{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652282,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427249","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"798-812","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ZeroAUDIT"],"prefix":"10.1145","author":[{"given":"Aman","family":"Luthra","sequence":"first","affiliation":[{"name":"Hofstra University"}]},{"given":"James","family":"Cavanaugh","sequence":"additional","affiliation":[{"name":"Hofstra University"}]},{"given":"Hugo Renzzo","family":"Olcese","sequence":"additional","affiliation":[{"name":"Hofstra University"}]},{"given":"Rina M.","family":"Hirsch","sequence":"additional","affiliation":[{"name":"Hofstra University"}]},{"given":"Xiang","family":"Fu","sequence":"additional","affiliation":[{"name":"Hofstra University"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"E. Androulaki G.\u00a0O. Karame M. Roeschlin T. Scherer and S. Capkun. 2013. Evaluating User Privacy in Bitcoin. In Financial Cryptography. 34\u201351.  E. Androulaki G.\u00a0O. Karame M. Roeschlin T. Scherer and S. Capkun. 2013. Evaluating User Privacy in Bitcoin. In Financial Cryptography. 34\u201351.","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"M. Bellare J. Garay and T. Rabin. 1998. Fast Batch Verification for Modular Exponentiation and Digital Signatures. In EUROCRYPT. 236\u2013250.  M. Bellare J. Garay and T. Rabin. 1998. Fast Batch Verification for Modular Exponentiation and Digital Signatures. In EUROCRYPT. 236\u2013250.","DOI":"10.1007\/BFb0054130"},{"key":"e_1_3_2_2_3_1","unstructured":"D. Bernstein. 2002. Pippenger\u2019s Exponentiation Algorithm. Preprint. available athttps:\/\/cr.yp.to\/papers\/pippenger.pdf.  D. Bernstein. 2002. Pippenger\u2019s Exponentiation Algorithm. Preprint. available athttps:\/\/cr.yp.to\/papers\/pippenger.pdf."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"J. Bootle and J. Groth. 2018. Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. In Public Key Cryptography. 561\u2013588.  J. Bootle and J. Groth. 2018. Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. In Public Key Cryptography. 561\u2013588.","DOI":"10.1007\/978-3-319-76581-5_19"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"F. Boudot. 2000. Efficient Proofs that a Committed Number Lies in an Interval. In EUROCRYPT. 431\u2013444.  F. Boudot. 2000. Efficient Proofs that a Committed Number Lies in an Interval. In EUROCRYPT. 431\u2013444.","DOI":"10.1007\/3-540-45539-6_31"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"C. Boyd and C. Pavlovski. 2000. Attacking and Repairing Batch Verification Scheme. In ASIACRYPT. 58\u201371.  C. Boyd and C. Pavlovski. 2000. Attacking and Repairing Batch Verification Scheme. In ASIACRYPT. 58\u201371.","DOI":"10.1007\/3-540-44448-3_5"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"E. Brickell D. Chaum I. Damg\u00e5rd and J. Graaf. 1987. Gradual and Verifiable Release of a Secret. In CRYPTO. 156\u2013166.  E. Brickell D. Chaum I. Damg\u00e5rd and J. Graaf. 1987. Gradual and Verifiable Release of a Secret. In CRYPTO. 156\u2013166.","DOI":"10.1007\/3-540-48184-2_11"},{"key":"e_1_3_2_2_8_1","volume-title":"Zether: Towards Privacy in a Smart Contract World. In ICAR Crytology ePrint.","author":"B\u00fcnz B.","year":"2019","unstructured":"B. B\u00fcnz , S. Agrawal , M. Zamani , and D. Boneh . 2019 . Zether: Towards Privacy in a Smart Contract World. In ICAR Crytology ePrint. B. B\u00fcnz, S. Agrawal, M. Zamani, and D. Boneh. 2019. Zether: Towards Privacy in a Smart Contract World. In ICAR Crytology ePrint."},{"key":"e_1_3_2_2_9_1","volume-title":"Bulletproofs: Short Proofs for Confidential Transactions and More. In SSP. 315\u2013334.","author":"B\u00fcnz B.","year":"2018","unstructured":"B. B\u00fcnz , J. Bootle , D. Boneh , A. Poelstra , P. Wuille , and G. Maxwell . 