{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:12:40Z","timestamp":1769940760304,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Alberta Innovates Strategic Chair in Information Security"},{"name":"Natural Sciences and Engineering Research Council of Canada Discovery Grant Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474123.3486756","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T15:41:53Z","timestamp":1636126913000},"page":"39-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-enhanced OptiSwap"],"prefix":"10.1145","author":[{"given":"Sepideh","family":"Avizheh","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Preston","family":"Haffey","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"N Asokan Matthias Schunter and Michael Waidner. 1996. Optimistic protocols for multi-party fair exchange. (1996).  N Asokan Matthias Schunter and Michael Waidner. 1996. Optimistic protocols for multi-party fair exchange. (1996).","DOI":"10.1145\/266420.266426"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674826"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054156"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11408901_5"},{"key":"e_1_3_2_2_6_1","volume-title":"International Workshop on Information Security Applications. Springer, 188--202","author":"Avoine Gildas","year":"2003","unstructured":"Gildas Avoine and Serge Vaudenay . 2003 . Fair exchange with guardian angels . In International Workshop on Information Security Applications. Springer, 188--202 . Gildas Avoine and Serge Vaudenay. 2003. Fair exchange with guardian angels. In International Workshop on Information Security Applications. Springer, 188--202."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_7"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_7"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.50372"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_2_11_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 156--166","author":"Brickell Ernest F","unstructured":"Ernest F Brickell , David Chaum , Ivan B Damg\u00e5rd , and Jeroen van de Graaf. 1987. Gradual and verifiable release of a secret . In Conference on the Theory and Application of Cryptographic Techniques. Springer, 156--166 . Ernest F Brickell, David Chaum, Ivan B Damg\u00e5rd, and Jeroen van de Graaf. 1987. Gradual and verifiable release of a secret. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 156--166."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_6"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_11"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134092"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"key":"e_1_3_2_2_17_1","volume-title":"Conference on the Theory and Application of Cryptology. Springer, 573--588","author":"Cleve Richard","year":"1989","unstructured":"Richard Cleve . 1989 . Controlled gradual disclosure schemes for random bits and their applications . In Conference on the Theory and Application of Cryptology. Springer, 573--588 . Richard Cleve. 1989. Controlled gradual disclosure schemes for random bits and their applications. In Conference on the Theory and Application of Cryptology. Springer, 573--588."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3323847"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384749"},{"key":"e_1_3_2_2_22_1","volume-title":"Conference on Fairness, Accountability and Transparency. 35--47","author":"Ekstrand Michael D","year":"2018","unstructured":"Michael D Ekstrand , Rezvan Joshaghani , and Hoda Mehrpouyan . 2018 . Privacy for all: Ensuring fair and equitable privacy protections . In Conference on Fairness, Accountability and Transparency. 35--47 . Michael D Ekstrand, Rezvan Joshaghani, and Hoda Mehrpouyan. 2018. Privacy for all: Ensuring fair and equitable privacy protections. In Conference on Fairness, Accountability and Transparency. 35--47."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_29"},{"key":"e_1_3_2_2_24_1","volume-title":"workshop in Sintra. 51","author":"Garbinato Benoit","year":"2006","unstructured":"Benoit Garbinato and Ian Rickebusch . 2006 . A modular solution to fair exchange for peer-to-peer middleware . In workshop in Sintra. 51 . Benoit Garbinato and Ian Rickebusch. 2006. A modular solution to fair exchange for peer-to-peer middleware. In workshop in Sintra. 51."},{"key":"e_1_3_2_2_25_1","volume-title":"10th International Conferenceon Innovative Internet Community Systems (I2CS)--Jubilee Edition 2010--(2010)","author":"Ian Rickebusch Garbinato","year":"2010","unstructured":"Beno^it Garbinato and Ian Rickebusch . 2010 . Impossibility results on fair exchange . 10th International Conferenceon Innovative Internet Community Systems (I2CS)--Jubilee Edition 2010--(2010) . Beno^it Garbinato and Ian Rickebusch. 2010. Impossibility results on fair exchange. 10th International Conferenceon Innovative Internet Community Systems (I2CS)--Jubilee Edition 2010--(2010)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_6"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"e_1_3_2_2_28_1","first-page":"272","article-title":"Outsourcing Multi-Party Computation","volume":"2011","author":"Kamara Seny","year":"2011","unstructured":"Seny Kamara , Payman Mohassel , and Mariana Raykova . 2011 . Outsourcing Multi-Party Computation . IACR Cryptol. Eprint Arch. , Vol. 2011 (2011), 272 . Seny Kamara, Payman Mohassel, and Mariana Raykova. 2011. Outsourcing Multi-Party Computation. IACR Cryptol. Eprint Arch., Vol. 2011 (2011), 272.","journal-title":"IACR Cryptol. Eprint Arch."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_25"},{"key":"e_1_3_2_2_30_1","volume-title":"Cryptographers' Track at the RSA Conference","author":"Kilincc Handan","unstructured":"Handan Kilincc and Alptekin K\u00fcp\u00e7\u00fc . 2015. Optimally efficient multi-party fair exchange and fair secure multi-party computation . In Cryptographers' Track at the RSA Conference . Springer , 330--349. Handan Kilincc and Alptekin K\u00fcp\u00e7\u00fc. 2015. Optimally efficient multi-party fair exchange and fair secure multi-party computation. In Cryptographers' Track at the RSA Conference. Springer, 330--349."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978424"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978421"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2701163"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_37_1","unstructured":"Truffle suite. [n.d.]. Truffle. https:\/\/www.trufflesuite.com\/. Accessed: 2021-07-20.  Truffle suite. [n.d.]. Truffle. https:\/\/www.trufflesuite.com\/. Accessed: 2021-07-20."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.196"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474123.3486756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474123.3486756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:35Z","timestamp":1750191455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474123.3486756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":37,"alternative-id":["10.1145\/3474123.3486756","10.1145\/3474123"],"URL":"https:\/\/doi.org\/10.1145\/3474123.3486756","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}