{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:51:48Z","timestamp":1762660308430,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3567995","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"117-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2617-1321","authenticated-orcid":false,"given":"Qian","family":"Ren","sequence":"first","affiliation":[{"name":"SSC Holding Company Ltd., China and Oxford-Hainan Blockchain Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6567-7838","authenticated-orcid":false,"given":"Yingjun","family":"Wu","sequence":"additional","affiliation":[{"name":"SSC Holding Company Ltd., China and Oxford-Hainan Blockchain Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1021-9973","authenticated-orcid":false,"given":"Han","family":"Liu","sequence":"additional","affiliation":[{"name":"Oxford-Hainan Blockchain Research Institute, China and Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4137-619X","authenticated-orcid":false,"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"Oxford-Hainan Blockchain Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2071-1777","authenticated-orcid":false,"given":"Anne","family":"Victor","sequence":"additional","affiliation":[{"name":"SSC Holding Company Ltd., China and Oxford-Hainan Blockchain Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6564-1568","authenticated-orcid":false,"given":"Hong","family":"Lei","sequence":"additional","affiliation":[{"name":"Hainan University, China and Oxford-Hainan Blockchain Research Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7170-2825","authenticated-orcid":false,"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3225-4286","authenticated-orcid":false,"given":"Bangdao","family":"Chen","sequence":"additional","affiliation":[{"name":"SSC Holding Company Ltd., China and Oxford-Hainan Blockchain Research Institute, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","unstructured":"AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf.  AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_24"},{"volume-title":"Security and Cryptography for Networks, Michel Abdalla and Roberto De\u00a0Prisco (Eds.)","author":"Baum Carsten","key":"e_1_3_2_1_5_1","unstructured":"Carsten Baum , Ivan Damg\u00e5rd , and Claudio Orlandi . 2014. Publicly Auditable Secure Multi-Party Computation . In Security and Cryptography for Networks, Michel Abdalla and Roberto De\u00a0Prisco (Eds.) . Springer International Publishing , Cham , 175\u2013196. Carsten Baum, Ivan Damg\u00e5rd, and Claudio Orlandi. 2014. Publicly Auditable Secure Multi-Party Computation. In Security and Cryptography for Networks, Michel Abdalla and Roberto De\u00a0Prisco (Eds.). Springer International Publishing, Cham, 175\u2013196."},{"key":"e_1_3_2_1_6_1","volume-title":"Security Symposium ({USENIX} Security 18)","author":"Biondo Andrea","year":"2018","unstructured":"Andrea Biondo , Mauro Conti , Lucas Davi , Tommaso Frassetto , and Ahmad-Reza Sadeghi . 2018 . The Guard\u2019s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th {USENIX} Security Symposium ({USENIX} Security 18) . USENIX Association, Baltimore, MD, 1213\u20131227. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/biondo Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2018. The Guard\u2019s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. In 27th {USENIX} Security Symposium ({USENIX} Security 18). USENIX Association, Baltimore, MD, 1213\u20131227. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/biondo"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00050"},{"key":"e_1_3_2_1_8_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17) . USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/brasser Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/brasser"},{"key":"e_1_3_2_1_9_1","volume-title":"Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Bulck Jo\u00a0Van","year":"2018","unstructured":"Jo\u00a0Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas\u00a0 F. Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th {USENIX} Security Symposium ({USENIX} Security 18) . USENIX Association , Baltimore, MD , 991\u20131008. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/bulck Jo\u00a0Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas\u00a0F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th {USENIX} Security Symposium ({USENIX} Security 18). USENIX Association, Baltimore, MD, 991\u20131008. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/bulck"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363221"},{"key":"e_1_3_2_1_12_1","unstructured":"BNB Chain. 