{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:04:34Z","timestamp":1772240674571,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1145\/3419614.3423266","type":"proceedings-article","created":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T02:10:27Z","timestamp":1603764627000},"page":"241-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Encrypted Blockchain Databases"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Adkins","sequence":"first","affiliation":[{"name":"Brown University"}]},{"given":"Archita","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Seny","family":"Kamara","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Tarik","family":"Moataz","sequence":"additional","affiliation":[{"name":"Aroki Systems"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. The Monero Project. (2014). https:\/\/web.getmonero.org\/.  2014. The Monero Project. (2014). https:\/\/web.getmonero.org\/."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.wanchain.org\/","year":"2018","unstructured":"2018. Wanchain. ( 2018 ). https:\/\/www.wanchain.org\/ . 2018. Wanchain. (2018). https:\/\/www.wanchain.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Algorand's algosdk package. (2020). https:\/\/github.com\/algorand\/py-algorand-sdk.  2020. Algorand's algosdk package. (2020). https:\/\/github.com\/algorand\/py-algorand-sdk."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/bluzelle.com\/","year":"2020","unstructured":"2020. Bluzelle. ( 2020 ). https:\/\/bluzelle.com\/ 2020. Bluzelle. (2020). https:\/\/bluzelle.com\/"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/covenantsql.io\/","author":"SQL.","year":"2020","unstructured":"2020. Covenant SQL. ( 2020 ). https:\/\/covenantsql.io\/ . 2020. CovenantSQL. (2020). https:\/\/covenantsql.io\/."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/infura.io\/","year":"2020","unstructured":"2020. Infura. ( 2020 ). https:\/\/infura.io\/ . 2020. Infura. (2020). https:\/\/infura.io\/."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/metamask.io\/","year":"2020","unstructured":"2020. Metamask. ( 2020 ). https:\/\/metamask.io\/ . 2020. Metamask. (2020). https:\/\/metamask.io\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. OurSQL. (2020). http:\/\/oursql.org\/.  2020. OurSQL. (2020). http:\/\/oursql.org\/."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/www.provendb.com\/litepaper\/","author":"DB.","year":"2020","unstructured":"2020. Proven DB. ( 2020 ). https:\/\/www.provendb.com\/litepaper\/ . 2020. ProvenDB. (2020). https:\/\/www.provendb.com\/litepaper\/."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/www.purestake.com\/","year":"2020","unstructured":"2020. Purestake. ( 2020 ). https:\/\/www.purestake.com\/ . 2020. Purestake. (2020). https:\/\/www.purestake.com\/."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/web3py.readthedocs.io\/en\/stable\/web3.eth.html","year":"2020","unstructured":"2020. Web3 Documentation. ( 2020 ). https:\/\/web3py.readthedocs.io\/en\/stable\/web3.eth.html 2020. Web3 Documentation. (2020). https:\/\/web3py.readthedocs.io\/en\/stable\/web3.eth.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0014"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194118"},{"key":"e_1_3_2_1_16_1","first-page":"2","volume-title":"Ipfs-content addressed, versioned","author":"Benet Juan","year":"2014","unstructured":"Juan Benet . 2014. Ipfs-content addressed, versioned , p 2 p file system. arXiv preprint arXiv:1407.3561 ( 2014 ). Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014)."},{"key":"e_1_3_2_1_17_1","first-page":"464","article-title":"Can a Blockchain Keep a Secret","volume":"2020","author":"Benhamouda Fabrice","year":"2020","unstructured":"Fabrice Benhamouda , Craig Gentry , Sergey Gorbunov , Shai Halevi , Hugo Krawczyk , Chengyu Lin , Tal Rabin , and Leonid Reyzin . 2020 . Can a Blockchain Keep a Secret ? IACR Cryptol. ePrint Arch. 2020 (2020), 464 . https:\/\/eprint.iacr.org\/2020\/464 Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, and Leonid Reyzin. 2020. Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020 (2020), 464. https:\/\/eprint.iacr.org\/2020\/464","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196478.3196480"},{"key":"e_1_3_2_1_19_1","volume-title":"Sophos - Forward Secure Searchable Encryption. In ACM Conference on Computer and Communications Security (CCS '16)","author":"Bost R.","year":"2001","unstructured":"R. Bost . 