{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:02Z","timestamp":1755974402565,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["JP22H03588"],"award-info":[{"award-number":["JP22H03588"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1145\/3651655.3651664","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:13:56Z","timestamp":1716999236000},"page":"35-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Toward Achieving Anonymous Non-Fungible Tokens in Trustless Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6431-2319","authenticated-orcid":false,"given":"Zhanwen","family":"Chen","sequence":"first","affiliation":[{"name":"University of Tsukuba, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-4454","authenticated-orcid":false,"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Japan and National Institute of Information and Communications Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00045"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_31"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228787"},{"key":"e_1_3_2_1_5_1","volume-title":"Eip-721: Erc-721 non-fungible token standard. Ethereum Improvement Proposals721","author":"Entriken William","year":"2018","unstructured":"William Entriken, Dieter Shirley, Jacob Evans, and Nastassia Sachs. 2018. Eip-721: Erc-721 non-fungible token standard. Ethereum Improvement Proposals721 (2018)."},{"key":"e_1_3_2_1_6_1","volume-title":"17th Annual International Cryptology Conference Santa Barbara, California, USA August 17\u201321, 1997 Proceedings 17","author":"Fujisaki Eiichiro","year":"1997","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. 1997. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology\u2014CRYPTO\u201997: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17\u201321, 1997 Proceedings 17. Springer, 16\u201330."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3205428"},{"key":"e_1_3_2_1_8_1","unstructured":"V\u00edctor Gayoso\u00a0Mart\u00ednez Luis Hern\u00e1ndez\u00a0Encinas and Carmen S\u00e1nchez\u00a0\u00c1vila. 2010. A survey of the elliptic curve integrated encryption scheme. (2010)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_10_1","first-page":"220","article-title":"Zcash protocol specification. GitHub: San Francisco","volume":"4","author":"Hopwood Daira","year":"2016","unstructured":"Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2016. Zcash protocol specification. GitHub: San Francisco, CA, USA 4 (2016), 220.","journal-title":"CA, USA"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Intel software guard extensions: EPID provisioning and attestation services","volume":"1","author":"Johnson Simon","year":"2016","unstructured":"Simon Johnson, Vinnie Scarlata, Carlos Rozas, Ernie Brickell, and Frank Mckeen. 2016. Intel software guard extensions: EPID provisioning and attestation services. White Paper 1, 1-10 (2016), 119.","journal-title":"White Paper"},{"key":"e_1_3_2_1_12_1","unstructured":"Valdi Kamenarov. 2021. Ethereum meta-transactions 101. https:\/\/medium.com\/coinmonks\/ethereum-meta-transactions-101-de7f91884a06"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"e_1_3_2_1_14_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260. https:\/\/bitcoin.org\/en\/bitcoin-paper"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.34"},{"volume-title":"Annual international cryptology conference","author":"Pedersen Torben\u00a0Pryds","key":"e_1_3_2_1_16_1","unstructured":"Torben\u00a0Pryds Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Annual international cryptology conference. Springer, 129\u2013140."},{"volume-title":"An efficient range proof scheme. In 2010 IEEE second international conference on social computing","author":"Peng Kun","key":"e_1_3_2_1_17_1","unstructured":"Kun Peng and Feng Bao. 2010. An efficient range proof scheme. In 2010 IEEE second international conference on social computing. IEEE, 826\u2013833."},{"key":"e_1_3_2_1_18_1","unstructured":"Nansen Team. 2022. NFT Statistics 2023: Sales Trends Market Cap and More. https:\/\/www.nansen.ai\/guides\/nft-statistics-2022"},{"key":"e_1_3_2_1_19_1","volume-title":"Blockchain Privacy Protection Algorithm Based on Pedersen Commitment and Zero-knowledge Proof. In 2021 4th International Conference on Blockchain Technology and Applications. 1\u20135.","author":"Wang Haifeng","year":"2021","unstructured":"Haifeng Wang and Junguo Liao. 2021. Blockchain Privacy Protection Algorithm Based on Pedersen Commitment and Zero-knowledge Proof. In 2021 4th International Conference on Blockchain Technology and Applications. 1\u20135."},{"key":"e_1_3_2_1_20_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1\u201332."}],"event":{"name":"ICBTA 2023: 2023 6th International Conference on Blockchain Technology and Applications","acronym":"ICBTA 2023","location":"Xi'an China"},"container-title":["Proceedings of the 2023 6th International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651655.3651664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651655.3651664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:12:42Z","timestamp":1755972762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651655.3651664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":20,"alternative-id":["10.1145\/3651655.3651664","10.1145\/3651655"],"URL":"https:\/\/doi.org\/10.1145\/3651655.3651664","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}