{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:24:49Z","timestamp":1763018689924,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1943499"],"award-info":[{"award-number":["1943499"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3661142","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"336-352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Ratel: MPC-extensions for Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8900-6833","authenticated-orcid":false,"given":"Yunqi","family":"Li","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9222-4962","authenticated-orcid":false,"given":"Kyle","family":"Soska","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0750-6601","authenticated-orcid":false,"given":"Zhen","family":"Huang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6860-6423","authenticated-orcid":false,"given":"Sylvain","family":"Bellemare","sequence":"additional","affiliation":[{"name":"The Initiative for CryptoCurrencies and Contracts, New York City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6738-8142","authenticated-orcid":false,"given":"Mikerah","family":"Quintyne-Collins","sequence":"additional","affiliation":[{"name":"HashCloack Inc., Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0658-7774","authenticated-orcid":false,"given":"Lun","family":"Wang","sequence":"additional","affiliation":[{"name":"Google, Mountain View, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2597-443X","authenticated-orcid":false,"given":"Xiaoyuan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-6802","authenticated-orcid":false,"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9910-0292","authenticated-orcid":false,"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"0x. 2022. 0x: Powering the decentralized exchange of tokens on Ethereum. https:\/\/www.0x.org."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454074"},{"key":"e_1_3_2_2_3_1","unstructured":"Hayden Adams Noah Zinsmeister and Dan Robinson. 2020. Uniswap v2 Core."},{"key":"e_1_3_2_2_4_1","unstructured":"AirSwap. 2022. AirSwap: Peer-to-peer Token Trading DEX and Open Source Developer DAO. https:\/\/www.airswap.io."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0083"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896386"},{"key":"e_1_3_2_2_9_1","volume-title":"Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24--26, 2015, Proceedings 8. Springer, 163--180","author":"Armknecht Frederik","year":"2015","unstructured":"Frederik Armknecht, Ghassan O Karame, Avikarsha Mandal, Franck Youssef, and Erik Zenner. 2015. Ripple: Overview and outlook. In Trust and Trustworthy Computing: 8th International Conference, TRUST 2015, Heraklion, Greece, August 24--26, 2015, Proceedings 8. Springer, 163--180."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3398761.3398969"},{"key":"e_1_3_2_2_11_1","unstructured":"AWS. 2022. Amazon EC2 On-Demand Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383455.3422569"},{"key":"e_1_3_2_2_13_1","unstructured":"Bancor. 2022. Bancor V3 - Bancor V3 Technical Docs. https:\/\/docs.bancor.network\/about-bancor-network\/bancor-v3."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243801"},{"volume-title":"P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange","author":"Baum Carsten","key":"e_1_3_2_2_15_1","unstructured":"Carsten Baum, Bernardo David, and Tore Kasper Frederiksen. 2021. P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange. In Applied Cryptography and Network Security, Kazue Sako and Nils Ole Tippenhauer (Eds.). Springer International Publishing, Cham, 163--194."},{"key":"e_1_3_2_2_16_1","volume-title":"Bernardo David, and Tore Kasper Frederiksen.","author":"Baum Carsten","year":"2022","unstructured":"Carsten Baum, James Hsin yu Chiang, Bernardo David, and Tore Kasper Frederiksen. 2022. Eagle: Efficient Privacy Preserving Smart Contracts. Cryptology ePrint Archive, Paper 2022\/1435. https:\/\/eprint.iacr.org\/2022\/1435 https:\/\/eprint.iacr.org\/2022\/1435."