2018 . Bulletproofs: Short Proofs for Confidential Transactions and More. In SSP. 315\u2013334. B. B\u00fcnz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell. 2018. Bulletproofs: Short Proofs for Confidential Transactions and More. In SSP. 315\u2013334."},{"key":"e_1_3_2_2_10_1","volume-title":"Architecture of the Hyperledger Blockchain Fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers.","author":"Cachin C.","year":"2016","unstructured":"C. Cachin . 2016 . Architecture of the Hyperledger Blockchain Fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers. C. Cachin. 2016. Architecture of the Hyperledger Blockchain Fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers."},{"key":"e_1_3_2_2_11_1","volume-title":"shelat","author":"Camenisch J.","year":"2008","unstructured":"J. Camenisch , R. Chaabouni , and a. shelat . 2008 . Efficient Protocols for Set Membership and Range Proofs. In ASIACRYPT. 234\u2013252. J. Camenisch, R. Chaabouni, and a. shelat. 2008. Efficient Protocols for Set Membership and Range Proofs. In ASIACRYPT. 234\u2013252."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"J. Camenisch S. Hohenberger and A. Lysyanskaya. 2005. Compact E-Cash. In EUROCRYPT. 302\u2013321.  J. Camenisch S. Hohenberger and A. Lysyanskaya. 2005. Compact E-Cash. In EUROCRYPT. 302\u2013321.","DOI":"10.1007\/11426639_18"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"J. Camenisch and A. Lysyanskaya. 2002. Dynamic Acculators and Applications to Efficient Revocation of Anonymous Credentials. In CRYPTO. 61\u201376.  J. Camenisch and A. Lysyanskaya. 2002. Dynamic Acculators and Applications to Efficient Revocation of Anonymous Credentials. In CRYPTO. 61\u201376.","DOI":"10.1007\/3-540-45708-9_5"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"J. Camenisch and M. Michels. 1999. Separability and Efficiency for Generic Group Signature Schemes. In CRYPT. 413\u2013430.  J. Camenisch and M. Michels. 1999. Separability and Efficiency for Generic Group Signature Schemes. In CRYPT. 413\u2013430.","DOI":"10.1007\/3-540-48405-1_27"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"J. Camenisch and M. Stadler. 1997. Efficient Group Signature Schemes for Large Groups. In CRYPTO(LNCS 1296). 410\u2013424.  J. Camenisch and M. Stadler. 1997. Efficient Group Signature Schemes for Large Groups. In CRYPTO(LNCS 1296). 410\u2013424.","DOI":"10.1007\/BFb0052252"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"S. Canard and A. Gouget. 1997. Divisible E-Cash Systems Can Be Truly Anonymous. In EUROCRYPT(LNCS 1296). 482\u2013497.  S. Canard and A. Gouget. 1997. Divisible E-Cash Systems Can Be Truly Anonymous. In EUROCRYPT(LNCS 1296). 482\u2013497.","DOI":"10.1007\/978-3-540-72540-4_28"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"R. Cramer I. Dramgard and B. Schoenmakers. 1994. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In CRYPTO. 174\u2013187.  R. Cramer I. Dramgard and B. Schoenmakers. 1994. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In CRYPTO. 174\u2013187.","DOI":"10.1007\/3-540-48658-5_19"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"G. Crescenzo M. Khodjaeva and D. Kahrobael. 2017. Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation. In CNS. 531\u2013539.  G. Crescenzo M. Khodjaeva and D. Kahrobael. 2017. Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation. In CNS. 531\u2013539.","DOI":"10.1109\/CNS.2017.8228702"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813674"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd and E. Fujisaki. 2002. An Integer Commitment Scheme Based on Groups with Hidden Order. In ASIACRYPT. 125\u2013142.  I. Damg\u00e5rd and E. Fujisaki. 2002. An Integer Commitment Scheme Based on Groups with Hidden Order. In ASIACRYPT. 