{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:01:05Z","timestamp":1777964465768,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690356","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3182-3196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3296-5336","authenticated-orcid":false,"given":"Foteini","family":"Baldimtsi","sequence":"first","affiliation":[{"name":"Mysten Labs &amp; George Mason University, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3252-9975","authenticated-orcid":false,"given":"Konstantinos Kryptos","family":"Chalkias","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9448-2164","authenticated-orcid":false,"given":"Yan","family":"Ji","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1989-3019","authenticated-orcid":false,"given":"Jonas","family":"Lindstr\u00f8m","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5324-6889","authenticated-orcid":false,"given":"Deepak","family":"Maram","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2192-1905","authenticated-orcid":false,"given":"Ben","family":"Riva","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3770-9982","authenticated-orcid":false,"given":"Arnab","family":"Roy","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1507-6927","authenticated-orcid":false,"given":"Mahdi","family":"Sedaghat","sequence":"additional","affiliation":[{"name":"COSIC, KU Leuven, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9002-3191","authenticated-orcid":false,"given":"Joy","family":"Wang","sequence":"additional","affiliation":[{"name":"Mysten Labs, Palo Alto, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang.","author":"Baldimtsi Foteini","year":"2024","unstructured":"Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang. 2024. zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. arxiv: 2401.11735 [cs.CR] https:\/\/arxiv.org\/abs\/2401.11735"},{"key":"e_1_3_2_1_2_1","volume-title":"Albert Rubio, and Jordi Baylina.","author":"Marta","year":"2022","unstructured":"Marta Bell\u00e9s-Mu noz, Miguel Isabel, Jose Luis Mu noz-Tapia, Albert Rubio, and Jordi Baylina. 2022. Circom: A Circuit Description Language for Building Zero-knowledge Applications. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_3_1","unstructured":"Eli Ben-Sasson Iddo Bentov Yinon Horesh and Michael Riabzev. 2018. Scalable transparent and post-quantum secure computational integrity. Cryptology ePrint Archive Report 2018\/046. https:\/\/eprint.iacr.org\/2018\/046."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Sam Blackshear Andrey Chursin George Danezis Anastasios Kichidis Lefteris Kokoris-Kogias Xun Li Mark Logan Ashok Menon Todd Nowacki Alberto Sonnino et al. 2023. Sui lutris: A blockchain combining broadcast and consensus. arXiv preprint arXiv:2310.18042 (2023).","DOI":"10.1145\/3658644.3670286"},{"key":"e_1_3_2_1_5_1","volume-title":"C2PA Technical Specification. https:\/\/c2pa.org\/specifications\/specifications\/1.4\/specs\/C2PA_Specification.html#_trust_model Accessed: [Nov 29","author":"Content Credentials PA.","year":"2023","unstructured":"C2PA. 2023. Content Credentials : C2PA Technical Specification. https:\/\/c2pa.org\/specifications\/specifications\/1.4\/specs\/C2PA_Specification.html#_trust_model Accessed: [Nov 29, 2023]."},{"key":"e_1_3_2_1_6_1","unstructured":"Tim Carstens and Hans Martin. 2023. Bridging Web2 and Web3 with Bonsai Pay: A Bonsai-powered Demo Application. https:\/\/www.risczero.com\/blog\/bonsai-pay."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--45721--1_26"},{"key":"e_1_3_2_1_9_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chiesa Alessandro","year":"2023","unstructured":"Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, and Yinuo Zhang. 2023. Eos: Efficient Private Delegation of zkSNARK Provers. In 32nd USENIX Security Symposium (USENIX Security 23). 6453--6469."},{"key":"e_1_3_2_1_10_1","unstructured":"Damian. 