{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:41:02Z","timestamp":1762609262676,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T00:00:00Z","timestamp":1675036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,30]]},"DOI":"10.1145\/3579375.3579389","type":"proceedings-article","created":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T22:09:58Z","timestamp":1678745398000},"page":"112-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8716-3907","authenticated-orcid":false,"given":"Bachar","family":"Kachouh","sequence":"first","affiliation":[{"name":"CNAM, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3369-7302","authenticated-orcid":false,"given":"Layth","family":"Sliman","sequence":"additional","affiliation":[{"name":"EFREI Engineering School-Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1137-621X","authenticated-orcid":false,"given":"Abed Ellatif","family":"Samhat","sequence":"additional","affiliation":[{"name":"Lebanese University, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7175-0448","authenticated-orcid":false,"given":"Kamel","family":"Barkaoui","sequence":"additional","affiliation":[{"name":"CNAM, France"}]}],"member":"320","published-online":{"date-parts":[[2023,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jean-Philippe Aumasson Adrian Hamelink and Omer Shlomovits. 2020. A Survey of ECDSA Threshold Signing. Cryptology ePrint Archive Paper 2020\/1390. https:\/\/eprint.iacr.org\/2020\/1390 https:\/\/eprint.iacr.org\/2020\/1390.  Jean-Philippe Aumasson Adrian Hamelink and Omer Shlomovits. 2020. A Survey of ECDSA Threshold Signing. Cryptology ePrint Archive Paper 2020\/1390. https:\/\/eprint.iacr.org\/2020\/1390 https:\/\/eprint.iacr.org\/2020\/1390."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"e_1_3_2_1_3_1","volume-title":"Blakley and Gregory Kabatiansky","author":"R.","year":"2011","unstructured":"G.\u00a0 R. Blakley and Gregory Kabatiansky . 2011 . Secret Sharing Schemes. Springer US , Boston, MA, 1095\u20131097. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_389 10.1007\/978-1-4419-5906-5_389 G.\u00a0R. Blakley and Gregory Kabatiansky. 2011. Secret Sharing Schemes. Springer US, Boston, MA, 1095\u20131097. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_389"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-003-6154-z"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti Nikolaos Makriyannis and Udi Peled. 2020. UC Non-Interactive Proactive Threshold ECDSA. Cryptology ePrint Archive Paper 2020\/492. https:\/\/eprint.iacr.org\/2020\/492  Ran Canetti Nikolaos Makriyannis and Udi Peled. 2020. UC Non-Interactive Proactive Threshold ECDSA. Cryptology ePrint Archive Paper 2020\/492. https:\/\/eprint.iacr.org\/2020\/492","DOI":"10.1145\/3372297.3423367"},{"key":"e_1_3_2_1_6_1","unstructured":"Guilhem Castagnos Dario Catalano Fabien Laguillaumie Federico Savasta and Ida Tucker. 2020. Bandwidth-efficient threshold EC-DSA. Cryptology ePrint Archive Paper 2020\/084. https:\/\/eprint.iacr.org\/2020\/084  Guilhem Castagnos Dario Catalano Fabien Laguillaumie Federico Savasta and Ida Tucker. 2020. Bandwidth-efficient threshold EC-DSA. Cryptology ePrint Archive Paper 2020\/084. https:\/\/eprint.iacr.org\/2020\/084"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"Claude Cr\u00e9peau. 2011. Commitment. Springer US Boston MA 224-227. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_239 10.1007\/978-1-4419-5906-5_239","DOI":"10.1007\/978-1-4419-5906-5_239"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"Claude Cr\u00e9peau. 2011. Commitment. Springer US Boston MA 224-227. https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_239","DOI":"10.1007\/978-1-4419-5906-5_239"},{"key":"e_1_3_2_1_8_1","volume-title":"Smart","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd , Marcel Keller , Enrique Larraia , Christian Miles , and Nigel\u00a0 P. Smart . 2012 . Implementing AES via an Actively\/Covertly Secure Dishonest-Majority MPC Protocol. In Security and Cryptography for Networks, Ivan Visconti and Roberto De\u00a0Prisco (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 241\u2013263. Ivan Damg\u00e5rd, Marcel Keller, Enrique Larraia, Christian Miles, and Nigel\u00a0P. Smart. 2012. Implementing AES via an Actively\/Covertly Secure Dishonest-Majority MPC Protocol. In Security and Cryptography for Networks, Ivan Visconti and Roberto De\u00a0Prisco (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 241\u2013263."},{"volume-title":"Advances in Cryptology \u2014 CRYPTO \u201987","author":"Desmedt Yvo","key":"e_1_3_2_1_9_1","unstructured":"Yvo Desmedt . 1988. Society and Group Oriented Cryptography: a New Concept . In Advances in Cryptology \u2014 CRYPTO \u201987 , Carl Pomerance (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 120\u2013127. Yvo Desmedt. 1988. Society and Group Oriented Cryptography: a New Concept. In Advances in Cryptology \u2014 CRYPTO \u201987, Carl Pomerance (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 120\u2013127."},{"key":"e_1_3_2_1_10_1","volume-title":"2018 IEEE Symposium on Security and Privacy (SP). 980\u2013997","author":"Doerner Jack","year":"2018","unstructured":"Jack Doerner , Yashvanth Kondi , Eysa Lee , and Abhi Shelat . 2018 . Secure Two-party Threshold ECDSA from ECDSA Assumptions . In 2018 IEEE Symposium on Security and Privacy (SP). 980\u2013997 . https:\/\/doi.org\/10.1109\/SP.2018.00036 10.1109\/SP.2018.00036 Jack Doerner, Yashvanth Kondi, Eysa Lee, and Abhi Shelat. 2018. Secure Two-party Threshold ECDSA from ECDSA Assumptions. In 2018 IEEE Symposium on Security and Privacy (SP). 980\u2013997. https:\/\/doi.org\/10.1109\/SP.2018.00036"},{"key":"#cr-split#-e_1_3_2_1_11_1.1","doi-asserted-by":"crossref","unstructured":"Jack Doerner Yashvanth Kondi Eysa Lee and Abhi Shelat. 2019. Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. Cryptology ePrint Archive Paper 2019\/523. https:\/\/doi.org\/10.1109\/SP.2019.00024 10.1109\/SP.2019.00024","DOI":"10.1109\/SP.2019.00024"},{"key":"#cr-split#-e_1_3_2_1_11_1.2","doi-asserted-by":"crossref","unstructured":"Jack Doerner Yashvanth Kondi Eysa Lee and Abhi Shelat. 2019. Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. Cryptology ePrint Archive Paper 2019\/523. https:\/\/doi.org\/10.1109\/SP.2019.00024","DOI":"10.1109\/SP.2019.00024"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Rosario Gennar and Steven Goldfeder. 2019. Fast Multiparty Threshold ECDSA with Fast Trustless Setup. Cryptology ePrint Archive Paper 2019\/114.  Rosario Gennar and Steven Goldfeder. 2019. Fast Multiparty Threshold ECDSA with Fast Trustless Setup. Cryptology ePrint Archive Paper 2019\/114.","DOI":"10.1145\/3243734.3243859"},{"key":"e_1_3_2_1_14_1","unstructured":"Rosario Gennaro and Steven Goldfeder. 2020. One Round Threshold ECDSA with Identifiable Abort. Cryptology ePrint Archive Paper 2020\/540. https:\/\/eprint.iacr.org\/2020\/540  Rosario Gennaro and Steven Goldfeder. 2020. One Round Threshold ECDSA with Identifiable Abort. Cryptology ePrint Archive Paper 2020\/540. https:\/\/eprint.iacr.org\/2020\/540"},{"volume-title":"Applied Cryptography and Network Security, Mark Manulis, Ahmad-Reza Sadeghi","author":"Gennaro Rosario","key":"e_1_3_2_1_15_1","unstructured":"Rosario Gennaro , Steven Goldfeder , and Arvind Narayanan . 