},{"volume-title":"Advances in Cryptology --- CRYPTO '91","author":"Beaver Donald","key":"e_1_3_2_2_17_1","unstructured":"Donald Beaver. 1992. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology --- CRYPTO '91, Joan Feigenbaum (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 420--432."},{"volume-title":"Theory of Cryptography","author":"Benhamouda Fabrice","key":"e_1_3_2_2_18_1","unstructured":"Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, and Leonid Reyzin. 2020. Can a Public Blockchain Keep a Secret?. In Theory of Cryptography, Rafael Pass and Krzysztof Pietrzak (Eds.). Springer International Publishing, Cham, 260--290."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363221"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_2_21_1","volume-title":"Sharemind: A Framework for Fast Privacy-Preserving Computations. In Computer Security - ESORICS","author":"Bogdanov Dan","year":"2008","unstructured":"Dan Bogdanov, Sven Laur, and Jan Willemson. 2008. Sharemind: A Framework for Fast Privacy-Preserving Computations. In Computer Security - ESORICS 2008, Sushil Jajodia and Javier Lopez (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 192--206."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00050"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"volume-title":"Advances in Cryptology --- CRYPTO '97, Burton S","author":"Camenisch Jan","key":"e_1_3_2_2_24_1","unstructured":"Jan Camenisch and Markus Stadler. 1997. Efficient group signature schemes for large groups. In Advances in Cryptology --- CRYPTO '97, Burton S. Kaliski (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 410--424."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329809"},{"key":"e_1_3_2_2_26_1","unstructured":"BNB Smart Chain. 2018. BNB Smart Chain: A Parallel BNB Chain to Enable Smart Contracts. https:\/\/www.binance.org\/en\/smartChain."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_2"},{"key":"e_1_3_2_2_29_1","first-page":"754","article-title":"Fluid MPC: Secure Multiparty Computation with Dynamic Participants","volume":"2020","author":"Choudhuri Arka Rai","year":"2020","unstructured":"Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, and Gabriel Kaptchuk. 2020. Fluid MPC: Secure Multiparty Computation with Dynamic Participants. IACR Cryptol. ePrint Arch. 2020 (2020), 754.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_30_1","volume-title":"Manta: Privacy Preserving Decentralized Exchange. Cryptology ePrint Archive, Paper 2020\/1607. https:\/\/eprint.iacr.org\/2020\/1607 https:\/\/eprint.iacr.org\/2020\/1607.","author":"Chu Shumo","year":"2020","unstructured":"Shumo Chu, Qiudong Xia, and Zhenfei Zhang. 2020. Manta: Privacy Preserving Decentralized Exchange. Cryptology ePrint Archive, Paper 2020\/1607. https:\/\/eprint.iacr.org\/2020\/1607 https:\/\/eprint.iacr.org\/2020\/1607."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07689-3_31"},{"key":"e_1_3_2_2_32_1","unstructured":"CoinMarketCap. 2022. CoinMarketCap Total Cryptocurrency Market Cap. https:\/\/coinmarketcap.com\/charts\/."},{"volume-title":"Available and Resilient Private Computation on the Blockchain via MPC","author":"Cordi Christopher","key":"e_1_3_2_2_33_1","unstructured":"Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, and Nicholas Pattengale. 2022. Auditable, Available and Resilient Private Computation on the Blockchain via MPC. In Cyber Security, Cryptology, and Machine Learning, Shlomi Dolev, Jonathan Katz, and Amnon Meisels (Eds.). Springer International Publishing, Cham, 281--299."},{"key":"e_1_3_2_2_34_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016 (2016), 86.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_35_1","volume-title":"Smart, and Younes Talibi Alaoui","author":"da Gama Mariana Botelho","year":"2022","unstructured":"Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P. Smart, and Younes Talibi Alaoui. 