2024. Oauth-controlled Blockchain accounts | Near Documentation. https:\/\/docs.near.org\/blog\/chain-signatures-use-cases."},{"key":"e_1_3_2_1_11_1","volume-title":"PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. Cryptology ePrint Archive, Report 2019\/953. https:\/\/eprint.iacr.org\/2019\/953.","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon, Zachary J. Williamson, and Oana Ciobotaru. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. Cryptology ePrint Archive, Report 2019\/953. https:\/\/eprint.iacr.org\/2019\/953."},{"key":"e_1_3_2_1_12_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Garg Sanjam","year":"2023","unstructured":"Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, and Sruthi Sekar. 2023. zkSaaS: Zero-Knowledge SNARKs as a Service. In 32nd USENIX Security Symposium (USENIX Security 23). 4427--4444."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"e_1_3_2_1_14_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Grassi Lorenzo","year":"2021","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A new hash function for Zero-Knowledge proof systems. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--49896--5_11"},{"key":"e_1_3_2_1_16_1","unstructured":"Ulrich Hab\u00f6ck. 2022. Multivariate lookups based on logarithmic derivatives. Cryptology ePrint Archive Paper 2022\/1530. https:\/\/eprint.iacr.org\/2022\/1530."},{"key":"e_1_3_2_1_17_1","unstructured":"Christie Harkin. 2021. Mt. Gox Rehabilitation Plan Worth Billions in Compensation Approved Finalization to Follow. CoinDesk."},{"key":"e_1_3_2_1_18_1","unstructured":"Ethan Heilman Lucie Mugnier Athanasios Filippidis Sharon Goldberg Sebastien Lipman Yuval Marcus Mike Milano Sidhartha Premkumar and Chad Unrein. 2023. OpenPubkey: Augmenting OpenID Connect with User held Signing Keys. Cryptology ePrint Archive Report 2023\/296. https:\/\/eprint.iacr.org\/2023\/296."},{"key":"e_1_3_2_1_19_1","unstructured":"K. Huang. 2022. Why Did FTX Collapse\" Here\"s What to Know. The New York Times. https:\/\/www.nytimes.com\/2022\/11\/10\/technology\/ftx-binance-crypto-explained.html"},{"key":"e_1_3_2_1_20_1","unstructured":"iden3. 2023. rapidsnark. https:\/\/github.com\/iden3\/rapidsnark."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"M. Jones. 2015. JSON Web Algorithms (JWA) Section 3. RFC 7518. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/rfc7518#section-3 Section 3.","DOI":"10.17487\/RFC7518"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352617"},{"key":"e_1_3_2_1_25_1","unstructured":"Leona Lassak Elleen Pan Blase Ur and Maximilian Golla. 2024. Why Aren\"t We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication. (2024)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00038"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00038"},{"key":"e_1_3_2_1_28_1","volume-title":"Gerald Cotten and Quadriga: Unraveling Crypto?s Biggest Mystery. https:\/\/www.coindesk.com\/markets\/2021\/06\/29\/gerald-cotten-and-quadriga-unraveling-cryptos-biggest-mystery\/ Accessed","author":"Morris David Z.","year":"2023","unstructured":"David Z. Morris. 2021. Gerald Cotten and Quadriga: Unraveling Crypto?s Biggest Mystery. https:\/\/www.coindesk.com\/markets\/2021\/06\/29\/gerald-cotten-and-quadriga-unraveling-cryptos-biggest-mystery\/ Accessed: Oct 27, 2023."},{"key":"e_1_3_2_1_29_1","volume-title":"Pegah Nikbakht Bideh, and Joakim Brorsson","author":"Nilsson Alexander","year":"2020","unstructured":"Alexander Nilsson, Pegah Nikbakht Bideh, and Joakim Brorsson. 2020. A survey of published attacks on Intel SGX. arXiv preprint arXiv:2006.13598 (2020)."},{"key":"e_1_3_2_1_30_1","unstructured":"Santiago Palladino. 2019. Sign in with Google to your Identity Contract. https:\/\/forum.openzeppelin.com\/t\/sign-in-with-google-to-your-identity-contract-for-fun-and-profit\/1631"},{"key":"e_1_3_2_1_31_1","volume-title":"Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, and Soo-Mook Moon.","author":"Park Sanghyeon","year":"2023","unstructured":"Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, and Soo-Mook Moon. 2023. Beyond the Blockchain Address: Zero-Knowledge Address Abstraction. Cryptology ePrint Archive, Report 2023\/191. https:\/\/eprint.iacr.org\/2023\/191."