125\u2013142.","DOI":"10.1007\/3-540-36178-2_8"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"E.\u00a0Ben-Sasson et al.2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In SSP. 459\u2013474.  E.\u00a0Ben-Sasson et al.2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In SSP. 459\u2013474.","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_2_22_1","volume-title":"Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO. 186\u2013194.","author":"Fiat A.","year":"1986","unstructured":"A. Fiat and A. Shamir . 1986 . How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO. 186\u2013194. A. Fiat and A. Shamir. 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO. 186\u2013194."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"E. Fujisaki and T. Okamoto. 1997. Statistical Zero Knowledge Protocol to Prove Modular Polynomial Relations. In CRYPTO. 16\u201330.  E. Fujisaki and T. Okamoto. 1997. Statistical Zero Knowledge Protocol to Prove Modular Polynomial Relations. In CRYPTO. 16\u201330.","DOI":"10.1007\/BFb0052225"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"R. Gennaro C. Gentry B. Parno and M. Raykova. 2013. Quadratic Span Programs and Succint NIZKs without PCPs. In EUROCRYPT. 626\u2013645.  R. Gennaro C. Gentry B. Parno and M. Raykova. 2013. Quadratic Span Programs and Succint NIZKs without PCPs. In EUROCRYPT. 626\u2013645.","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"J. Groth. 2016. On the size of pairing-based non-interactive arguments. In EUROCRYPT. 305\u2013326.  J. Groth. 2016. On the size of pairing-based non-interactive arguments. In EUROCRYPT. 305\u2013326.","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_26_1","unstructured":"T. Koens C. Ramaekers and C. van Wijk. 2017. Efficient Zero-Knlwedge Range Proofs in Ethereum. https:\/\/www.ingwb.com\/media\/2667860\/zero-knowledge-range-proofs.pdf.  T. Koens C. Ramaekers and C. van Wijk. 2017. Efficient Zero-Knlwedge Range Proofs in Ethereum. https:\/\/www.ingwb.com\/media\/2667860\/zero-knowledge-range-proofs.pdf."},{"key":"e_1_3_2_2_27_1","unstructured":"E. Kokoris-Kogias P. Jovanovic N. Gailly I. Khoffi L. Gasser and B. Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In USENIX Security. 279\u2013296.  E. Kokoris-Kogias P. Jovanovic N. Gailly I. Khoffi L. Gasser and B. Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In USENIX Security. 279\u2013296."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"E. Kokoris-Kogias P. Jovanovic L. Gasser N. Gailly E. Syta and B. Ford. 2018. OmniLedger: A Secure Scale-Out Decentralized Ledger via Sharding. In SSP. 583\u2013598.  E. Kokoris-Kogias P. Jovanovic L. Gasser N. Gailly E. Syta and B. Ford. 2018. OmniLedger: A Secure Scale-Out Decentralized Ledger via Sharding. In SSP. 583\u2013598.","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"W. Mao. 1998. Guaranteed Correct Sharing of Integer Factorization with Off-line Share Holders. In Public Key Cryptography. 27\u201342.  W. Mao. 1998. Guaranteed Correct Sharing of Integer Factorization with Off-line Share Holders. In Public Key Cryptography. 27\u201342.","DOI":"10.1007\/BFb0054015"},{"key":"e_1_3_2_2_30_1","volume-title":"available athttps:\/\/people.xiph.org\/~greg\/confidential_values.txt, retrieved","author":"Maxwell G.","year":"2019","unstructured":"G. Maxwell . [n.d.]. Confidential Transactions . available athttps:\/\/people.xiph.org\/~greg\/confidential_values.txt, retrieved 2019 . G. Maxwell. [n.d.]. Confidential Transactions. available athttps:\/\/people.xiph.org\/~greg\/confidential_values.txt, retrieved 2019."},{"key":"e_1_3_2_2_31_1","unstructured":"R. Merkle. [n.d.]. Method of providing digital signatures. US Patent 4309569.  R. Merkle. [n.d.]. Method of providing digital signatures. US Patent 4309569."},{"key":"e_1_3_2_2_32_1","unstructured":"S. Micali. 