{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T03:20:32Z","timestamp":1765423232997,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417888","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T16:20:42Z","timestamp":1614874842000},"page":"641-656","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["WI is Almost Enough: Contingent Payment All Over Again"],"prefix":"10.1145","author":[{"given":"Ky","family":"Nguyen","sequence":"first","affiliation":[{"name":"\u00c9cole Normale Superieure, CNRS &amp; PSL University, Paris, France"}]},{"given":"Miguel","family":"Ambrona","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Tokyo, Japan"}]},{"given":"Masayuki","family":"Abe","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_8"},{"key":"e_1_3_2_2_2_1","volume-title":"On the Malleability of Bitcoin Transactions. In FC 2015 Workshops (LNCS","volume":"18","author":"Andrychowicz Marcin","year":"2015","unstructured":"Marcin Andrychowicz , Stefan Dziembowski , Daniel Malinowski , and Lukasz Mazurek . 2015 . On the Malleability of Bitcoin Transactions. In FC 2015 Workshops (LNCS , Vol. 8976), Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer, Heidelberg, 1-- 18 . https:\/\/doi.org\/10.1007\/978--3--662--48051--9_1 10.1007\/978--3--662--48051--9_1 Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. 2015. On the Malleability of Bitcoin Transactions. In FC 2015 Workshops (LNCS, Vol. 8976), Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer, Heidelberg, 1--18. https:\/\/doi.org\/10.1007\/978--3--662--48051--9_1"},{"key":"e_1_3_2_2_3_1","unstructured":"D. F. Aranha etal [n.d.]. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic.  D. F. Aranha et al. [n.d.]. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9236-6"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_14"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_26"},{"key":"e_1_3_2_2_8_1","volume-title":"Viet Tung Hoang, and Phillip Rogaway","author":"Bellare Mihir","year":"2012","unstructured":"Mihir Bellare , Viet Tung Hoang, and Phillip Rogaway . 2012 . Foundations of garbled circuits. In ACM CCS 2012, Ting Yu, George Danezis, and Virgil D. Gligor (Eds.). ACM Press , 784--796. https:\/\/doi.org\/10.1145\/2382196.2382279 10.1145\/2382196.2382279 Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. 2012. Foundations of garbled circuits. In ACM CCS 2012, Ting Yu, George Danezis, and Virgil D. Gligor (Eds.). ACM Press, 784--796. https:\/\/doi.org\/10.1145\/2382196.2382279"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"volume-title":"ACM CCS 93, Dorothy E","author":"Bellare Mihir","key":"e_1_3_2_2_10_1","unstructured":"Mihir Bellare and Phillip Rogaway . 1993. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols . In ACM CCS 93, Dorothy E . Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM Press , 62--73. https:\/\/doi.org\/10.1145\/168588.168596 10.1145\/168588.168596 Mihir Bellare and Phillip Rogaway. 1993. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In ACM CCS 93, Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM Press, 62--73. https:\/\/doi.org\/10.1145\/168588.168596"},{"key":"e_1_3_2_2_11_1","volume-title":"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 287--304","author":"Ben-Sasson Eli","year":"2015","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Matthew Green , Eran Tromer , and Madars Virza . 2015 . Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 287--304 . https:\/\/doi.org\/10.1109\/SP.2015.25 10.1109\/SP.2015.25 Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, and Madars Virza. 2015. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 287--304. https:\/\/doi.org\/10.1109\/SP.2015.25"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_16"},{"volume-title":"20th","author":"Blum Manuel","key":"e_1_3_2_2_13_1","unstructured":"Manuel Blum , Paul Feldman , and Silvio Micali . 1988. Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) . In 20th ACM STOC. ACM Press , 103--112. https:\/\/doi.org\/10.1145\/62212.62222 10.1145\/62212.62222 Manuel Blum, Paul Feldman, and Silvio Micali. 1988. Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract). In 20th ACM STOC. ACM Press, 103--112. https:\/\/doi.org\/10.1145\/62212.62222"},{"key":"e_1_3_2_2_14_1","unstructured":"Sean Bowe. 2016. Pay-to-sudoku. https:\/\/github.com\/zcash-hackworks\/pay-to-sudoku.  Sean Bowe. 2016. Pay-to-sudoku. https:\/\/github.com\/zcash-hackworks\/pay-to-sudoku."},{"key":"e_1_3_2_2_15_1","volume-title":"FC 2018 Workshops (LNCS","volume":"77","author":"Bowe Sean","unstructured":"Sean Bowe , Ariel Gabizon , and Matthew D. Green . 2019. A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK . In FC 2018 Workshops (LNCS , Vol. 10958), Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, and Massimiliano Sala (Eds.). Springer, Heidelberg, 64-- 77 . https:\/\/doi.org\/10.1007\/978--3--662--58820--8_5 10.1007\/978--3--662--58820--8_5 Sean Bowe, Ariel Gabizon, and Matthew D. Green. 2019. A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK. In FC 2018 Workshops (LNCS, Vol. 10958), Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, and Massimiliano Sala (Eds.). Springer, Heidelberg, 64--77. https:\/\/doi.org\/10.1007\/978--3--662--58820--8_5"},{"key":"e_1_3_2_2_16_1","volume-title":"White Paper","volume":"3","author":"Buterin Vitalik","year":"2013","unstructured":"Vitalik Buterin . 2013 . A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper . White Paper , Vol. 3 (2013). Issue 37. Vitalik Buterin. 2013. A next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. White Paper, Vol. 3 (2013). Issue 37."},{"key":"e_1_3_2_2_17_1","unstructured":"Jan Camenisch and Markus Stadler. 