{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:01:45Z","timestamp":1777892505459,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3736221","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:33:18Z","timestamp":1755066798000},"page":"971-984","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3899-697X","authenticated-orcid":false,"given":"Mohsen","family":"Minaei","sequence":"first","affiliation":[{"name":"Visa Research, Foster City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2315-7839","authenticated-orcid":false,"given":"Pedro","family":"Moreno-Sanchez","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, pozuelo de Alarcon, Spain; Visa Research, Foster City, USA and MPI-SP, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0201-1248","authenticated-orcid":false,"given":"Zhiyong","family":"Fang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6737-6991","authenticated-orcid":false,"given":"Srinivasan","family":"Raghuraman","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, California, USA and MIT, Cambridge, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8621-7486","authenticated-orcid":false,"given":"Navid","family":"Alamati","sequence":"additional","affiliation":[{"name":"VISA Research, Foster City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5970-0664","authenticated-orcid":false,"given":"Panagiotis","family":"Chatzigiannis","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2128-1734","authenticated-orcid":false,"given":"Ranjit","family":"Kumaresan","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8123-2713","authenticated-orcid":false,"given":"Duc V.","family":"Le","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2024. Aave. Available at: https:\/\/aave.com\/."},{"key":"e_1_3_3_2_3_2","unstructured":"2024. Compound. Available at: https:\/\/compound.finance\/."},{"key":"e_1_3_3_2_4_2","unstructured":"Zachary\u00a0Williamson Antonio Salazar\u00a0Cardozo. 2018. EIP1108. https:\/\/eips.ethereum.org\/EIPS\/eip-1108."},{"key":"e_1_3_3_2_5_2","unstructured":"Jordi Baylina Kobi Gurkan Roman Semenov Alexey Pertsev adria0 Ehud Ben-Reuven arnaucube Eduard S. and Marta Bell\u00e9s. 2020. circomlib."},{"key":"e_1_3_3_2_6_2","unstructured":"Jordi Baylina Kobi Gurkan Roman Semenov Alexey Pertsev adria0 Ehud Ben-Reuven arnaucube Eduard S. and Marta Bell\u00e9s. 2020. snarkjs."},{"key":"e_1_3_3_2_7_2","unstructured":"Eli Ben-Sasson Iddo Bentov Yinon Horesh and Michael Riabzev. 2018. Scalable transparent and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch. (2018) 46. http:\/\/eprint.iacr.org\/2018\/046"},{"key":"e_1_3_3_2_8_2","unstructured":"Dan Boneh and Victor Shoup. 2020. A graduate course in applied cryptography. Draft 0.5 (2020)."},{"key":"e_1_3_3_2_9_2","unstructured":"Benedikt B\u00fcnz Shashank Agrawal Mahdi Zamani and Dan Boneh. 2019. Zether: Towards Privacy in a Smart Contract World. IACR Cryptol. ePrint Arch. 2019 (2019) 191."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517424"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"e_1_3_3_2_12_2","unstructured":"Benjamin\u00a0E Diamond. 2020. \" Many-out-of-Many\" Proofs with Applications to Anonymous Zether. IACR Cryptol. ePrint Arch. 2020 (2020) 293."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00026"},{"key":"e_1_3_3_2_14_2","unstructured":"Claudia D\u00edaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network The Next Generation of Privacy Infrastructure."},{"key":"e_1_3_3_2_15_2","unstructured":"Privacy &\u00a0Scaling Explorations. 2023. Rate-Limiting Nullifier. https:\/\/rate-limiting-nullifier.github.io\/rln-docs\/what_is_rln.html."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Prastudy Fauzi Sarah Meiklejohn Rebekah Mercer and Claudio Orlandi. 2019. Quisquis: A New Design for Anonymous Cryptocurrencies. 11921 (2019) 649\u2013678. 10.1007\/978-3-030-34578-523","DOI":"10.1007\/978-3-030-34578-523"},{"key":"e_1_3_3_2_17_2","unstructured":"Ariel Gabizon Zachary\u00a0J. Williamson and Oana Ciobotaru. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. Cryptology ePrint Archive Paper 2019\/953. https:\/\/eprint.iacr.org\/2019\/953"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616577"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560637"},{"key":"e_1_3_3_2_20_2","volume-title":"USENIX Security Symposium","author":"Grassi Lorenzo","year":"2021","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.. In USENIX Security Symposium , Vol.\u00a02021."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23086"},{"key":"e_1_3_3_2_23_2","unstructured":"iden3 Team. 2023. Pedersen Hash Implementation. https:\/\/iden3-docs.readthedocs.io\/en\/latest\/iden3_repos\/research\/publications\/zkproof-standards-workshop-2\/pedersen-hash\/"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345655"},{"key":"e_1_3_3_2_26_2","unstructured":"Duc\u00a0V Le and Arthur Gervais. 2021. AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution. ACM Conference on Advances in Financial Technologies (AFT\u201921) (2021)."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Sarah Meiklejohn and Rebekah Mercer. 2018. M\u00f6bius: Trustless tumbling for transaction privacy. Proceedings on Privacy Enhancing Technologies 2018 2 (2018) 105\u2013121.","DOI":"10.1515\/popets-2018-0015"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238183"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_3_2_30_2","unstructured":"Mohsen Minaei Pedro Moreno-Sanchez Zhiyong Fang Srinivasan Raghuraman Navid Alamati Panagiotis Chatzigiannis Ranjit Kumaresan and Duc\u00a0V. Le. 2025. DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts. arxiv:https:\/\/arXiv.org\/abs\/2503.04260\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2503.04260"},{"key":"e_1_3_3_2_31_2","unstructured":"Surae Noether. 2014. Review of CryptoNote white paper. HYPERLINK\" http:\/\/monero. cc\/downloads\/whitepaper_review. pdf\" http:\/\/monero. cc\/downloads\/whitepaper_review. pdf (2014)."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Shen Noether and Adam Mackenzie. 2016. Ring Confidential Transactions. Ledger 1 0 (Dec 2016) 1\u201318.","DOI":"10.5195\/ledger.2016.34"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179427"},{"key":"e_1_3_3_2_34_2","volume-title":"Railgun Protocol","author":"Team Railgun Project","year":"2023","unstructured":"Railgun Project Team. 2023-11-22. Railgun Protocol. Railgun. railgun.xyz"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560622"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00111"},{"key":"e_1_3_3_2_38_2","unstructured":"Zhipeng Wang Orestis Alpos Alireza Kavousi Sze\u00a0Yiu Chau Duc\u00a0V. Le and Christian Cachin. 2022. DSKE: Digital Signature with Key Extraction. Cryptology ePrint Archive Paper 2022\/1753. https:\/\/eprint.iacr.org\/2022\/1753"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.AFT.2023.16"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3736221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:27:14Z","timestamp":1755070034000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3736221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":38,"alternative-id":["10.1145\/3708821.3736221","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3736221","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}