2022. Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. In Financial Cryptography and Data Security, Ittay Eyal and Juan Garay (Eds.). Springer International Publishing, Cham, 20--37."},{"key":"e_1_3_2_2_36_1","volume-title":"PESCA: A Privacy-Enhancing Smart-Contract Architecture. Cryptology ePrint Archive, Paper 2022\/1119. https:\/\/eprint.iacr.org\/2022\/1119 https:\/\/eprint.iacr.org\/2022\/1119.","author":"Dai Wei","year":"2022","unstructured":"Wei Dai. 2022. PESCA: A Privacy-Enhancing Smart-Contract Architecture. Cryptology ePrint Archive, Paper 2022\/1119. https:\/\/eprint.iacr.org\/2022\/1119 https:\/\/eprint.iacr.org\/2022\/1119."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_2_38_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Dalskov Anders","year":"2021","unstructured":"Anders Dalskov, Daniel Escudero, and Marcel Keller. 2021. Fantastic four:{Honest-Majority}{Four-Party} secure computation with malicious security. In 30th USENIX Security Symposium (USENIX Security 21). 2183--2200."},{"key":"e_1_3_2_2_39_1","volume-title":"Advances in Cryptology - CRYPTO","author":"Damg\u00e5rd Ivan","year":"2007","unstructured":"Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2007. Scalable and Unconditionally Secure Multiparty Computation. In Advances in Cryptology - CRYPTO 2007, Alfred Menezes (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 572--590."},{"key":"e_1_3_2_2_40_1","unstructured":"Didem Demirag and Jeremy Clark. 2021. Absentia: Secure Multiparty Computation on Ethereum. In Financial Cryptography and Data Security. FC 2021 International Workshops Matthew Bernhard Andrea Bracciali Lewis Gudgeon Thomas Haines Ariah Klages-Mundt Shin'ichiro Matsuo Daniel Perez Massimiliano Sala and Sam Werner (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 381--396."},{"volume-title":"ABY-A framework for efficient mixed-protocol secure two-party computation","author":"Demmler Daniel","key":"e_1_3_2_2_41_1","unstructured":"Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation.. In NDSS. USENIX Association, San Diego, California, USA."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"DerivaDEX. 2021. Introduction to DerivaDEX Architecture. https:\/\/medium.com\/derivadex\/introduction-to-derivadex-architecture-1dac2910cd81.","DOI":"10.3366\/edinburgh\/9781474483018.003.0001"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Felix Engelmann Thomas Kerber Markulf Kohlweiss and Mikhail Volkhov. 2022. Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps. https:\/\/eprint.iacr.org\/2022\/1002 https:\/\/eprint.iacr.org\/2022\/1002.","DOI":"10.56553\/popets-2022-0120"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Felix Engelmann Lukas M\u00fcller Andreas Peter Frank Kargl and Christoph B\u00f6sch. 2021. SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges.","DOI":"10.2478\/popets-2021-0070"},{"key":"e_1_3_2_2_45_1","unstructured":"EtherDelta. 2022. EtherDelta. https:\/\/etherdelta.com."},{"volume-title":"Advances in Cryptology --- CRYPTO '98","author":"Fitzi Matthias","key":"e_1_3_2_2_46_1","unstructured":"Matthias Fitzi, Martin Hirt, and Ueli Maurer. 1998. Trading correctness for privacy in unconditional multi-party computation. In Advances in Cryptology --- CRYPTO '98, Hugo Krawczyk (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 121--136."},{"key":"e_1_3_2_2_47_1","unstructured":"Ethereum Foundation. 2021. Go Ethereum. https:\/\/github.com\/ethereum\/go-ethereum."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805505"},{"key":"e_1_3_2_2_49_1","volume-title":"Public-Key Cryptography - PKC","author":"Goyal Vipul","year":"2022","unstructured":"Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, and Yifan Song. 2022. Storing and Retrieving Secrets on a Blockchain. In Public-Key Cryptography - PKC 2022, Goichiro Hanaoka, Junji Shikata, and Yohei Watanabe (Eds.). Springer International Publishing, Cham, 252--282."