2022. Multi-Party Threshold Signature Scheme. https:\/\/github.com\/bnb-chain\/tss-lib.  BNB Chain. 2022. Multi-Party Threshold Signature Scheme. https:\/\/github.com\/bnb-chain\/tss-lib."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2019.00023"},{"key":"e_1_3_2_1_14_1","unstructured":"Bitcoin Core. 2022. libsecp256k1. https:\/\/github.com\/bitcoin-core\/secp256k1.  Bitcoin Core. 2022. libsecp256k1. https:\/\/github.com\/bitcoin-core\/secp256k1."},{"key":"e_1_3_2_1_15_1","volume-title":"Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857\u2013874.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857\u2013874. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857\u2013874."},{"volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19)","author":"Das Poulami","key":"e_1_3_2_1_16_1","unstructured":"Poulami Das , Lisa Eckey , Tommaso Frassetto , David Gens , Kristina Host\u00e1kov\u00e1 , Patrick Jauernig , Sebastian Faust , and Ahmad-Reza Sadeghi . 2019. FastKitten: Practical Smart Contracts on Bitcoin . In 28th {USENIX} Security Symposium ({USENIX} Security 19) . USENIX Association , Santa Clara, CA , 801\u2013818. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/das Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Host\u00e1kov\u00e1, Patrick Jauernig, Sebastian Faust, and Ahmad-Reza Sadeghi. 2019. FastKitten: Practical Smart Contracts on Bitcoin. In 28th {USENIX} Security Symposium ({USENIX} Security 19). USENIX Association, Santa Clara, CA, 801\u2013818. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/das"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484351"},{"key":"e_1_3_2_1_18_1","unstructured":"Open Enclave. 2021. Open Enclave SDK. https:\/\/github.com\/openenclave\/openenclave. https:\/\/github.com\/openenclave\/openenclave  Open Enclave. 2021. Open Enclave SDK. https:\/\/github.com\/openenclave\/openenclave. https:\/\/github.com\/openenclave\/openenclave"},{"key":"e_1_3_2_1_19_1","unstructured":"Ethereum. 2021. Solc 0.8.10. https:\/\/github.com\/ethereum\/solidity\/releases\/tag\/v0.8.10. https:\/\/github.com\/ethereum\/solidity\/releases\/tag\/v0.8.10  Ethereum. 2021. Solc 0.8.10. https:\/\/github.com\/ethereum\/solidity\/releases\/tag\/v0.8.10. https:\/\/github.com\/ethereum\/solidity\/releases\/tag\/v0.8.10"},{"key":"e_1_3_2_1_20_1","unstructured":"Ethereum Foundation. 2020. Ethereum Virtual Machine. https:\/\/ethereum.org\/en\/developers\/docs\/evm\/  Ethereum Foundation. 2020. Ethereum Virtual Machine. https:\/\/ethereum.org\/en\/developers\/docs\/evm\/"},{"volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 217\u2013233.","author":"Gruss Daniel","key":"e_1_3_2_1_21_1","unstructured":"Daniel Gruss , Julian Lettner , Felix Schuster , Olya Ohrimenko , Istvan Haller , and Manuel Costa . 2017. Strong and efficient cache side-channel protection using hardware transactional memory . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 217\u2013233. Daniel Gruss, Julian Lettner, Felix Schuster, Olya Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and efficient cache side-channel protection using hardware transactional memory. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 217\u2013233."},{"key":"e_1_3_2_1_22_1","unstructured":"Intel. 2021. Resources and Response to Side Channel L1 Terminal Fault. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/l1tf.html?wapkw=l1tf  Intel. 2021. Resources and Response to Side Channel L1 Terminal Fault. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/l1tf.html?wapkw=l1tf"},{"key":"e_1_3_2_1_23_1","volume-title":"HyperEnclave: An Open and Cross-platform Trusted Execution Environment. In 2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Jia Yuekai","year":"2022","unstructured":"Yuekai Jia , Shuang Liu , Wenhao Wang , Yu Chen , Zhengde Zhai , Shoumeng Yan , and Zhengyu He . 2022 . HyperEnclave: An Open and Cross-platform Trusted Execution Environment. In 2022 USENIX Annual Technical Conference (USENIX ATC 22) . USENIX Association, Carlsbad, CA, 437\u2013454. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/jia-yuekai Yuekai Jia, Shuang Liu, Wenhao Wang, Yu Chen, Zhengde Zhai, Shoumeng Yan, and Zhengyu He. 2022. HyperEnclave: An Open and Cross-platform Trusted Execution Environment. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). USENIX Association, Carlsbad, CA, 437\u2013454. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/jia-yuekai"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00048"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2016.55"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523259"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386127"},{"key":"e_1_3_2_1_28_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review(2008), 21260.