2001 6 . Sophos - Forward Secure Searchable Encryption. In ACM Conference on Computer and Communications Security (CCS '16) . R. Bost. 20016. Sophos - Forward Secure Searchable Encryption. In ACM Conference on Computer and Communications Security (CCS '16)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.36"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996810"},{"key":"e_1_3_2_1_23_1","volume-title":"Structured Encryption and Controlled Disclosure. In Advances in Cryptology - ASIACRYPT '10 (Lecture Notes in Computer Science)","volume":"6477","author":"Chase M.","unstructured":"M. Chase and S. Kamara . 2010 . Structured Encryption and Controlled Disclosure. In Advances in Cryptology - ASIACRYPT '10 (Lecture Notes in Computer Science) , Vol. 6477 . Springer, 577--594. M. Chase and S. Kamara. 2010. Structured Encryption and Controlled Disclosure. In Advances in Cryptology - ASIACRYPT '10 (Lecture Notes in Computer Science), Vol. 6477. Springer, 577--594."},{"key":"e_1_3_2_1_24_1","volume-title":"Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In ACM Conference on Computer and Communications Security (CCS '06)","author":"Curtmola R.","unstructured":"R. Curtmola , J. Garay , S. Kamara , and R. Ostrovsky . 2006 . Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In ACM Conference on Computer and Communications Security (CCS '06) . ACM, 79--88. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. 2006. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In ACM Conference on Computer and Communications Security (CCS '06). ACM, 79--88."},{"key":"e_1_3_2_1_25_1","volume-title":"Archita Agarwal and Tarik Moataz","author":"Daniel Adkins Seny Kamara","year":"2020","unstructured":"Seny Kamara Daniel Adkins , Archita Agarwal and Tarik Moataz . 2020 . Encrypted Blockchain Databases. Cryptology ePrint Archive, Report 2020\/827. (2020). https:\/\/eprint.iacr.org\/2020\/827.pdf. Seny Kamara Daniel Adkins, Archita Agarwal and Tarik Moataz. 2020. Encrypted Blockchain Databases. Cryptology ePrint Archive, Report 2020\/827. (2020). https:\/\/eprint.iacr.org\/2020\/827.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3320237"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1515\/popets-2018-0002","article-title":"Efficient Dynamic Searchable Encryption with Forward Privacy","volume":"2018","author":"Etemad Mohammad","year":"2018","unstructured":"Mohammad Etemad , Alptekin K\u00fcpcc\u00fc , Charalampos Papamanthou , and David Evans . 2018 . Efficient Dynamic Searchable Encryption with Forward Privacy . PoPETs 2018 , 1 (2018), 5 -- 20 . https:\/\/doi.org\/10.1515\/popets-2018-0002 10.1515\/popets-2018-0002 Mohammad Etemad, Alptekin K\u00fcpcc\u00fc, Charalampos Papamanthou, and David Evans. 2018. Efficient Dynamic Searchable Encryption with Forward Privacy. PoPETs 2018, 1 (2018), 5--20. https:\/\/doi.org\/10.1515\/popets-2018-0002","journal-title":"PoPETs"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00063-9_5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"S. Kamara and T. Moataz. 2018. SQL on Structurally-Encrypted Data. In Asiacrypt.  S. Kamara and T. Moataz. 2018. SQL on Structurally-Encrypted Data. In Asiacrypt.","DOI":"10.1007\/978-3-030-03326-2_6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_32_1","volume-title":"Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11","author":"Kwon Jae","year":"2014","unstructured":"Jae Kwon . 2014 . Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11 (2014). Jae Kwon. 2014. Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11 (2014)."},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/filecoin.io\/","author":"Labs Protocol","year":"2020","unstructured":"Protocol Labs . 2020. Filecoin. ( 2020 ). https:\/\/filecoin.io\/ . Protocol Labs. 2020. Filecoin. (2020). https:\/\/filecoin.io\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Kadena: The first scalable, high performance private blockchain. Kadena, Okinawa, Japan, Tech. Rep","author":"Martino Will","year":"2016","unstructured":"Will Martino . 2016 . Kadena: The first scalable, high performance private blockchain. Kadena, Okinawa, Japan, Tech. Rep (2016). Will Martino. 2016. Kadena: The first scalable, high performance private blockchain. Kadena, Okinawa, Japan, Tech. Rep (2016)."},{"key":"e_1_3_2_1_35_1","first-page":"2019","article-title":"Borromean ring signatures. Accessed","volume":"8","author":"Maxwell Gregory","year":"2015","unstructured":"Gregory Maxwell and Andrew Poelstra . 2015 . Borromean ring signatures. Accessed : Jun 8 (2015), 2019 . Gregory Maxwell and Andrew Poelstra. 