{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:29Z","timestamp":1755907529576,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1704615, CNS-1933655, CNS-2112751"],"award-info":[{"award-number":["CNS-1704615, CNS-1933655, CNS-2112751"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690273","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2415-2429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-4268-4681","authenticated-orcid":false,"given":"Mahimna","family":"Kelkar","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6776-5273","authenticated-orcid":false,"given":"Kushal","family":"Babel","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6152-2713","authenticated-orcid":false,"given":"Philip","family":"Daian","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5790-1082","authenticated-orcid":false,"given":"James","family":"Austgen","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2715-5600","authenticated-orcid":false,"given":"Vitalik","family":"Buterin","sequence":"additional","affiliation":[{"name":"Ethereum Foundation, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1143-5504","authenticated-orcid":false,"given":"Ari","family":"Juels","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Intel Enhanced Privacy ID (EPID) Security Technology. https:\/\/intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-enhancedprivacy- id-epid-security-technology.html."},{"key":"e_1_3_2_1_2_1","unstructured":"[Accessed Dec. 2022]. Ethereum Consensus Notes. https:\/\/eth2book.info\/ bellatrix\/part2\/building_blocks\/randomness\/."},{"key":"e_1_3_2_1_3_1","unstructured":"[Accessed Dec. 2022]. Stratum mining protocol. https:\/\/en.bitcoin.it\/wiki\/ Stratum_mining_protocol."},{"key":"e_1_3_2_1_4_1","unstructured":"[Accessed June 2022]. Oasis Labs website. https:\/\/www.oasislabs.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Amazon Web Services. [Accessed Nov. 2022]. AWS Nitro Enclaves website. https:\/\/aws.amazon.com\/ec2\/nitro\/nitro-enclaves\/."},{"key":"e_1_3_2_1_6_1","volume-title":"AMD SEV-SNP: Strengthening VM isolation with integrity protection and more. White Paper","author":"AMD.","year":"2020","unstructured":"AMD. 2020. AMD SEV-SNP: Strengthening VM isolation with integrity protection and more. White Paper (2020)."},{"key":"e_1_3_2_1_7_1","unstructured":"Ittai Anati Shay Gueron Simon Johnson and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In HASP. 7."},{"key":"e_1_3_2_1_8_1","unstructured":"Android Open Source Project. [Accessed Nov. 2022]. Android Open Source Project: Key and ID Attestation. https:\/\/source.android.com\/docs\/security\/ features\/keystore\/attestation."},{"key":"e_1_3_2_1_9_1","unstructured":"Apple Inc. [Accessed Nov. 2022]. Apple Developer Website: Establishing your app's integrity. https:\/\/developer.apple.com\/documentation\/devicecheck\/ establishing_your_app_s_integrity."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Giuseppe Ateniese Jan Camenisch Marc Joye and Gene Tsudik. 2000. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO. 255-- 270.","DOI":"10.1007\/3-540-44598-6_16"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Josh Benaloh and Dwight Tuinstra. 1994. Receipt-free secret-ballot elections. In STOC. 544--553.","DOI":"10.1145\/195058.195407"},{"key":"e_1_3_2_1_12_1","unstructured":"Bitmain. 11 Feb. 2022. Specifications of T19\/S19 Liquid-Cooling Miner. https:\/\/support.bitmain.com\/hc\/en-us\/articles\/4418373232153-Specificationsof- T19-S19-Liquid-Cooling-Miner."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Joseph Bonneau Benedikt B\u00fcnz and Ben Fisch. 2018. Verifiable Delay Functions. In CRYPTO. 757--788.","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Nikita Borisov Ian Goldberg and Eric Brewer. 2004. Off-the-record communication or why not to use PGP. In WPES. 77--84.","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_15_1","unstructured":"Pietro Borrello Andreas Kogler Martin Schwarzl Moritz Lipp Daniel Gruss and Michael Schwarz. 2022. \u00c6PIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. In USENIX Security. 3917--3934."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"John Brainard Ari Juels Ronald L Rivest Michael Szydlo and Moti Yung. 2006. Fourth-factor authentication: somebody you know. In CCS. 168--178.","DOI":"10.1145\/1180405.1180427"},{"key":"e_1_3_2_1_17_1","volume-title":"Bulletproofs: Short proofs for confidential transactions and more","author":"B\u00fcnz Benedikt","year":"2018","unstructured":"Benedikt B\u00fcnz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, PieterWuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In IEEE S&P. 315--334."},{"key":"e_1_3_2_1_18_1","unstructured":"V. Buterin. 11 Jan 2021. Why we need wide adoption of social recovery wallets. vitalik.ca blog post at https:\/\/vitalik.ca\/general\/2021\/01\/11\/recovery.html."},{"key":"e_1_3_2_1_19_1","unstructured":"V. Buterin. 