2016. Threshold-Optimal DSA\/ECDSA Signatures and an Application to Bitcoin Wallet Security . In Applied Cryptography and Network Security, Mark Manulis, Ahmad-Reza Sadeghi , and Steve Schneider (Eds.). Springer International Publishing , Cham , 156\u2013174. Rosario Gennaro, Steven Goldfeder, and Arvind Narayanan. 2016. Threshold-Optimal DSA\/ECDSA Signatures and an Application to Bitcoin Wallet Security. In Applied Cryptography and Network Security, Mark Manulis, Ahmad-Reza Sadeghi, and Steve Schneider (Eds.). Springer International Publishing, Cham, 156\u2013174."},{"volume-title":"Advances in Cryptology \u2014 CRYPTO","author":"Gilboa Niv","key":"e_1_3_2_1_16_1","unstructured":"Niv Gilboa . 1999. Two Party RSA Key Generation . In Advances in Cryptology \u2014 CRYPTO \u2019 99, Michael Wiener (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 116\u2013129. Niv Gilboa. 1999. Two Party RSA Key Generation. In Advances in Cryptology \u2014 CRYPTO\u2019 99, Michael Wiener (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 116\u2013129."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_18_1","unstructured":"Adam G\u0105gol J\u0119drzej Kula Damian Straszak and Micha\u0142 \u015awi\u0119tek. 2020. Threshold ECDSA for Decentralized Asset Custody. Cryptology ePrint Archive Paper 2020\/498. https:\/\/eprint.iacr.org\/2020\/498  Adam G\u0105gol J\u0119drzej Kula Damian Straszak and Micha\u0142 \u015awi\u0119tek. 2020. Threshold ECDSA for Decentralized Asset Custody. Cryptology ePrint Archive Paper 2020\/498. https:\/\/eprint.iacr.org\/2020\/498"},{"key":"#cr-split#-e_1_3_2_1_19_1.1","doi-asserted-by":"crossref","unstructured":"Don Johnson Alfred Menezes and Scott Vanstone. 2001. The Elliptic Curve Digital Signature Algorithm (ECDSA). In International Journal of Information Security. https:\/\/doi.org\/10.1007\/s102070100002 10.1007\/s102070100002","DOI":"10.1007\/s102070100002"},{"key":"#cr-split#-e_1_3_2_1_19_1.2","doi-asserted-by":"crossref","unstructured":"Don Johnson Alfred Menezes and Scott Vanstone. 2001. The Elliptic Curve Digital Signature Algorithm (ECDSA). In International Journal of Information Security. https:\/\/doi.org\/10.1007\/s102070100002","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_20_1","first-page":"4","article-title":"Privacy preservation of genome data analysis using homomorphic encryption","volume":"15","author":"Kachouh Bachar","year":"2021","unstructured":"Bachar Kachouh , Khalil Hariss , Layth Sliman , Abed\u00a0Ellatif Samhat , and Tamim Alsuliman . 2021 . Privacy preservation of genome data analysis using homomorphic encryption . Service Oriented Computing and Applications 15 , 4 (Dec 2021), 273\u2013287. https:\/\/doi.org\/10.1007\/s11761-021-00326-0 10.1007\/s11761-021-00326-0 Bachar Kachouh, Khalil Hariss, Layth Sliman, Abed\u00a0Ellatif Samhat, and Tamim Alsuliman. 2021. Privacy preservation of genome data analysis using homomorphic encryption. Service Oriented Computing and Applications 15, 4 (Dec 2021), 273\u2013287. https:\/\/doi.org\/10.1007\/s11761-021-00326-0","journal-title":"Service Oriented Computing and Applications"},{"key":"e_1_3_2_1_21_1","volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to Modern Cryptography , Second Edition (2 nd ed.). Chapman amp; Hall\/CRC. 443\u2013486 pages. Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography, Second Edition (2nd ed.). Chapman amp; Hall\/CRC. 443\u2013486 pages.","edition":"2"},{"key":"e_1_3_2_1_22_1","unstructured":"Neal Koblitz and Alfred Menezes. 