{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:20Z","timestamp":1750220060444,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["2236\/2"],"award-info":[{"award-number":["2236\/2"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583651","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"129-139","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0896-9110","authenticated-orcid":false,"given":"Andreas","family":"Klinger","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7547-7012","authenticated-orcid":false,"given":"Felix","family":"Battermann","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2569-1042","authenticated-orcid":false,"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINS50155.2020.9315064"},{"volume-title":"Financial Cryptography and Data Security (Lecture Notes in Computer Science )","author":"Baum Carsten","key":"e_1_3_2_1_2_1","unstructured":"Carsten Baum, Bernardo David, and Rafael Dowsley. 2020. Insured MPC: Efficient Secure Computation with Financial Penalties. In Financial Cryptography and Data Security (Lecture Notes in Computer Science ). Springer International Publishing, 404--420."},{"volume-title":"Advances in Cryptology -- CRYPTO 2014 (Lecture Notes in Computer Science )","author":"Bentov Iddo","key":"e_1_3_2_1_3_1","unstructured":"Iddo Bentov and Ranjit Kumaresan. 2014. How to Use Bitcoin to Design Fair Protocols. In Advances in Cryptology -- CRYPTO 2014 (Lecture Notes in Computer Science ). Springer, 421--439."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647793"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"volume-title":"Introducing Ethereum and solidity","author":"Dannen Chris","key":"e_1_3_2_1_6_1","unstructured":"Chris Dannen. 2017. Introducing Ethereum and solidity. Springer."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_8_1","first-page":"2272","article-title":"A Secure Blind Signature Scheme for Computation Limited Users","volume":"3","author":"Fan I","year":"2009","unstructured":"Chun-I Fan and Ming-Te Chen. 2009. A Secure Blind Signature Scheme for Computation Limited Users. International Journal of Computer and Information Engineering , Vol. 3 (2009), 2272--2276.","journal-title":"International Journal of Computer and Information Engineering"},{"volume-title":"Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science )","author":"Ferguson Niels","key":"e_1_3_2_1_9_1","unstructured":"Niels Ferguson. 1994. Single Term Off-Line Coins. In Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science ). Springer, 318--328."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934147"},{"volume-title":"Foundations of Cryptography: Basic Tools","author":"Goldreich Oded","key":"e_1_3_2_1_11_1","unstructured":"Oded Goldreich. 2003. Foundations of Cryptography: Basic Tools. Cambridge University Press."},{"volume-title":"Foundations of Cryptography: Basic Applications","author":"Goldreich Oded","key":"e_1_3_2_1_12_1","unstructured":"Oded Goldreich. 2004. Foundations of Cryptography: Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"volume-title":"Theory of Cryptography (Lecture Notes in Computer Science )","author":"Goyal Vipul","key":"e_1_3_2_1_14_1","unstructured":"Vipul Goyal, Adam O'Neill, and Vanishree Rao. 2011. Correlated-Input Secure Hash Functions. In Theory of Cryptography (Lecture Notes in Computer Science ). Springer, 182--200."},{"volume-title":"Advances in Cryptology -- EUROCRYPT (Lecture Notes in Computer Science )","author":"Kiayias Aggelos","key":"e_1_3_2_1_15_1","unstructured":"Aggelos Kiayias, Hong-Sheng Zhou, and Vassilis Zikas. 2016. Fair and Robust Multi-party Computation Using a Global Transaction Ledger. In Advances in Cryptology -- EUROCRYPT (Lecture Notes in Computer Science ). Springer, 705--734."},{"volume-title":"TENCON 2007 - 2007 IEEE Region 10 Conference. 1--4.","author":"Mishra D. K.","key":"e_1_3_2_1_16_1","unstructured":"D. K. Mishra and M. Chandwani. 2007. Anonymity enabled secure multi-party computation for indian BPO. In TENCON 2007 - 2007 IEEE Region 10 Conference. 1--4."},{"volume-title":"Information Security and Privacy (Lecture Notes in Computer Science )","author":"Paul Souradyuti","key":"e_1_3_2_1_17_1","unstructured":"Souradyuti Paul and Ananya Shrivastava. 2018. Robust Multiparty Computation with Faster Verification Time. In Information Security and Privacy (Lecture Notes in Computer Science ). Springer International Publishing, 114--131."},{"key":"e_1_3_2_1_19_1","volume-title":"ZETH: On Integrating Zerocash on Ethereum. Technical Report arXiv:1904.00905. arXiv.","author":"Rondelet Antoine","year":"2019","unstructured":"Antoine Rondelet and Michal Zajac. 2019. ZETH: On Integrating Zerocash on Ethereum. Technical Report arXiv:1904.00905. arXiv."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"volume-title":"Parallel Architectures, Algorithms and Programming (Communications in Computer and Information Science )","author":"Zhong Hanrui","key":"e_1_3_2_1_21_1","unstructured":"Hanrui Zhong, Yingpeng Sang, Yongchun Zhang, and Zhicheng Xi. 2020. Secure Multi-Party Computation on Blockchain: An Overview. In Parallel Architectures, Algorithms and Programming (Communications in Computer and Information Science ). Springer, 452--460. io"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Charlotte NC USA","acronym":"CODASPY '23"},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583651","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583651"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":20,"alternative-id":["10.1145\/3577923.3583651","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583651","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}