},{"key":"e_1_3_2_2_50_1","volume-title":"2019 IEEE symposium on security and privacy (SP). IEEE, 1220--1237","author":"Hastings Marcella","year":"2019","unstructured":"Marcella Hastings, Brett Hemenway, Daniel Noble, and Steve Zdancewic. 2019. Sok: General purpose compilers for secure multi-party computation. In 2019 IEEE symposium on security and privacy (SP). IEEE, 1220--1237."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TR.1982.5221218","article-title":"Improved method of inclusion-exclusion applied to k-out-of-n systems","volume":"31","author":"Heidtmann Klaus D","year":"1982","unstructured":"Klaus D Heidtmann. 1982. Improved method of inclusion-exclusion applied to k-out-of-n systems. IEEE Transactions on Reliability 31, 1 (1982), 36--40.","journal-title":"IEEE Transactions on Reliability"},{"key":"e_1_3_2_2_52_1","unstructured":"IDEX. 2022. IDEX High-Performance Decentralized Exchange. https:\/\/docs.idex.io."},{"key":"e_1_3_2_2_53_1","unstructured":"Trader Joe. 2023. Trader Joe Decentralized Exchange. https:\/\/traderjoexyz.com"},{"key":"e_1_3_2_2_54_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S Matthew Weinberg, and Edward W Felten. 2018. Arbitrum: Scalable, private smart contracts. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, BALTIMORE, MD, USA, 1353--1370."},{"key":"e_1_3_2_2_55_1","volume-title":"Themis: Fast, Strong Order-Fairness in Byzantine Consensus. Cryptology ePrint Archive, Paper 2021\/1465. https:\/\/eprint.iacr.org\/2021\/1465 https:\/\/eprint.iacr.org\/2021\/1465.","author":"Kelkar Mahimna","year":"2021","unstructured":"Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, and Sreeram Kannan. 2021. Themis: Fast, Strong Order-Fairness in Byzantine Consensus. Cryptology ePrint Archive, Paper 2021\/1465. https:\/\/eprint.iacr.org\/2021\/1465 https:\/\/eprint.iacr.org\/2021\/1465."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF51468.2021.00002"},{"key":"e_1_3_2_2_59_1","unstructured":"Rami Khalil Arthur Gervais and Guillaume Felley. 2019. TEX - A Securely Scalable Trustless Exchange. Cryptology ePrint Archive Paper 2019\/265. https:\/\/eprint.iacr.org\/2019\/265 https:\/\/eprint.iacr.org\/2019\/265."},{"key":"e_1_3_2_2_60_1","volume-title":"2016 IEEE symposium on security and privacy (SP). IEEE, IEEE","author":"Kosba Ahmed","year":"2016","unstructured":"Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In 2016 IEEE symposium on security and privacy (SP). IEEE, IEEE, San Jose, CA, USA, 839--858."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423263"},{"key":"e_1_3_2_2_62_1","unstructured":"kyberswap. 2022. KyberSwap Docs. https:\/\/docs.kyberswap.com."},{"key":"e_1_3_2_2_63_1","volume-title":"Ratel: MPC-extensions for Smart Contracts. Cryptology ePrint Archive","author":"Li Yunqi","year":"2023","unstructured":"Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, and Andrew Miller. 2023. Ratel: MPC-extensions for Smart Contracts. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354238"},{"key":"e_1_3_2_2_65_1","unstructured":"MakerDAO. 2022. The Maker Protocol's Collateral Auction House (Liquidation System 2.0). https:\/\/docs.makerdao.com\/smart-contract-modules\/dog-and-clipper-detailed-documentation."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00028"},{"key":"e_1_3_2_2_68_1","unstructured":"matt adorjan. 2023. CloudPing - AWS Latency Monitoring. https:\/\/www.cloudping.co\/grid#"},{"key":"e_1_3_2_2_69_1","first-page":"1","article-title":"Automated market makers and decentralized exchanges: a DeFi primer","volume":"8","author":"Mohan Vijay","year":"2022","unstructured":"Vijay Mohan. 2022. Automated market makers and decentralized exchanges: a DeFi primer. Financial Innovation 8, 1 (2022), 1--48.","journal-title":"Financial Innovation"},{"key":"e_1_3_2_2_70_1","volume-title":"ai-Powering a Personal Wealth Movement","author":"Q.","year":"2022","unstructured":"Q. ai-Powering a Personal Wealth Movement. 