2006. Another Look at Generic Groups. Cryptology ePrint Archive Paper 2006\/230. https:\/\/eprint.iacr.org\/2006\/230  Neal Koblitz and Alfred Menezes. 2006. Another Look at Generic Groups. Cryptology ePrint Archive Paper 2006\/230. https:\/\/eprint.iacr.org\/2006\/230"},{"key":"e_1_3_2_1_23_1","unstructured":"David Kravitz. 1993. Digital Signature Algorithm. https:\/\/patents.google.com\/patent\/US5231668A\/en US Patent 5 231 668.  David Kravitz. 1993. Digital Signature Algorithm. https:\/\/patents.google.com\/patent\/US5231668A\/en US Patent 5 231 668."},{"key":"e_1_3_2_1_24_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 446\u2013466","author":"Lindell Yehuda","year":"2011","unstructured":"Yehuda Lindell . 2011 . Highly-efficient universally-composable commitments based on the DDH assumption . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 446\u2013466 . Yehuda Lindell. 2011. Highly-efficient universally-composable commitments based on the DDH assumption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 446\u2013466."},{"key":"e_1_3_2_1_25_1","volume-title":"Advances in Cryptology \u2013 CRYPTO","author":"Lindell Yehuda","year":"2017","unstructured":"Yehuda Lindell . 2017. Fast Secure Two-Party ECDSA Signing . In Advances in Cryptology \u2013 CRYPTO 2017 , Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing , Cham, 613\u2013644. Yehuda Lindell. 2017. Fast Secure Two-Party ECDSA Signing. In Advances in Cryptology \u2013 CRYPTO 2017, Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing, Cham, 613\u2013644."},{"key":"#cr-split#-e_1_3_2_1_26_1.1","doi-asserted-by":"crossref","unstructured":"Yehuda Lindell Ariel Nof and Samuel Ranellucci. 2018. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. Cryptology ePrint Archive Paper 2018\/987. https:\/\/doi.org\/10.1145\/3243734.3243788 10.1145\/3243734.3243788","DOI":"10.1145\/3243734.3243788"},{"key":"#cr-split#-e_1_3_2_1_26_1.2","doi-asserted-by":"crossref","unstructured":"Yehuda Lindell Ariel Nof and Samuel Ranellucci. 2018. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. Cryptology ePrint Archive Paper 2018\/987. https:\/\/doi.org\/10.1145\/3243734.3243788","DOI":"10.1145\/3243734.3243788"},{"key":"e_1_3_2_1_27_1","volume-title":"Advances in Cryptology \u2014 CRYPTO","author":"MacKenzie Philip","year":"2001","unstructured":"Philip MacKenzie and Michael\u00a0 K. Reiter . 2001. Two-Party Generation of DSA Signatures . In Advances in Cryptology \u2014 CRYPTO 2001 , Joe Kilian (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 137\u2013154. Philip MacKenzie and Michael\u00a0K. Reiter. 2001. Two-Party Generation of DSA Signatures. In Advances in Cryptology \u2014 CRYPTO 2001, Joe Kilian (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 137\u2013154."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0041-0"},{"volume-title":"Automated Cryptographic Analysis of the Pedersen Commitment Scheme","author":"Metere Roberto","key":"e_1_3_2_1_29_1","unstructured":"Roberto Metere and Changyu Dong . 2017. Automated Cryptographic Analysis of the Pedersen Commitment Scheme . In Computer Network Security, Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski (Eds.). Springer International Publishing , Cham , 275\u2013287. Roberto Metere and Changyu Dong. 2017. Automated Cryptographic Analysis of the Pedersen Commitment Scheme. In Computer Network Security, Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, and Krzysztof Szczypiorski (Eds.). Springer International Publishing, Cham, 275\u2013287."