{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T19:52:50Z","timestamp":1773690770776,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560622","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2735-2749","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Zapper"],"prefix":"10.1145","author":[{"given":"Samuel","family":"Steffen","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Benjamin","family":"Bichsel","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arkworks Contributors. 2022. arkworks zkSNARK ecosystem. https:\/\/arkworks.rs  Arkworks Contributors. 2022. arkworks zkSNARK ecosystem. https:\/\/arkworks.rs"},{"key":"e_1_3_2_1_2_1","volume-title":"Smaller, Fast as MD5. In Applied Cryptography and Network Security,, Michael Jacobson, Michael Locasto, Payman Mohassel, and Reihaneh Safavi-Naini (Eds.)","author":"Aumasson Jean-Philippe","unstructured":"Jean-Philippe Aumasson , Samuel Neves , Zooko Wilcox-O'Hearn , and Christian Winnerlein . 2013. BLAKE2 : Simpler , Smaller, Fast as MD5. In Applied Cryptography and Network Security,, Michael Jacobson, Michael Locasto, Payman Mohassel, and Reihaneh Safavi-Naini (Eds.) . Springer Berlin Heidelberg , Berlin, Heidelberg , 119--135. Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, and Christian Winnerlein. 2013. BLAKE2: Simpler, Smaller, Fast as MD5. In Applied Cryptography and Network Security,, Michael Jacobson, Michael Locasto, Payman Mohassel, and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 119--135."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS52497.2021.9569822"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_33"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_1_9_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 b. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture . In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 781--796. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/ben-sasson Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014b. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 781--796. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/ben-sasson"},{"key":"e_1_3_2_1_10_1","volume-title":"Selected Areas in Cryptography,","author":"Bertoni Guido","unstructured":"Guido Bertoni , Joan Daemen , Micha\u00ebl Peeters , and Gilles Van Assche . 2012. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications . In Selected Areas in Cryptography, , Ali Miri and Serge Vaudenay (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 320--337. Guido Bertoni, Joan Daemen, Micha\u00ebl Peeters, and Gilles Van Assche. 2012. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications. In Selected Areas in Cryptography,, Ali Miri and Serge Vaudenay (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 320--337."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"e_1_3_2_1_13_1","unstructured":"Sean Bowe. 2017. Jujub elliptic curve. https:\/\/github.com\/zkcrypto\/jubjub  Sean Bowe. 2017. Jujub elliptic curve. https:\/\/github.com\/zkcrypto\/jubjub"},{"key":"e_1_3_2_1_14_1","volume-title":"ZEXE: Enabling Decentralized Private Computation. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society","author":"Bowe S.","year":"2020","unstructured":"S. Bowe , A. Chiesa , M. Green , I. Miers , P. Mishra , and H. Wu . 2020 . ZEXE: Enabling Decentralized Private Computation. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society , Los Alamitos, CA, USA, 1114--1131. https:\/\/doi.org\/10.1109\/SP40000. 2020 .00050 ISSN: 2375--1207. 10.1109\/SP40000.2020.00050 S. Bowe, A. Chiesa, M. Green, I. Miers, P. Mishra, and H. Wu. 2020. ZEXE: Enabling Decentralized Private Computation. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Los Alamitos, CA, USA, 1114--1131. https:\/\/doi.org\/10.1109\/SP40000.2020.00050 ISSN: 2375--1207."},{"key":"e_1_3_2_1_15_1","volume-title":"ZEXE: Enabling Decentralized Private Computation. Cryptology ePrint Archive, Report 2018\/962 (updated 2021-03--30). https:\/\/ia.cr\/2018\/962.","author":"Bowe Sean","year":"2021","unstructured":"Sean Bowe , Alessandro Chiesa , Matthew Green , Ian Miers , Pratyush Mishra , and Howard Wu . 