2 May 2019. Minimal anti-collusion infrastructure (MACI). Ethereum Research blog post at https:\/\/ethresear.ch\/t\/minimal-anti-collusioninfrastructure\/ 5413."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti. 2001. Universally composable security: A new paradigm for cryptographic protocols. In FOCS. 136--145.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti Yevgeniy Dodis Rafael Pass and Shabsi Walfish. 2007. Universally Composable Security with Global Setup. In TCC. 61--85.","DOI":"10.1007\/978-3-540-70936-7_4"},{"key":"e_1_3_2_1_22_1","volume-title":"Peter YA Ryan, and Steve Schneider","author":"Chaum David","year":"2005","unstructured":"David Chaum, Peter YA Ryan, and Steve Schneider. 2005. A practical voterverifiable election scheme. In ESORICS. 118--139."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Benny Chor Amos Fiat and Moni Naor. 1994. Tracing Traitors. In CRYPTO. 257--270.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"e_1_3_2_1_25_1","volume-title":"Selections: Internet voting with overthe- shoulder coercion-resistance. In FC. 47--61.","author":"Clark Jeremy","year":"2011","unstructured":"Jeremy Clark and Urs Hengartner. 2011. Selections: Internet voting with overthe- shoulder coercion-resistance. In FC. 47--61."},{"key":"e_1_3_2_1_26_1","volume-title":"Civitas: Toward a secure voting system","author":"Clarkson Michael R","year":"2008","unstructured":"Michael R Clarkson, Stephen Chong, and Andrew C Myers. 2008. Civitas: Toward a secure voting system. In IEEE S&P. 354--368."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Katriel Cohn-Gordon Cas Cremers Benjamin Dowling Luke Garratt and Douglas Stebila. 2017. A formal security analysis of the Signal messaging protocol. In EuroS&P. 451--466.","DOI":"10.1109\/EuroSP.2017.27"},{"key":"e_1_3_2_1_28_1","unstructured":"Philip Daian Tyler Kell Ian Miers and Ari Juels. 2018. On-Chain Vote Buying and the Rise of Dark DAOs. https:\/\/hackingdistributed.com\/2018\/07\/02\/on-chainvote- buying\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Mario Di Raimondo Rosario Gennaro and Hugo Krawczyk. 2006. Deniable authentication and key exchange. In CCS. 400--409.","DOI":"10.1145\/1180405.1180454"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In CRYPTO. 139--147.","DOI":"10.1007\/3-540-48071-4_10"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Stefan Dziembowski Sebastian Faust and Tomasz Lizurej. 2023. Individual Cryptography. In CRYPTO. 547--579.","DOI":"10.1007\/978-3-031-38545-2_18"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"e_1_3_2_1_33_1","volume-title":"Royalty-Free Sudoswap Is Finding Favor With NFT Traders. The Defiant (13","author":"Fernau O.","year":"2022","unstructured":"O. Fernau. 13 Aug. 2022. Royalty-Free Sudoswap Is Finding Favor With NFT Traders. The Defiant (13 Aug. 2022)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Marc Fischlin. 2005. Communication-efficient non-interactive proofs of knowledge with online extractors. In CRYPTO. 152--168.","DOI":"10.1007\/11535218_10"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"O. Goldreich S. Micali and A. Wigderson. 1987. How to Play ANY Mental Game. In STOC. 218--229.","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Shafi Goldwasser Silvio Micali and Charles Rackoff. 1985. The knowledge complexity of interactive proof systems. In STOC. 291--304.","DOI":"10.1145\/22145.22178"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0051"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure information networks. 258--272.","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"e_1_3_2_1_39_1","volume-title":"Release Announcement: MACI 1.0. Medium Post at https:\/\/medium.com\/privacy-scaling-explorations\/release-announcementmaci- 1-0-c032bddd2157.","author":"Jie K. Wei","year":"2021","unstructured":"K. Wei Jie. 12 Oct. 2021. Release Announcement: MACI 1.0. Medium Post at https:\/\/medium.com\/privacy-scaling-explorations\/release-announcementmaci- 1-0-c032bddd2157."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Ari Juels Dario Catalano and Markus Jakobsson. 2005. Coercion-resistant electronic elections. In WPES. 61--70.","DOI":"10.1145\/1102199.1102213"},{"key":"e_1_3_2_1_41_1","volume-title":"Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. Cryptology ePrint Archive, Paper 2023\/044.","author":"Kelkar Mahimna","year":"2023","unstructured":"Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, and Ari Juels. 2023. Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. Cryptology ePrint Archive, Paper 2023\/044."},{"key":"e_1_3_2_1_42_1","volume-title":"SoK: Blockchain Governance. arXiv preprint 2201.07188","author":"Kiayias Aggelos","year":"2022","unstructured":"Aggelos Kiayias and Philip Lazos. 