{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T10:03:35Z","timestamp":1777025015450,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Nervos Foundation","award":["61772308"],"award-info":[{"award-number":["61772308"]}]},{"name":"HashKey","award":["61972224"],"award-info":[{"award-number":["61972224"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736209"],"award-info":[{"award-number":["U1736209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"BNRist Network and Software Security Research Program","award":["BNR2019TD01004,BNR2019RC01009"],"award-info":[{"award-number":["BNR2019TD01004,BNR2019RC01009"]}]},{"name":"DARPA","award":["HR001120C0087"],"award-info":[{"award-number":["HR001120C0087"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484558","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"3002-3021","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange"],"prefix":"10.1145","author":[{"given":"Yun","family":"Li","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace of Tsinghua University, Beijing, China"}]},{"given":"Cun","family":"Ye","sequence":"additional","affiliation":[{"name":"K-Orange\/SECBIT Labs, Suzhou, China"}]},{"given":"Yuguang","family":"Hu","sequence":"additional","affiliation":[{"name":"SECBIT Labs, Beijing, China"}]},{"given":"Ivring","family":"Morpheus","sequence":"additional","affiliation":[{"name":"SECBIT Labs, Beijing, China"}]},{"given":"Yu","family":"Guo","sequence":"additional","affiliation":[{"name":"SECBIT Labs, Suzhou, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute for Network Science and Cyberspace of Tsinghua University, Beijing, China"}]},{"given":"Yupeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, Texas, TX, USA"}]},{"given":"Zhipeng","family":"Sun","sequence":"additional","affiliation":[{"name":"SECBIT Labs, Suzhou, China"}]},{"given":"Yiwen","family":"Lu","sequence":"additional","affiliation":[{"name":"SECBIT Labs, Suzhou, China"}]},{"given":"Haodi","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Normal University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_1_3_1","unstructured":"N Asokan. 1998. Fairness in electronic commerce. (1998)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_5_1","first-page":"46","article-title":"Scalable, transparent, and post-quantum secure computational integrity","volume":"2018","author":"Ben-Sasson Eli","year":"2018","unstructured":"Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 46.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"e_1_3_2_1_7_1","volume-title":"23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 781--796.","author":"Ben-Sasson Eli","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 781--796."},{"key":"e_1_3_2_1_8_1","unstructured":"Sean Bowe. 2016a. pay-to-sudoku. http:\/\/diyhpl.us\/ bryan\/papers2\/bitcoin\/zkcp3.pdf ."},{"key":"e_1_3_2_1_9_1","unstructured":"Sean Bowe. 2016b. pay-to-sudoku. https:\/\/github.com\/zcash-hackworks\/pay-to-sudoku ."},{"key":"e_1_3_2_1_10_1","first-page":"1021","article-title":"Halo: Recursive Proof Composition without a Trusted Setup","volume":"2019","author":"Bowe Sean","year":"2019","unstructured":"Sean Bowe, Jack Grigg, and Daira Hopwood. 2019. Halo: Recursive Proof Composition without a Trusted Setup. IACR Cryptol. ePrint Arch., Vol. 2019 (2019), 1021.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339820"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133997"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_18"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_27"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_1_20_1","volume-title":"User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information systems research","author":"D'Arcy John","year":"2009","unstructured":"John D'Arcy, Anat Hovav, and Dennis Galletta. 2009. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information systems research, Vol. 20, 1 (2009), 79--98."},{"key":"e_1_3_2_1_21_1","volume-title":"A fair protocol for data trading based on Bitcoin transactions. Future Generation Computer Systems","author":"Delgado-Segura Sergi","year":"2017","unstructured":"Sergi Delgado-Segura, Cristina P\u00e9rez-Sol\u00e0, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomart'i. 2017. A fair protocol for data trading based on Bitcoin transactions. Future Generation Computer Systems (2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"Designing Large Scale Lans: Help for Network Designers .\" O'Reilly Media","author":"Dooley Kevin","unstructured":"Kevin Dooley. 2001. Designing Large Scale Lans: Help for Network Designers .\" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"e_1_3_2_1_24_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 186--194","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 186--194."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354234"},{"key":"e_1_3_2_1_26_1","volume-title":"PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge.","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon and Zachary J Williamson. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. (2019)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_1_28_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Giacomelli Irene","year":"2016","unstructured":"Irene Giacomelli, Jesper Madsen, and Claudio Orlandi. 2016. Zkboo: Faster zero-knowledge for boolean circuits. In 25th USENIX Security Symposium (USENIX Security 16). 1069--1083."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699436"},{"key":"e_1_3_2_1_30_1","series-title":"SIAM Journal on computing","volume-title":"The knowledge complexity of interactive proof systems","author":"Goldwasser Shafi","year":"1989","unstructured":"Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The knowledge complexity of interactive proof systems. SIAM Journal on computing, Vol. 18, 1 (1989), 186--208."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_12"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_33_1","unstructured":"herumi. 2015. mcl library. https:\/\/github.com\/herumi\/mcl ."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250794"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_32"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052332"},{"key":"e_1_3_2_1_37_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_38_1","unstructured":"Scipr Lab. 2012. libsnark. https:\/\/github.com\/scipr-lab\/libsnark ."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_41_1","first-page":"584","article-title":"vCNN: Verifiable Convolutional Neural Network","volume":"2020","author":"Lee Seunghwa","year":"2020","unstructured":"Seunghwa Lee, Hankyung Ko, Jihye Kim, and Hyunok Oh. 2020. vCNN: Verifiable Convolutional Neural Network. IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 584.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339817"},{"key":"e_1_3_2_1_43_1","unstructured":"Gregory Maxwell. 2011. Zero Knowledge Contingent Payment. https:\/\/en.bitcoin.it\/wiki\/Zero_Knowledge_Contingent_Payment ."},{"key":"e_1_3_2_1_44_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Satoshi Nakamoto","year":"2008","unstructured":"Satoshi Nakamoto et al. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_45_1","unstructured":"Henning Pagnia and Felix C G\"artner. 1999. On the impossibility of fair exchange without a trusted third party. Technical Report. Technical Report TUD-BS-1999-02 Darmstadt University of Technology."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_1_47_1","volume-title":"Annual International Cryptology Conference. Springer, 129--140","author":"Pedersen Torben Pryds","year":"1991","unstructured":"Torben Pryds Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Annual International Cryptology Conference. Springer, 129--140."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1137\/0209022"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"e_1_3_2_1_50_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_51_1","volume-title":"Paypub: Trustless payments for information publishing on bitcoin. Github Project.","author":"Todd Peter","year":"2014","unstructured":"Peter Todd and Amir Taaki. 2014. Paypub: Trustless payments for information publishing on bitcoin. Github Project."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.28"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00060"},{"key":"e_1_3_2_1_54_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, Vol. 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_55_1","volume-title":"Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology -- CRYPTO","author":"Xie Tiacheng","year":"2019","unstructured":"Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. 2019. Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology -- CRYPTO 2019, Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer International Publishing, Cham, 733--764."},{"key":"e_1_3_2_1_56_1","unstructured":"Jiaheng Zhang Weijie Wang Yinuo Zhang and Yupeng Zhang. 2020 a. Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. Technical Report. Cryptology ePrint Archive Report 2020\/1247 2020. https:\/\/eprint. iacr. org ?."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00052"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"e_1_3_2_1_59_1","unstructured":"Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2017b. A Zero-Knowledge Version of vSQL. (2017)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484558","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:28Z","timestamp":1763499268000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":59,"alternative-id":["10.1145\/3460120.3484558","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484558","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}