2003. Zero-Knowledge Sets. In FOCS. 80\u201391.  S. Micali. 2003. Zero-Knowledge Sets. In FOCS. 80\u201391."},{"key":"e_1_3_2_2_33_1","volume-title":"Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In SSP. 397\u2013411.","author":"Miers I.","year":"2013","unstructured":"I. Miers , C. Garman , M. Green , and A.\u00a0 D. Rubin . 2013 . Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In SSP. 397\u2013411. I. Miers, C. Garman, M. Green, and A.\u00a0D. Rubin. 2013. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In SSP. 397\u2013411."},{"key":"e_1_3_2_2_34_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System . http:\/\/nakamotoinstitute.org\/bitcoin\/. S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http:\/\/nakamotoinstitute.org\/bitcoin\/."},{"key":"e_1_3_2_2_35_1","unstructured":"N. Narula W. Vasquez and M. Virza. 2018. zkLedger: Privacy-Preserving Auditing for Distributed Ledgers. In NSDI. 65\u201380.  N. Narula W. Vasquez and M. Virza. 2018. zkLedger: Privacy-Preserving Auditing for Distributed Ledgers. In NSDI. 65\u201380."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"P. Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosit Classes. In EUROCRYPT. 223\u2013238.  P. Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosit Classes. In EUROCRYPT. 223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"T.\u00a0P. Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO. 129\u2013140.  T.\u00a0P. Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO. 129\u2013140.","DOI":"10.1007\/3-540-46766-1_9"},{"volume-title":"An Efficient Range Proof Scheme. In IEEE International Conference on Social Computing\/IEEE International Conference on Privacy, Security, Risk and Trust. 826\u2013833","author":"Peng K.","key":"e_1_3_2_2_38_1","unstructured":"K. Peng and F. Bao . 2010 . An Efficient Range Proof Scheme. In IEEE International Conference on Social Computing\/IEEE International Conference on Privacy, Security, Risk and Trust. 826\u2013833 . K. Peng and F. Bao. 2010. An Efficient Range Proof Scheme. In IEEE International Conference on Social Computing\/IEEE International Conference on Privacy, Security, Risk and Trust. 826\u2013833."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"N. Pippenger. 1976. On the evaluation of powers and related problems (preliminary version). In FOCS. 258\u2013263.  N. Pippenger. 1976. On the evaluation of powers and related problems (preliminary version). In FOCS. 258\u2013263.","DOI":"10.1109\/SFCS.1976.21"},{"volume-title":"Confidential Assets. In 4th Workshop on Bitcoin and Blockchain Research.","author":"Poelstra A.","key":"e_1_3_2_2_40_1","unstructured":"A. Poelstra , A. Back , M. Friedenbach , G. Maxwell , and P. Wuille . 2017 . Confidential Assets. In 4th Workshop on Bitcoin and Blockchain Research. A. Poelstra, A. Back, M. Friedenbach, G. Maxwell, and P. Wuille. 2017. Confidential Assets. In 4th Workshop on Bitcoin and Blockchain Research."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"F. Reid and M. Harrigan. 2011. An Analysis of Anonymity in the Bitcoin System. In SocialCOM. 1318\u20131326.  F. Reid and M. Harrigan. 2011. An Analysis of Anonymity in the Bitcoin System. In SocialCOM. 1318\u20131326.","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"R. Rivest A. Shamir and Y. Tauman. 2001. How to leak a secret. In ASIACRYPT. 552\u2013565.  R. Rivest A. Shamir and Y. Tauman. 2001. How to leak a secret. In ASIACRYPT. 552\u2013565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"T. Sander and A. Ta-Shama. 1999. Auditable Anonymous Electronic Cash. In CRYPTO. 555\u2013572.  T. Sander and A. Ta-Shama. 1999. Auditable Anonymous Electronic Cash. In CRYPTO. 555\u2013572.","DOI":"10.1007\/3-540-48405-1_35"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_2_45_1","unstructured":"SEC. 2019. SEC Enforcement Actions. Available athttps:\/\/www.sec.gov\/spotlight\/enf-actions-ponzi.shtml.  