{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:43Z","timestamp":1750309303240,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2021YFB2700500","2021YFB2700503"],"award-info":[{"award-number":["2021YFB2700500","2021YFB2700503"]}]},{"DOI":"10.13039\/100017052","name":"National Natural Science Foundation of China-Liaoning Joint Fund","doi-asserted-by":"publisher","award":["62232002","62202051"],"award-info":[{"award-number":["62232002","62202051"]}],"id":[{"id":"10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021M700435","2021TQ0042"],"award-info":[{"award-number":["2021M700435","2021TQ0042"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2021B0101400003"],"award-info":[{"award-number":["2021B0101400003"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars, and Young Elite Scientists Sponsorship Program by CAST","award":["2023QNRC001"],"award-info":[{"award-number":["2023QNRC001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,2]]},"DOI":"10.1145\/3659463.3660029","type":"proceedings-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T20:34:46Z","timestamp":1739219686000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Achieving Privacy-Preserving Optimizer Architecture for Intent Execution on EVM Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2190-5880","authenticated-orcid":false,"given":"Weijie","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0665-8722","authenticated-orcid":false,"given":"Haotian","family":"Deng","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1306-3185","authenticated-orcid":false,"given":"Jinwen","family":"Liang","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7684-8540","authenticated-orcid":false,"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"23","article-title":"A conflict resolution scheme in intent-driven network,\" in 2021 IEEE\/CIC International Conference on Communications","author":"Zhang J.","year":"2021","unstructured":"J. Zhang, J. Guo, C. Yang, X. Mi, L. Jiao, X. Zhu, L. Cao, and R. Li, \"A conflict resolution scheme in intent-driven network,\" in 2021 IEEE\/CIC International Conference on Communications in China (ICCC), 2021, pp. 23--28.","journal-title":"China (ICCC)"},{"key":"e_1_3_2_1_2_1","first-page":"1949","article-title":"Finn: Feedback interactive neural network for intent recommendation","volume":"2021","author":"Yang Y.","year":"2021","unstructured":"Y. Yang, B. Ma, J. Tan, H. Deng, H. Huang, and Z. Zheng, \"Finn: Feedback interactive neural network for intent recommendation,\" in Proceedings of the Web Conference 2021, 2021, pp. 1949--1958.","journal-title":"Proceedings of the Web Conference"},{"key":"e_1_3_2_1_3_1","first-page":"164","volume-title":"POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings 6","author":"Atzei N.","year":"2017","unstructured":"N. Atzei, M. Bartoletti, and T. Cimoli, \"A survey of attacks on ethereum smart contracts (sok),\" in Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22--29, 2017, Proceedings 6, 2017, pp. 164--186."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993601"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431726"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2019.03.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"e_1_3_2_1_8_1","volume-title":"Erc-4337: Account abstraction using alt mempool. url: https:\/\/eips.ethereum.org,\" EIPS\/eip-4337.(accessed: 17.03","author":"Buterin V.","year":"2023","unstructured":"V. Buterin, Y. Weiss, K. Gazso, N. Patel, D. Tirosh, S. Nacson, and T. Hess, \"Erc-4337: Account abstraction using alt mempool. url: https:\/\/eips.ethereum.org,\" EIPS\/eip-4337.(accessed: 17.03. 2023), p. 110."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.10654543"},{"key":"e_1_3_2_1_10_1","volume-title":"We are intents","author":"Eichholz L.","year":"2023","unstructured":"L. Eichholz, \"Introducing essential: We are intents,\" 2023, https:\/\/blog.essential.builders\/introducing-essential\/."},{"key":"e_1_3_2_1_11_1","unstructured":"\"One-stop access to decentralized finance \" 2024 https:\/\/1inch.io\/."},{"key":"e_1_3_2_1_12_1","volume-title":"The dominance of uniswap v3 liquidity","author":"Liao G.","year":"2022","unstructured":"G. Liao and D. Robinson, \"The dominance of uniswap v3 liquidity,\" 2022."},{"volume-title":"Infrastructure for intent-based transactions for better ux of wallets and dapps","year":"2024","key":"e_1_3_2_1_13_1","unstructured":"\"Bob the solver: Infrastructure for intent-based transactions for better ux of wallets and dapps.\" 2024, https:\/\/ethglobal.com\/showcase\/bob-the-solver-yxtgp."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123618"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2220357.2220358"},{"key":"e_1_3_2_1_16_1","first-page":"203","volume-title":"The knowledge complexity of interactive proof-systems,\" in Providing sound foundations for cryptography: On the work of shafi goldwasser and silvio micali","author":"Goldwasser S.","year":"2019","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff, \"The knowledge complexity of interactive proof-systems,\" in Providing sound foundations for cryptography: On the work of shafi goldwasser and silvio micali, 2019, pp. 203--225."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/0220068"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2923222"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_16"},{"key":"e_1_3_2_1_21_1","first-page":"566","article-title":"Key-privacy in public-key encryption","author":"Bellare M.","year":"2001","unstructured":"M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, \"Key-privacy in public-key encryption,\" in International Conference on the Theory and Application of Cryptology and Information Security, 2001, pp. 566--582.","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"e_1_3_2_1_22_1","first-page":"26","volume-title":"California, USA August 23--27","author":"Bellare M.","year":"1998","unstructured":"M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, \"Relations among notions of security for public-key encryption schemes,\" in Advances in Cryptology---CRYPTO'98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23--27, 1998 Proceedings 18, 1998, pp. 26--45."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"K. Wu B. Peng H. Xie and Z. Huang \"An information entropy method to quantify the degrees of decentralization for blockchain systems \" in 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC) 2019 pp. 1--6.","DOI":"10.1109\/ICEIEC.2019.8784631"}],"event":{"name":"BSCI '24: 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"BSCI '24"},"container-title":["Proceedings of the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659463.3660029","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3659463.3660029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:42Z","timestamp":1750291422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659463.3660029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":23,"alternative-id":["10.1145\/3659463.3660029","10.1145\/3659463"],"URL":"https:\/\/doi.org\/10.1145\/3659463.3660029","relation":{},"subject":[],"published":{"date-parts":[[2024,7,2]]},"assertion":[{"value":"2025-02-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}