2022. SoK: Blockchain Governance. arXiv preprint 2201.07188 (2022)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Aggelos Kiayias and Qiang Tang. 2013. How to Keep a Secret: Leakage Deterring Public-key Cryptosystems. In CCS. 943--954.","DOI":"10.1145\/2508859.2516691"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Yashvanth Kondi and abhi shelat. 2022. Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation. In ASIACRYPT. 279--309.","DOI":"10.1007\/978-3-031-22966-4_10"},{"key":"e_1_3_2_1_45_1","unstructured":"Wouter Lueks I\u00f1igo Querejeta-Azurmendi and Carmela Troncoso. 2020. VoteAgain: A scalable coercion-resistant voting system. In USENIX Security. 1553--1570."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Patrick McCorry Siamak F Shahandashti and Feng Hao. 2017. A smart contract for boardroom voting with maximum voter privacy. In FC. 357--375.","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Ittai Anati Dror Caspi Simon Johnson Rebekah Leslie-Hurd and Carlos Rozas. 2016. Intel\u00ae software guard extensions (Intel\u00ae SGX) support for dynamic memory management inside an enclave. In HASP. 1--9.","DOI":"10.1145\/2948618.2954331"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Frank McKeen Ilya Alexandrovich Alex Berenzon Carlos V Rozas Hisham Shafi Vedvyas Shanbhogue and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In HASP. 10.","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Rafael Pass. 2003. On deniability in the common reference string and random oracle model. In CRYPTO. 316--337.","DOI":"10.1007\/978-3-540-45146-4_19"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Rafael Pass Elaine Shi and Florian Tram\u00e8r. 2017. Formal Abstractions for Attested Execution Secure Processors. In EUROCRYPT. 260--289.","DOI":"10.1007\/978-3-319-56620-7_10"},{"key":"e_1_3_2_1_51_1","unstructured":"Rafael Nat Josef Pass. 2006. A precise computational approach to knowledge. Ph.D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012581"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_1_54_1","volume-title":"TEEvil: Identity Lease via Trusted Execution Environments. arXiv preprint","author":"Puddu Ivan","year":"1903","unstructured":"Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, and Srdjan Capkun. 2019. TEEvil: Identity Lease via Trusted Execution Environments. arXiv preprint 1903.00449 (2019)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Charles Rackoff and Daniel R Simon. 1991. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In CRYPTO. 433--444.","DOI":"10.1007\/3-540-46766-1_35"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Amit Sahai. 1999. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In FOCS. 543--553.","DOI":"10.1109\/SFFCS.1999.814628"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Claus-Peter Schnorr. 1989. Efficient identification and signatures for smart cards. In CRYPTO. 239--252.","DOI":"10.1007\/0-387-34805-0_22"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_59_1","unstructured":"Signal. [n. d.]. https:\/\/signal.org."},{"key":"e_1_3_2_1_60_1","volume-title":"Joseph K Liu, and Tsz Hon Yuen.","author":"Sun Shi-Feng","year":"2017","unstructured":"Shi-Feng Sun, Man Ho Au, Joseph K Liu, and Tsz Hon Yuen. 2017. RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In ESORICS. 456--474."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571056"},{"key":"e_1_3_2_1_62_1","volume-title":"Fractional NFTs: The Good, the Bad, and the Weird. NFT Now (26","author":"Thomas Langston","year":"2022","unstructured":"Langston Thomas. 26 Apr. 2022. Fractional NFTs: The Good, the Bad, and the Weird. NFT Now (26 Apr. 2022)."},{"key":"e_1_3_2_1_63_1","volume-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In USENIX Security. 991--1008.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In USENIX Security. 991--1008."},{"key":"e_1_3_2_1_64_1","unstructured":"Stephan van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX fails in practice. https:\/\/sgaxe.com\/files\/SGAxe.pdf."},{"key":"e_1_3_2_1_65_1","volume-title":"NFTs and compliance: Why we need to be having this conversation. Cointelegraph (21","author":"Weinberg Joseph","year":"2022","unstructured":"Joseph Weinberg. 21 Jan. 2022. NFTs and compliance: Why we need to be having this conversation. Cointelegraph (21 Jan. 2022)."},{"key":"e_1_3_2_1_66_1","volume-title":"Decentralized Society: Finding Web3's Soul. Available at SSRN 4105763","author":"Weyl E Glen","year":"2022","unstructured":"E Glen Weyl, Puja Ohlhaver, and Vitalik Buterin. 2022. Decentralized Society: Finding Web3's Soul. Available at SSRN 4105763 (2022)."},{"key":"e_1_3_2_1_67_1","unstructured":"Andrew C Yao. 1982. Protocols for secure computations. In FOCS. 160--164."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690273","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:19:11Z","timestamp":1755843551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":67,"alternative-id":["10.1145\/3658644.3690273","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690273","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}