2022. What Really Happened To LUNA Crypto? https:\/\/www.forbes.com\/sites\/qai\/2022\/09\/20\/what-really-happened-to-luna-crypto\/"},{"key":"e_1_3_2_2_71_1","unstructured":"Narasimha1997. 2023. aio-eth - Asynchronous JSON-RPC client for Ethereum. https:\/\/github.com\/Narasimha1997\/aio-eth"},{"volume-title":"Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading","author":"Ngo Chan Nam","key":"e_1_3_2_2_72_1","unstructured":"Chan Nam Ngo, Fabio Massacci, Florian Kerschbaum, and Julian Williams. 2021. Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading. In Financial Cryptography and Data Security, Nikita Borisov and Claudia Diaz (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 579--598."},{"volume-title":"Obscuro: Confidential Smart Contracts for Ethereum. https:\/\/whitepaper.obscu.ro\/assets\/images\/obscuro-whitepaper-0-9.pdf.","year":"2021","key":"e_1_3_2_2_73_1","unstructured":"obscuro. 2021. Obscuro: Confidential Smart Contracts for Ethereum. https:\/\/whitepaper.obscu.ro\/assets\/images\/obscuro-whitepaper-0-9.pdf."},{"key":"e_1_3_2_2_74_1","unstructured":"Partisia. 2021. MPC Techniques Series Part 10: MPC-as-a-Service --- the Partisia Blockchain Infrastructure. https:\/\/medium.com\/partisia-blockchain\/mpc-techniques-series-part-10-mpc-as-a-service-the-partisia-blockchain-infrastructure-9b4833e77965."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487811"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_3_2_2_78_1","unstructured":"SecretSwap. 2021. SecretSwap Update: AMM Rewards + Governance Token. https:\/\/scrt.network\/blog\/secretswap-update-amm-rewards-governance-token."},{"key":"e_1_3_2_2_79_1","unstructured":"Omer Shlomovits. 2020. White-City: A Framework For Massive MPC with Partial Synchrony and Partially Authenticated Channels. https:\/\/github.com\/ZenGo-X\/white-city\/blob\/master\/White-City-Report\/whitecity_new.pdf."},{"key":"e_1_3_2_2_81_1","volume-title":"2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, IEEE, SAN FRANCISCO, CA, & ONLINE, 1543--1543","author":"Steffen Samuel","year":"2022","unstructured":"Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, and Martin Vechev. 2022. ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, IEEE, SAN FRANCISCO, CA, & ONLINE, 1543--1543."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363222"},{"key":"e_1_3_2_2_83_1","unstructured":"SushiSwap. 2022. SushiSwap. https:\/\/dev.sushi.com\/docs\/intro."},{"key":"e_1_3_2_2_84_1","volume-title":"2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 1--3.","author":"Tanana Dmitry","year":"2019","unstructured":"Dmitry Tanana. 2019. Avalanche blockchain protocol for distributed computing security. In 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, 1--3."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406322"},{"key":"e_1_3_2_2_86_1","volume-title":"2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE","author":"Wohrer Maximilian","year":"2018","unstructured":"Maximilian Wohrer and Uwe Zdun. 2018. Smart contracts: security patterns in the ethereum ecosystem and solidity. In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE, Campobasso, Italy, 2--8."},{"key":"e_1_3_2_2_87_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_2_88_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Zhang Yunhao","year":"2020","unstructured":"Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, and Lorenzo Alvisi. 2020. Byzantine Ordered Consensus without Byzantine Oligarchy. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, virtual, 633--649. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/zhang-yunhao"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3661142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3661142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":86,"alternative-id":["10.1145\/3634737.3661142","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3661142","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}