2015. Borromean ring signatures. Accessed: Jun 8 (2015), 2019.","journal-title":"Jun"},{"key":"e_1_3_2_1_36_1","volume-title":"Troy McConaghy, Greg McMullen, Ryan Henderson, Sylvain Bellemare, and Alberto Granzotto.","author":"McConaghy Trent","year":"2016","unstructured":"Trent McConaghy , Rodolphe Marques , Andreas M\u00fcller , Dimitri De Jonghe , Troy McConaghy, Greg McMullen, Ryan Henderson, Sylvain Bellemare, and Alberto Granzotto. 2016 . Bigchaindb: a scalable blockchain database. white paper, BigChainDB ( 2016). Trent McConaghy, Rodolphe Marques, Andreas M\u00fcller, Dimitri De Jonghe, Troy McConaghy, Greg McMullen, Ryan Henderson, Sylvain Bellemare, and Alberto Granzotto. 2016. Bigchaindb: a scalable blockchain database. white paper, BigChainDB (2016)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_38_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342632"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342632"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"e_1_3_2_1_42_1","volume-title":"Anas Abou Elkalam, and Abdellah Ait Ouahman","author":"Ouaddah Aafaf","year":"2017","unstructured":"Aafaf Ouaddah , Anas Abou Elkalam, and Abdellah Ait Ouahman . 2017 . Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer , 523--533. Aafaf Ouaddah, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer, 523--533."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946983"},{"key":"e_1_3_2_1_44_1","volume-title":"VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept. arXiv preprint arXiv:2005.08804","author":"Hanssen Rensaa Jens-Andreas","year":"2020","unstructured":"Jens-Andreas Hanssen Rensaa , Danilo Gligoroski , Katina Kralevska , Anton Hasselgren , and Arild Faxvaag . 2020. VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept. arXiv preprint arXiv:2005.08804 ( 2020 ). Jens-Andreas Hanssen Rensaa, Danilo Gligoroski, Katina Kralevska, Anton Hasselgren, and Arild Faxvaag. 2020. VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept. arXiv preprint arXiv:2005.08804 (2020)."},{"key":"e_1_3_2_1_45_1","volume-title":"HBasechainDB-A Scalable Blockchain Framework on Hadoop Ecosystem. In Asian Conference on Supercomputing Frontiers. Springer, 18--29","author":"Sahoo Manuj Subhankar","year":"2018","unstructured":"Manuj Subhankar Sahoo and Pallav Kumar Baruah . 2018 . HBasechainDB-A Scalable Blockchain Framework on Hadoop Ecosystem. In Asian Conference on Supercomputing Frontiers. Springer, 18--29 . Manuj Subhankar Sahoo and Pallav Kumar Baruah. 2018. HBasechainDB-A Scalable Blockchain Framework on Hadoop Ecosystem. In Asian Conference on Supercomputing Frontiers. Springer, 18--29."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_47_1","volume-title":"Practical Dynamic Searchable Encryption with Small Leakage. In Network and Distributed System Security Symposium (NDSS '14)","author":"Stefanov E.","unstructured":"E. Stefanov , C. Papamanthou , and E. Shi . 2014 . Practical Dynamic Searchable Encryption with Small Leakage. In Network and Distributed System Security Symposium (NDSS '14) . E. Stefanov, C. Papamanthou, and E. Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In Network and Distributed System Security Symposium (NDSS '14)."},{"key":"e_1_3_2_1_48_1","unstructured":"Andrew Tam. 2018. Secret With Enigma: A Walkthrough. (2018). https:\/\/blog.enigma.co\/secret-voting-smart-contracts-with-enigma-a-walkthrough-5bb976164753.  Andrew Tam. 2018. Secret With Enigma: A Walkthrough. (2018). https:\/\/blog.enigma.co\/secret-voting-smart-contracts-with-enigma-a-walkthrough-5bb976164753."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Sarah Underwood. 2016. Blockchain beyond bitcoin. (2016).  Sarah Underwood. 2016. Blockchain beyond bitcoin. (2016).","DOI":"10.1145\/2994581"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844400"}],"event":{"name":"AFT '20: 2nd ACM Conference on Advances in Financial Technologies","location":"New York NY USA","acronym":"AFT '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2nd ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419614.3423266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419614.3423266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:43Z","timestamp":1750197703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419614.3423266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":51,"alternative-id":["10.1145\/3419614.3423266","10.1145\/3419614"],"URL":"https:\/\/doi.org\/10.1145\/3419614.3423266","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}