2021 . ZEXE: Enabling Decentralized Private Computation. Cryptology ePrint Archive, Report 2018\/962 (updated 2021-03--30). https:\/\/ia.cr\/2018\/962. Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu. 2021. ZEXE: Enabling Decentralized Private Computation. Cryptology ePrint Archive, Report 2018\/962 (updated 2021-03--30). https:\/\/ia.cr\/2018\/962."},{"key":"e_1_3_2_1_16_1","volume-title":"Zether: Towards Privacy in a Smart Contract World","author":"B\u00fcnz Benedikt","year":"2020","unstructured":"Benedikt B\u00fcnz , Shashank Agrawal , Mahdi Zamani , and Dan Boneh . 2020 . Zether: Towards Privacy in a Smart Contract World . In Financial Cryptography and Data Security, Joseph Bonneau and Nadia Heninger (Eds.). Springer International Publishing , Cham , 423--443. Benedikt B\u00fcnz, Shashank Agrawal, Mahdi Zamani, and Dan Boneh. 2020. Zether: Towards Privacy in a Smart Contract World. In Financial Cryptography and Data Security, Joseph Bonneau and Nadia Heninger (Eds.). Springer International Publishing, Cham, 423--443."},{"key":"e_1_3_2_1_17_1","volume-title":"Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR","author":"Cheng Raymond","year":"2018","unstructured":"Raymond Cheng , Fan Zhang , Jernej Kos , Warren He , Nicholas Hynes , Noah M. Johnson , Ari Juels , Andrew Miller , and Dawn Song . 2018 . Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR , Vol. abs\/ 1804 .05141 (2018). http:\/\/arxiv.org\/abs\/1804.05141 Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2018. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR, Vol. abs\/1804.05141 (2018). http:\/\/arxiv.org\/abs\/1804.05141"},{"key":"e_1_3_2_1_18_1","volume-title":"Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. In Advances in Cryptology - EUROCRYPT","author":"Chiesa Alessandro","year":"2020","unstructured":"Alessandro Chiesa , Yuncong Hu , Mary Maller , Pratyush Mishra , Noah Vesely , and Nicholas Ward . 2020 . Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. In Advances in Cryptology - EUROCRYPT 2020, Anne Canteaut and Yuval Ishai (Eds.). Springer International Publishing , Cham, 738--768. Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Noah Vesely, and Nicholas Ward. 2020. Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. In Advances in Cryptology - EUROCRYPT 2020, Anne Canteaut and Yuval Ishai (Eds.). Springer International Publishing, Cham, 738--768."},{"key":"e_1_3_2_1_19_1","unstructured":"ConsenSys. 2022. Ethereum Smart Contract Best Practices: Denial of Service. https:\/\/consensys.github.io\/smart-contract-best-practices\/attacks\/denial-of-service\/accessed: 2022-07--28.  ConsenSys. 2022. Ethereum Smart Contract Best Practices: Denial of Service. https:\/\/consensys.github.io\/smart-contract-best-practices\/attacks\/denial-of-service\/accessed: 2022-07--28."},{"key":"e_1_3_2_1_20_1","volume-title":"FastKitten: Practical Smart Contracts on Bitcoin. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Das Poulami","year":"2019","unstructured":"Poulami Das , Lisa Eckey , Tommaso Frassetto , David Gens , Kristina Host\u00e1kov\u00e1 , Patrick Jauernig , Sebastian Faust , and Ahmad-Reza Sadeghi . 2019 . FastKitten: Practical Smart Contracts on Bitcoin. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 801--818. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/das Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Host\u00e1kov\u00e1, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. 2019. FastKitten: Practical Smart Contracts on Bitcoin. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 801--818. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/das"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00026"},{"key":"e_1_3_2_1_22_1","volume-title":"Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium (USENIX Security 04)","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine , Nick Mathewson , and Paul Syverson . 2004 . Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium (USENIX Security 04) . USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/tor-second-generation-onion-router Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium (USENIX Security 04). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/tor-second-generation-onion-router"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_24_1","volume-title":"Financial Cryptography and Data Security","author":"Eskandari Shayan","unstructured":"Shayan Eskandari , Seyedehmahsa Moosavi , and Jeremy Clark . 2020. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain . In Financial Cryptography and Data Security . Springer International Publishing , Cham , 170--189. Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2020. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain. In Financial Cryptography and Data Security. Springer International Publishing, Cham, 170--189."},{"key":"e_1_3_2_1_25_1","volume-title":"Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology -- ASIACRYPT","author":"Fauzi Prastudy","year":"2019","unstructured":"Prastudy Fauzi , Sarah Meiklejohn , Rebekah Mercer , and Claudio Orlandi . 2019 . Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology -- ASIACRYPT 2019, Steven D. Galbraith and Shiho Moriai (Eds.). Springer International Publishing , Cham, 649--678. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-34578-5_23 Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, and Claudio Orlandi. 2019. Quisquis: A New Design for Anonymous Cryptocurrencies. In Advances in Cryptology -- ASIACRYPT 2019, Steven D. Galbraith and Shiho Moriai (Eds.). Springer International Publishing, Cham, 649--678. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-34578-5_23"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792230010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484800"},{"key":"e_1_3_2_1_28_1","volume-title":"Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Grassi Lorenzo","year":"2021","unstructured":"Lorenzo Grassi , Dmitry Khovratovich , Christian Rechberger , Arnab Roy , and Markus Schofnegger . 2021 . Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 519--535. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/grassi Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 519--535. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/grassi"},{"key":"e_1_3_2_1_29_1","volume-title":"Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. Cryptology ePrint Archive, Report 2017\/540. https:\/\/ia.cr\/2017\/540.","author":"Groth Jens","year":"2017","unstructured":"Jens Groth and Mary Maller . 2017 . Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. Cryptology ePrint Archive, Report 2017\/540. https:\/\/ia.cr\/2017\/540. Jens Groth and Mary Maller. 2017. Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. Cryptology ePrint Archive, Report 2017\/540. https:\/\/ia.cr\/2017\/540."},{"key":"e_1_3_2_1_30_1","volume-title":"BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs","author":"Guan Zhangshuang","year":"2020","unstructured":"Zhangshuang Guan , Zhiguo Wan , Yang Yang , Yan Zhou , and Butian Huang . 2020. BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs . IEEE Transactions on Dependable and Secure Computing ( 2020 ). https:\/\/doi.org\/10.1109\/TDSC.2020.3025129 10.1109\/TDSC.2020.3025129 Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, and Butian Huang. 2020. BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. IEEE Transactions on Dependable and Secure Computing (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.3025129"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417283"},{"key":"e_1_3_2_1_32_1","volume-title":"Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Heath David","year":"2021","unstructured":"David Heath , Yibin Yang , David Devecsery , and Vladimir Kolesnikov . 2021 . Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE , San Francisco, CA, USA, 1538--1556. https:\/\/doi.org\/10.1109\/SP40001. 2021.00089 10.1109\/SP40001.2021.00089 David Heath, Yibin Yang, David Devecsery, and Vladimir Kolesnikov. 2021. Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 1538--1556. https:\/\/doi.org\/10.1109\/SP40001.2021.00089"},{"key":"e_1_3_2_1_34_1","unstructured":"Dave Jevans. 2020. CipherTrace Files Two Monero Cryptocurrency Tracing Patents. https:\/\/ciphertrace.com\/ciphertrace-files-two-monero-cryptocurrency-tracing-patents\/. Accessed: 2022-04-15.  Dave Jevans. 2020. CipherTrace Files Two Monero Cryptocurrency Tracing Patents. https:\/\/ciphertrace.com\/ciphertrace-files-two-monero-cryptocurrency-tracing-patents\/. Accessed: 2022-04-15."},{"key":"e_1_3_2_1_35_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Kalodner Harry","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S. Matthew Weinberg , and Edward W. Felten . 2018. Arbitrum: Scalable, private smart contracts . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 1353--1370. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/kalodner Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1353--1370. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/kalodner"},{"key":"e_1_3_2_1_36_1","unstructured":"Dmitry Khovratovich. 2019. Encryption with Poseidion. https:\/\/dusk.network\/uploads\/Encryption-with-Poseidon.pdf  Dmitry Khovratovich. 2019. Encryption with Poseidion. https:\/\/dusk.network\/uploads\/Encryption-with-Poseidon.pdf"},{"key":"e_1_3_2_1_37_1","volume-title":"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy. IEEE, 839--858","author":"Kosba Ahmed","year":"2016","unstructured":"Ahmed Kosba , Andrew Miller , Elaine Shi , Zikai Wen , and Charalampos Papamanthou . 2016 . Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy. IEEE, 839--858 . https:\/\/doi.org\/10.1109\/SP.2016.55 10.1109\/SP.2016.55 Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In 2016 IEEE Symposium on Security and Privacy. IEEE, 839--858. https:\/\/doi.org\/10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"B. Laurie A. Langley and E. Kasper. 2013. Certificate Transparency. RFC 6962.  B. Laurie A. Langley and E. Kasper. 2013. Certificate Transparency. RFC 6962.","DOI":"10.17487\/rfc6962"},{"key":"e_1_3_2_1_39_1","unstructured":"Toghrul Maharramov Dmitry Khovratovich and Emanuele Francioni. 2021. The Dusk Network Whitepaper. https:\/\/dusk.network\/uploads\/The_Dusk_Network_Whitepaper_v3_0_0.pdf Accessed: 2022-04-28.  Toghrul Maharramov Dmitry Khovratovich and Emanuele Francioni. 2021. The Dusk Network Whitepaper. https:\/\/dusk.network\/uploads\/The_Dusk_Network_Whitepaper_v3_0_0.pdf Accessed: 2022-04-28."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/646752.704751"},{"key":"e_1_3_2_1_41_1","volume-title":"44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings. IEEE Computer. Soc","author":"Micali S.","year":"2003","unstructured":"S. Micali , M. Rabin , and J. Kilian . 2003. Zero-knowledge sets . In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings. IEEE Computer. Soc , Cambridge, MA, USA, 80--91. https:\/\/doi.org\/10.1109\/SFCS. 2003 .1238183 10.1109\/SFCS.2003.1238183 S. Micali, M. Rabin, and J. Kilian. 2003. Zero-knowledge sets. In 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings. IEEE Computer. Soc, Cambridge, MA, USA, 80--91. https:\/\/doi.org\/10.1109\/SFCS.2003.1238183"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_43_1","volume-title":"An Empirical Analysis of Traceability in the Monero Blockchain. arXiv:1704.04299 [cs] (April","author":"M\u00f6ser Malte","year":"2018","unstructured":"Malte M\u00f6ser , Kyle Soska , Ethan Heilman , Kevin Lee , Henry Heffan , Shashvat Srivastava , Kyle Hogan , Jason Hennessey , Andrew Miller , Arvind Narayanan , and Nicolas Christin . 2018. An Empirical Analysis of Traceability in the Monero Blockchain. arXiv:1704.04299 [cs] (April 2018 ). http:\/\/arxiv.org\/abs\/1704.04299 arXiv: 1704.04299. Malte M\u00f6ser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin. 2018. An Empirical Analysis of Traceability in the Monero Blockchain. arXiv:1704.04299 [cs] (April 2018). http:\/\/arxiv.org\/abs\/1704.04299 arXiv: 1704.04299."},{"key":"e_1_3_2_1_45_1","unstructured":"Andrew Norry. 