SEC. 2019. SEC Enforcement Actions. Available athttps:\/\/www.sec.gov\/spotlight\/enf-actions-ponzi.shtml."},{"key":"e_1_3_2_2_46_1","unstructured":"U.S. Securities and 2013-141 Exchange Commision Press\u00a0Release. 2013. SEC Adopts Rules to Increase Protections for Investors with Assets being Held by Broker-Dealers.  U.S. Securities and 2013-141 Exchange Commision Press\u00a0Release. 2013. SEC Adopts Rules to Increase Protections for Investors with Assets being Held by Broker-Dealers."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"M. Stadler. 1996. Publicly Verifiable Secret Sharing. In EUROCRYPT(LNCS 1070). 190\u2013199.  M. Stadler. 1996. Publicly Verifiable Secret Sharing. In EUROCRYPT(LNCS 1070). 190\u2013199.","DOI":"10.1007\/3-540-68339-9_17"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"C. Wang Q. Wang K. Ren and W. Lou. 2010. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In INFOCOM. 525\u2013533.  C. Wang Q. Wang K. Ren and W. Lou. 2010. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In INFOCOM. 525\u2013533.","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"e_1_3_2_2_50_1","volume-title":"The Potential Effects of More Frequent Portfolio Disclosure on Mutual Fund Performance","author":"Wermers R.","year":"2001","unstructured":"R. Wermers . 2001. The Potential Effects of More Frequent Portfolio Disclosure on Mutual Fund Performance . Investment Company Institute Perspective 7 ( 2001 ). Issue 3. R. Wermers. 2001. The Potential Effects of More Frequent Portfolio Disclosure on Mutual Fund Performance. Investment Company Institute Perspective 7 (2001). Issue 3."},{"key":"e_1_3_2_2_51_1","volume-title":"Ethereum: A Secure Decentralized Genrealized Transaction Ledger. https:\/\/files.gitter.im\/ethereum\/yellowpaper\/VIyt\/Paper.pdf.","author":"Wood G.","year":"2014","unstructured":"G. Wood . 2014 . Ethereum: A Secure Decentralized Genrealized Transaction Ledger. https:\/\/files.gitter.im\/ethereum\/yellowpaper\/VIyt\/Paper.pdf. G. Wood. 2014. Ethereum: A Secure Decentralized Genrealized Transaction Ledger. https:\/\/files.gitter.im\/ethereum\/yellowpaper\/VIyt\/Paper.pdf."},{"key":"e_1_3_2_2_52_1","volume-title":"DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security. 675\u2013692.","author":"Wu H.","year":"2018","unstructured":"H. Wu , W. Zheng , Z. Chiesa , R.\u00a0 A. Popa , and I. Stoica . 2018 . DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security. 675\u2013692. H. Wu, W. Zheng, Z. Chiesa, R.\u00a0A. Popa, and I. Stoica. 2018. DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security. 675\u2013692."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"T.\u00a0H. Yuen S.-F. Sun J.\u00a0K. Liu M.\u00a0H. Au M.\u00a0F. Esgin Q. Zhang and D. Gu. [n.d.]. RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. available athttps:\/\/eprint.iacr.org\/2019\/508.pdf.  T.\u00a0H. Yuen S.-F. Sun J.\u00a0K. Liu M.\u00a0H. Au M.\u00a0F. Esgin Q. Zhang and D. Gu. [n.d.]. RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. available athttps:\/\/eprint.iacr.org\/2019\/508.pdf.","DOI":"10.1007\/978-3-030-51280-4_25"},{"key":"e_1_3_2_2_54_1","unstructured":"M. Zim. 2016. Bernard Madoff\u2019s Ponzi Scheme: Fraudulent Behavior and the Role of Auditors. Accoutancy Business and the Public Interest(2016).  M. Zim. 2016. Bernard Madoff\u2019s Ponzi Scheme: Fraudulent Behavior and the Role of Auditors. Accoutancy Business and the Public Interest(2016)."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427249","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":54,"alternative-id":["10.1145\/3427228.3427249","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427249","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}