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review(2008), 21260. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review(2008), 21260."},{"key":"e_1_3_2_1_29_1","volume-title":"Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479\u2013498.","author":"Noorman Job","year":"2013","unstructured":"Job Noorman , Pieter Agten , Wilfried Daniels , Raoul Strackx , Anthony Van\u00a0Herrewege , Christophe Huygens , Bart Preneel , Ingrid Verbauwhede , and Frank Piessens . 2013 . Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479\u2013498. Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van\u00a0Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479\u2013498."},{"volume-title":"31st {USENIX} Security Symposium ({USENIX} Security 22)","author":"Ozdemir Alex","key":"e_1_3_2_1_30_1","unstructured":"Alex Ozdemir and Dan Boneh . 2022. Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets . In 31st {USENIX} Security Symposium ({USENIX} Security 22) . USENIX Association , Boston, MA , 4291\u20134308. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/ozdemir Alex Ozdemir and Dan Boneh. 2022. Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. In 31st {USENIX} Security Symposium ({USENIX} Security 22). USENIX Association, Boston, MA, 4291\u20134308. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/ozdemir"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813712"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00111"},{"volume-title":"Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems","author":"Schoenmakers Berry","key":"e_1_3_2_1_34_1","unstructured":"Berry Schoenmakers and Meilof Veeningen . 2015. Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems . In Applied Cryptography and Network Security, Tal Malkin, Vladimir Kolesnikov, Allison\u00a0Bishop Lewko, and Michalis Polychronakis (Eds.). Springer International Publishing , Cham , 3\u201322. Berry Schoenmakers and Meilof Veeningen. 2015. Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. In Applied Cryptography and Network Security, Tal Malkin, Vladimir Kolesnikov, Allison\u00a0Bishop Lewko, and Michalis Polychronakis (Eds.). Springer International Publishing, Cham, 3\u201322."},{"key":"e_1_3_2_1_35_1","unstructured":"Jaebaek Seo Byoungyoung Lee Seong\u00a0Min Kim Ming-Wei Shih Insik Shin Dongsu Han and Taesoo Kim. 2017. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.. In NDSS.  Jaebaek Seo Byoungyoung Lee Seong\u00a0Min Kim Ming-Wei Shih Insik Shin Dongsu Han and Taesoo Kim. 2017. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.. In NDSS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.. In NDSS.  Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.. In NDSS.","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_37_1","unstructured":"Rohit Sinha. 2020. LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.  Rohit Sinha. 2020. LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833732"},{"key":"e_1_3_2_1_40_1","unstructured":"Truffle Suite. 2021. Ganache. https:\/\/github.com\/trufflesuite\/ganache. https:\/\/github.com\/trufflesuite\/ganache  Truffle Suite. 2021. Ganache. https:\/\/github.com\/trufflesuite\/ganache. https:\/\/github.com\/trufflesuite\/ganache"},{"key":"e_1_3_2_1_41_1","volume-title":"Raziel: Private and Verifiable Smart Contracts on Blockchains. arXiv","author":"S\u00e1nchez David\u00a0Cerezo","year":"2018","unstructured":"David\u00a0Cerezo S\u00e1nchez . 2018 . Raziel: Private and Verifiable Smart Contracts on Blockchains. arXiv (2018). arXiv:1807.09484 David\u00a0Cerezo S\u00e1nchez. 2018. Raziel: Private and Verifiable Smart Contracts on Blockchains. arXiv (2018). arXiv:1807.09484"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134092"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978424"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978421"},{"key":"e_1_3_2_1_45_1","unstructured":"Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper(2014).  Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper(2014)."}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","acronym":"ACSAC","location":"Austin TX USA"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3567995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:13Z","timestamp":1750183753000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":43,"alternative-id":["10.1145\/3564625.3567995","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3567995","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}