2020. The History of the Mt Gox Hack: Bitcoin's Biggest Heist. Blockonomi. https:\/\/blockonomi.com\/mt-gox-hack\/accessed: 2022-04-20.  Andrew Norry. 2020. The History of the Mt Gox Hack: Bitcoin's Biggest Heist. Blockonomi. https:\/\/blockonomi.com\/mt-gox-hack\/accessed: 2022-04-20."},{"key":"e_1_3_2_1_46_1","volume-title":"An Analysis of Anonymity in the Bitcoin System. arXiv:1107.4524 [physics] (May","author":"Reid Fergal","year":"2012","unstructured":"Fergal Reid and Martin Harrigan . 2012. An Analysis of Anonymity in the Bitcoin System. arXiv:1107.4524 [physics] (May 2012 ). http:\/\/arxiv.org\/abs\/1107.4524 arXiv: 1107.4524. Fergal Reid and Martin Harrigan. 2012. An Analysis of Anonymity in the Bitcoin System. arXiv:1107.4524 [physics] (May 2012). http:\/\/arxiv.org\/abs\/1107.4524 arXiv: 1107.4524."},{"key":"e_1_3_2_1_47_1","volume-title":"2014 IEEE Symposium on Security and Privacy. 459--474","author":"Sasson E. B.","unstructured":"E. B. Sasson , A. Chiesa , C. Garman , M. Green , I. Miers , E. Tromer , and M. Virza . 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin . In 2014 IEEE Symposium on Security and Privacy. 459--474 . E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In 2014 IEEE Symposium on Security and Privacy. 459--474."},{"key":"e_1_3_2_1_49_1","unstructured":"StarkNet. 2022a. Privacy on StarkNet. https:\/\/starknet.io\/faq\/privacy-on-starknet\/accessed: 2022-05-01.  StarkNet. 2022a. Privacy on StarkNet. https:\/\/starknet.io\/faq\/privacy-on-starknet\/accessed: 2022-05-01."},{"key":"e_1_3_2_1_50_1","unstructured":"StarkNet. 2022b. StarkNet Main Webpage. https:\/\/starknet.io\/ accessed: 2022-05-01.  StarkNet. 2022b. StarkNet Main Webpage. https:\/\/starknet.io\/ accessed: 2022-05-01."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833732"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363222"},{"key":"e_1_3_2_1_53_1","unstructured":"Zachary Williamson. 2021a. The AZTEC Protocol. https:\/\/github.com\/AztecProtocol\/AZTEC\/blob\/master\/AZTEC.pdf accessed: 2022-05-01.  Zachary Williamson. 2021a. The AZTEC Protocol. https:\/\/github.com\/AztecProtocol\/AZTEC\/blob\/master\/AZTEC.pdf accessed: 2022-05-01."},{"key":"e_1_3_2_1_54_1","unstructured":"Zac Williamson. 2021b. Aztec's ZK-ZK-Rollup looking behind the cryptocurtain. Medium. https:\/\/medium.com\/aztec-protocol\/aztecs-zk-zk-rollup-looking-behind-the-cryptocurtain-2b8af1fca619 accessed: 2022-05-01.  Zac Williamson. 2021b. Aztec's ZK-ZK-Rollup looking behind the cryptocurtain. Medium. https:\/\/medium.com\/aztec-protocol\/aztecs-zk-zk-rollup-looking-behind-the-cryptocurtain-2b8af1fca619 accessed: 2022-05-01."},{"key":"e_1_3_2_1_55_1","unstructured":"Wolfie Zhao. 2018. Bithumb textdollar31 Million Crypto Exchange Hack: What We Know (And Don't). CoinDesk. https:\/\/www.coindesk.com\/markets\/2018\/06\/20\/bithumb-31-million-crypto-exchange-hack-what-we-know-and-dont\/accessed: 2022-04-20.  Wolfie Zhao. 2018. Bithumb textdollar31 Million Crypto Exchange Hack: What We Know (And Don't). CoinDesk. https:\/\/www.coindesk.com\/markets\/2018\/06\/20\/bithumb-31-million-crypto-exchange-hack-what-we-know-and-dont\/accessed: 2022-04-20."},{"key":"e_1_3_2_1_56_1","unstructured":"zkSync. 2022a. zkSync Documentation: Privacy. https:\/\/docs.zksync.io\/userdocs\/privacy.html accessed: 2022-05-01.  zkSync. 2022a. zkSync Documentation: Privacy. https:\/\/docs.zksync.io\/userdocs\/privacy.html accessed: 2022-05-01."},{"key":"e_1_3_2_1_57_1","unstructured":"zkSync. 2022b. zkSync Main Webpage. https:\/\/zksync.io\/accessed: 2022-05-01. io  zkSync. 2022b. zkSync Main Webpage. https:\/\/zksync.io\/accessed: 2022-05-01. io"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560622","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:58Z","timestamp":1750182538000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560622"}},"subtitle":["Smart Contracts with Data and Identity Privacy"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":51,"alternative-id":["10.1145\/3548606.3560622","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560622","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}