang C. Pei D. Liu Z. and He Y. Non-interactive and information-theoretic secure publicly verifiable secret sharing. IACR Cryptology ePrint Archive 2004 (2004) 201.  Tang C. Pei D. Liu Z. and He Y. Non-interactive and information-theoretic secure publicly verifiable secret sharing. IACR Cryptology ePrint Archive 2004 (2004) 201."}],"event":{"name":"IECC ' 19: 2019 International Electronics Communication Conference","acronym":"IECC ' 19","location":"Okinawa Japan"},"container-title":["Proceedings of the 2019 International Electronics Communication Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3343147.3343171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3343147.3343171","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3343147.3343171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:05Z","timestamp":1750201985000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3343147.3343171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,7]]},"references-count":29,"alternative-id":["10.1145\/3343147.3343171","10.1145\/3343147"],"URL":"https:\/\/doi.org\/10.1145\/3343147.3343171","relation":{},"subject":[],"published":{"date-parts":[[2019,7,7]]}}}