},{"key":"e_1_3_2_1_30_1","unstructured":"Eduardo Morais Tommy Koens Cees van Wijk and Aleksei Koren. 2019. A Survey on Zero Knowledge Range Proofs and Applications. ArXiv abs\/1907.06381(2019).  Eduardo Morais Tommy Koens Cees van Wijk and Aleksei Koren. 2019. A Survey on Zero Knowledge Range Proofs and Applications. ArXiv abs\/1907.06381(2019)."},{"key":"#cr-split#-e_1_3_2_1_31_1.1","doi-asserted-by":"crossref","unstructured":"Stefania\u00a0Loredana Nita and Marius\u00a0Iulian Mihailescu. 2022. Signature Schemes. Apress Berkeley CA 147-157. https:\/\/doi.org\/10.1007\/978-1-4842-8105-5_11 10.1007\/978-1-4842-8105-5_11","DOI":"10.1007\/978-1-4842-8105-5_11"},{"key":"#cr-split#-e_1_3_2_1_31_1.2","doi-asserted-by":"crossref","unstructured":"Stefania\u00a0Loredana Nita and Marius\u00a0Iulian Mihailescu. 2022. Signature Schemes. Apress Berkeley CA 147-157. https:\/\/doi.org\/10.1007\/978-1-4842-8105-5_11","DOI":"10.1007\/978-1-4842-8105-5_11"},{"volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"Paillier Pascal","key":"e_1_3_2_1_32_1","unstructured":"Pascal Paillier . 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes . In Advances in Cryptology \u2014 EUROCRYPT \u201999 , Jacques Stern (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 223\u2013238. Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology \u2014 EUROCRYPT \u201999, Jacques Stern (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 223\u2013238."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/bf00196725"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"volume-title":"Zero-knowledge proofs and applications","author":"Venturi Daniele","key":"e_1_3_2_1_35_1","unstructured":"Daniele Venturi . 2015. Zero-knowledge proofs and applications . University of Rome , Lecture Notes . Daniele Venturi. 2015. Zero-knowledge proofs and applications. University of Rome, Lecture Notes."},{"key":"e_1_3_2_1_36_1","unstructured":"Wikipedia. 2022. Commitment scheme. https:\/\/en.wikipedia.org\/wiki\/Commitment_scheme  Wikipedia. 2022. Commitment scheme. https:\/\/en.wikipedia.org\/wiki\/Commitment_scheme"},{"key":"e_1_3_2_1_37_1","unstructured":"Bitcoin Wikipedia. 2021. Transaction. https:\/\/en.bitcoin.it\/wiki\/Transaction Online accessed on 6\/16\/2022.  Bitcoin Wikipedia. 2021. Transaction. https:\/\/en.bitcoin.it\/wiki\/Transaction Online accessed on 6\/16\/2022."},{"key":"e_1_3_2_1_38_1","volume-title":"ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER.","author":"Wood Daniel\u00a0Davis","year":"2014","unstructured":"Daniel\u00a0Davis Wood . 2014 . ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER. Daniel\u00a0Davis Wood. 2014. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER."}],"event":{"name":"ACSW 2023: 2023 Australasian Computer Science Week","acronym":"ACSW 2023","location":"Melbourne VIC Australia"},"container-title":["2023 Australasian Computer Science Week"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579375.3579389","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579375.3579389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:40Z","timestamp":1750178800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579375.3579389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,30]]},"references-count":43,"alternative-id":["10.1145\/3579375.3579389","10.1145\/3579375"],"URL":"https:\/\/doi.org\/10.1145\/3579375.3579389","relation":{},"subject":[],"published":{"date-parts":[[2023,1,30]]},"assertion":[{"value":"2023-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}