1997. Proof Systems for General Statements about Discrete Logarithms.  Jan Camenisch and Markus Stadler. 1997. Proof Systems for General Statements about Discrete Logarithms."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_18"},{"key":"e_1_3_2_2_20_1","volume-title":"The Simplest Protocol for Oblivious Transfer. In LATINCRYPT 2015 (LNCS","volume":"58","author":"Chou Tung","year":"2015","unstructured":"Tung Chou and Claudio Orlandi . 2015 . The Simplest Protocol for Oblivious Transfer. In LATINCRYPT 2015 (LNCS , Vol. 9230), Kristin E. Lauter and Francisco Rodr'iguez-Henr'iquez (Eds.). Springer, Heidelberg, 40-- 58 . https:\/\/doi.org\/10.1007\/978--3--319--22174--8_3 10.1007\/978--3--319--22174--8_3 Tung Chou and Claudio Orlandi. 2015. The Simplest Protocol for Oblivious Transfer. In LATINCRYPT 2015 (LNCS, Vol. 9230), Kristin E. Lauter and Francisco Rodr'iguez-Henr'iquez (Eds.). Springer, Heidelberg, 40--58. https:\/\/doi.org\/10.1007\/978--3--319--22174--8_3"},{"volume-title":"18th","author":"Cleve Richard","key":"e_1_3_2_2_21_1","unstructured":"Richard Cleve . 1986. Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract) . In 18th ACM STOC. ACM Press , 364--369. https:\/\/doi.org\/10.1145\/12130.12168 10.1145\/12130.12168 Richard Cleve. 1986. Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract). In 18th ACM STOC. ACM Press, 364--369. https:\/\/doi.org\/10.1145\/12130.12168"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_28"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_8"},{"volume-title":"22nd","author":"Feige Uriel","key":"e_1_3_2_2_25_1","unstructured":"Uriel Feige and Adi Shamir . 1990. Witness Indistinguishable and Witness Hiding Protocols . In 22nd ACM STOC. ACM Press , 416--426. https:\/\/doi.org\/10.1145\/100216.100272 10.1145\/100216.100272 Uriel Feige and Adi Shamir. 1990. Witness Indistinguishable and Witness Hiding Protocols. In 22nd ACM STOC. ACM Press, 416--426. https:\/\/doi.org\/10.1145\/100216.100272"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76578-5_11"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354234"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"volume-title":"17th","author":"Goldwasser Shafi","key":"e_1_3_2_2_31_1","unstructured":"Shafi Goldwasser , Silvio Micali , and Charles Rackoff . 1985. The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract) . In 17th ACM STOC. ACM Press , 291--304. https:\/\/doi.org\/10.1145\/22145.22178 10.1145\/22145.22178 Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1985. The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract). In 17th ACM STOC. ACM Press, 291--304. https:\/\/doi.org\/10.1145\/22145.22178"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_9"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516662"},{"key":"e_1_3_2_2_36_1","unstructured":"Gregory Maxwell. 2011. Zero Knowledge Contingent Payment. https:\/\/en.bitcoin.it\/wiki\/Zero_Knowledge_Contingent_Payment.  Gregory Maxwell. 2011. Zero Knowledge Contingent Payment. https:\/\/en.bitcoin.it\/wiki\/Zero_Knowledge_Contingent_Payment."},{"key":"e_1_3_2_2_37_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . 2009 . Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009). Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009)."},{"key":"e_1_3_2_2_38_1","volume-title":"Pinocchio: Nearly Practical Verifiable Computation. In 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 238--252","author":"Parno Bryan","year":"2013","unstructured":"Bryan Parno , Jon Howell , Craig Gentry , and Mariana Raykova . 2013 . Pinocchio: Nearly Practical Verifiable Computation. In 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 238--252 . https:\/\/doi.org\/10.1109\/SP.2013.47 10.1109\/SP.2013.47 Bryan Parno, Jon Howell, Craig Gentry, and Mariana Raykova. 2013. Pinocchio: Nearly Practical Verifiable Computation. In 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 238--252. https:\/\/doi.org\/10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548"},{"key":"e_1_3_2_2_43_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit.  Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit."},{"key":"e_1_3_2_2_44_1","unstructured":"The Bitcoin Wiki. 2019. Hashlock. https:\/\/en.bitcoin.it\/wiki\/Hashlock.  The Bitcoin Wiki. 2019. Hashlock. https:\/\/en.bitcoin.it\/wiki\/Hashlock."},{"key":"e_1_3_2_2_45_1","volume-title":"Ethereum: A secure decentralized generalized transaction ledger. https:\/\/gavwood.com\/paper.pdf.","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralized generalized transaction ledger. https:\/\/gavwood.com\/paper.pdf. Gavin Wood. 2014. Ethereum: A secure decentralized generalized transaction ledger. https:\/\/gavwood.com\/paper.pdf."},{"key":"e_1_3_2_2_46_1","volume-title":"EUROCRYPT","volume":"250","author":"Zahur Samee","year":"2015","unstructured":"Samee Zahur , Mike Rosulek , and David Evans . 2015 . Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates . In EUROCRYPT 2015, Part II (LNCS , Vol. 9057), Elisabeth Oswald and Marc Fischlin (Eds.). Springer, Heidelberg, 220-- 250 . https:\/\/doi.org\/10.1007\/978--3--662--46803--6_8 10.1007\/978--3--662--46803--6_8 Samee Zahur, Mike Rosulek, and David Evans. 2015. Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates. In EUROCRYPT 2015, Part II (LNCS, Vol. 9057), Elisabeth Oswald and Marc Fischlin (Eds.). Springer, Heidelberg, 220--250. https:\/\/doi.org\/10.1007\/978--3--662--46803--6_8"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":43,"alternative-id":["10.1145\/3372297.3417888","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417888","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}