},{"key":"e_1_3_2_1_32_1","volume-title":"The Big News Behind the BTC-e Arrest and Mt Gox Connection. https:\/\/www.coindesk.com\/markets\/2017\/07\/26\/the-big-news-behind-the-btc-e-arrest-and-mt-gox-connection\/ Accessed","author":"Rizzo Pete","year":"2023","unstructured":"Pete Rizzo. 2017. The Big News Behind the BTC-e Arrest and Mt Gox Connection. https:\/\/www.coindesk.com\/markets\/2017\/07\/26\/the-big-news-behind-the-btc-e-arrest-and-mt-gox-connection\/ Accessed: Oct 27, 2023."},{"key":"e_1_3_2_1_33_1","unstructured":"Jeff John Roberts. 2024. Old Bitcoin wallets keep waking up: How many of the 1.8 million \"lost\" coins are really gone? https:\/\/fortune.com\/crypto\/2024\/04\/24\/bitcoin-wallets-waking-up-lost-coins-satoshi\/."},{"key":"e_1_3_2_1_34_1","volume-title":"OpenID Foundation. Accessed","author":"Sakimura N.","year":"2023","unstructured":"N. Sakimura, J. Bradley, M. Jones, B. de Medeiros, and C. Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1. OpenID Foundation. Accessed: Oct 27, 2023."},{"key":"e_1_3_2_1_35_1","volume-title":"OpenID Foundation. Accessed","author":"Sakimura N.","year":"2023","unstructured":"N. Sakimura, J. Bradley, M. Jones, B. de Medeiros, and C. Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1: Subject Identifier Types. OpenID Foundation. Accessed: Oct 27, 2023."},{"key":"e_1_3_2_1_36_1","unstructured":"Apple Platform Security. 2024. iCloud encryption. https:\/\/support.apple.com\/guide\/security\/icloud-encryption-sec3cac31735\/web"},{"key":"e_1_3_2_1_37_1","volume-title":"Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS","volume":"53","author":"Shamir Adi","year":"1984","unstructured":"Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS, Vol. 196), G. R. Blakley and David Chaum (Eds.). Springer, Heidelberg, 47--53."},{"key":"e_1_3_2_1_38_1","author":"Technology","year":"2023","unstructured":"Technology Review. 2023. Cryptography, AI, and the labeling problem: How C2PA aims to establish digital provenance. Technology Review (28 07 2023). https:\/\/www.technologyreview.com\/2023\/07\/28\/1076843\/cryptography-ai-labeling-problem-c2pa-provenance\/","journal-title":"Review."},{"key":"e_1_3_2_1_39_1","unstructured":"URL. - a. Dauth. https:\/\/www.dauth.network\/."},{"key":"e_1_3_2_1_40_1","unstructured":"URL. - b. Face Wallet. https:\/\/facewallet.xyz\/"},{"key":"e_1_3_2_1_41_1","unstructured":"URL. - c. Magic. https:\/\/magic.link."},{"key":"e_1_3_2_1_42_1","unstructured":"URL. - d. Privy. https:\/\/docs.privy.io."},{"key":"e_1_3_2_1_43_1","unstructured":"URL. - e. RISC Zero. https:\/\/github.com\/risc0\/risc0."},{"key":"e_1_3_2_1_44_1","unstructured":"URL. - f. Web3Auth. https:\/\/web3auth.io."},{"key":"e_1_3_2_1_45_1","unstructured":"URL. 2024. Aptos Keyless | Aptos Docs. https:\/\/aptos.dev\/en\/build\/guides\/aptos-keyless."},{"key":"e_1_3_2_1_46_1","volume-title":"2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 86--86","author":"Venkitasubramaniam Muthuramakrishnan","year":"2023","unstructured":"Muthuramakrishnan Venkitasubramaniam. 2023. Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs. Post-Quantum ZK-SNARKs on a Browser. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 86--86."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642534"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417239"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690356","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:07:40Z","timestamp":1755842860000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":48,"alternative-id":["10.1145\/3658644.3690356","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690356","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}