{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T04:20:49Z","timestamp":1777090849366,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3603216.3624952","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:38:42Z","timestamp":1700703522000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Zef: Low-latency, Scalable, Private Payments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9031-786X","authenticated-orcid":false,"given":"Mathieu","family":"Baudet","sequence":"first","affiliation":[{"name":"Linera, San Francisco, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5337-4741","authenticated-orcid":false,"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[{"name":"MystenLabs &amp; University College London, London, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4268-4681","authenticated-orcid":false,"given":"Mahimna","family":"Kelkar","sequence":"additional","affiliation":[{"name":"Cornell University, New York, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8923-4860","authenticated-orcid":false,"given":"George","family":"Danezis","sequence":"additional","affiliation":[{"name":"MystenLabs &amp; University College London, London, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. https:\/\/explorer.zcha.in\/statistics\/usage."},{"key":"e_1_3_2_1_2_1","unstructured":"Alphazero. 2022. What Is The Fastest Blockchain And Why? Analysis of 43 Blockchains. https:\/\/alephzero.org\/blog\/what-is-the-fastest-blockchain-andwhy-analysis-of-43-blockchains."},{"key":"e_1_3_2_1_3_1","unstructured":"Adam Back Matt Corallo Luke Dashjr Mark Friedenbach Gregory Maxwell Andrew K. Miller A. Poelstra Jorge Tim\u00f3n and Pieter Wuille. 2014. Enabling Blockchain Innovations with Pegged Sidechains."},{"key":"e_1_3_2_1_4_1","volume-title":"Twins: BFT Systems Made Robust. In Principles of Distributed Systems.","author":"Bano Shehar","year":"2021","unstructured":"Shehar Bano, Alberto Sonnino, Andrey Chursin, Dmitri Perelman, and Dahlia Malkhi. 2021. Twins: BFT Systems Made Robust. In Principles of Distributed Systems."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Mathieu Baudet George Danezis and Alberto Sonnino. 2020. FastPay: HighPerformance Byzantine Fault Tolerant Settlement. In ACM AFT. 163--177.","DOI":"10.1145\/3419614.3423249"},{"key":"e_1_3_2_1_6_1","volume-title":"Technology diffusion within central banking: the case of real-time gross settlement. FRB of New York Staff Report","author":"Bech Morten L","year":"2006","unstructured":"Morten L Bech and Bart Hobijn. 2006. Technology diffusion within central banking: the case of real-time gross settlement. FRB of New York Staff Report (2006)."},{"key":"e_1_3_2_1_7_1","volume-title":"Zerocash: Decentralized Anonymous Payments from Bitcoin","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In IEEE SP. 459--474."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Christian Cachin Klaus Kursawe and Victor Shoup. 2000. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography. In PODC. 123--132.","DOI":"10.1145\/343477.343531"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch Susan Hohenberger and Anna Lysyanskaya. 2005. In EUROCRYPT. 302--321.","DOI":"10.1007\/11426639_18"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"David Chaum. 1982. In CRYPTO. 199--203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"e_1_3_2_1_13_1","volume-title":"Alberto Sonnino, and Alexander Spiegelman.","author":"Danezis George","year":"2021","unstructured":"George Danezis, Eleftherios Kokoris Kogias, Alberto Sonnino, and Alexander Spiegelman. 2021. Narwhal and Tusk: A DAG-based Mempool and Efficient BFT Consensus. arXiv preprint arXiv:2105.11827 (2021)."},{"key":"e_1_3_2_1_14_1","unstructured":"H. de Valence J. Grigg G. Tankersley F. Valsorda and I. Lovecruft. 2022. The ristretto255 Group. http:\/\/www.watersprings.org\/pub\/id\/draft-hdevalence-cfrgristretto-00.html."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_16_1","volume-title":"Theory and Application of Cryptographic Techniques","author":"Fiat Amos","unstructured":"Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Theory and Application of Cryptographic Techniques. Springer, 186--194."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"e_1_3_2_1_18_1","unstructured":"George Kappos Haaroon Yousaf Mary Maller and Sarah Meiklejohn. 2018. An Empirical Analysis of Anonymity in Zcash. In USENIX Security. 463--477."},{"key":"e_1_3_2_1_19_1","volume-title":"Charles Edwin Killian, and Cristina Nita-Rotaru","author":"Lee Hyojeong","year":"2014","unstructured":"Hyojeong Lee, Jeff Seibert, Md. Endadul Hoque, Charles Edwin Killian, and Cristina Nita-Rotaru. 2014. Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations. In ICDCS. IEEE Computer Society, 660--669."},{"key":"e_1_3_2_1_20_1","volume-title":"International Workshop on Selected Areas in Cryptography. Springer, 184--199","author":"Lysyanskaya Anna","year":"1999","unstructured":"Anna Lysyanskaya, Ronald L Rivest, Amit Sahai, and Stefan Wolf. 1999. Pseudonym systems. In International Workshop on Selected Areas in Cryptography. Springer, 184--199."},{"key":"e_1_3_2_1_21_1","volume-title":"Rubin","author":"Miers Ian","year":"2013","unstructured":"Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In IEEE SP. 397--411."},{"key":"e_1_3_2_1_22_1","unstructured":"Monero. 2014. Monero. https:\/\/www.getmonero.org."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"David Pointcheval and Olivier Sanders. 2016. Short Randomizable Signatures. In CT-RSA. 116--126.","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"e_1_3_2_1_25_1","volume-title":"The Bitcoin lightning network. Scalable o-chain instant payments","author":"Poon Joseph","year":"2015","unstructured":"Joseph Poon and Thaddeus Dryja. 2015. The Bitcoin lightning network. Scalable o-chain instant payments (2015)."},{"key":"e_1_3_2_1_26_1","volume-title":"Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance. Cryptology ePrint Archive","author":"Rial Alfredo","year":"2022","unstructured":"Alfredo Rial and Ania M Piotrowska. 2022. Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Tomas Sander and Amnon Ta-Shma. 1999. In CRYPTO. 555--572.","DOI":"10.1007\/3-540-48405-1_35"},{"key":"e_1_3_2_1_28_1","volume-title":"Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers. In NDSS.","author":"Sonnino Alberto","year":"2019","unstructured":"Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, and George Danezis. 2019. Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers. In NDSS."},{"key":"e_1_3_2_1_29_1","volume-title":"Mir-BFT: High-Throughput Robust BFT for Decentralized Networks. arXiv preprint arXiv:1906.05552","author":"Stathakopoulou Chrysoula","year":"2019","unstructured":"Chrysoula Stathakopoulou, Tudor David, Matej Pavlovic, and Marko Vukoli?. 2019. Mir-BFT: High-Throughput Robust BFT for Decentralized Networks. arXiv preprint arXiv:1906.05552 (2019)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Brent Waters. 2005. Efficient identity-based encryption without random oracles. In EUROCRYPT. 114--127.","DOI":"10.1007\/11426639_7"},{"key":"e_1_3_2_1_31_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014), 1--32."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_33_1","unstructured":"S. Yonezawa Lepidum S. Chikara NTT TechnoCross T. Kobayashi and T. Saito. 2022. Pairing-Friendly Curves. https:\/\/tools.ietf.org\/id\/draft-yonezawa-pairingfriendly-curves-00.html."},{"key":"e_1_3_2_1_34_1","unstructured":"ZCash. 2016. ZCash. https:\/\/z.cash."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:10Z","timestamp":1750286950000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":34,"alternative-id":["10.1145\/3603216.3624952","10.1145\/3603216"],"URL":"https:\/\/doi.org\/10.1145\/3603216.3624952","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}