{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:28:13Z","timestamp":1778128093262,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","funder":[{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/Y001680\/1"],"award-info":[{"award-number":["EP\/Y001680\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["CRYPTOLAYER-101044770"],"award-info":[{"award-number":["CRYPTOLAYER-101044770"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["DFG CRC 1119 CROSSING project S7"],"award-info":[{"award-number":["DFG CRC 1119 CROSSING project S7"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and the Arts","award":["National Research Center for Applied Cybersecurity ATHENE"],"award-info":[{"award-number":["National Research Center for Applied Cybersecurity ATHENE"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744876","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"2324-2338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["CCA-Secure Traceable Threshold (ID-based) Encryption and Application"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0407-7780","authenticated-orcid":false,"given":"Rishiraj","family":"Bhattacharyya","sequence":"first","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4315-1914","authenticated-orcid":false,"given":"Jan","family":"Bormet","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8625-4639","authenticated-orcid":false,"given":"Sebastian","family":"Faust","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0995-9555","authenticated-orcid":false,"given":"Pratyay","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"Supra Research, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7888-7690","authenticated-orcid":false,"given":"Hussien","family":"Othman","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_24"},{"key":"e_1_3_2_1_2_1","unstructured":"Amit Agarwal Rex Fernando and Benny Pinkas. 2024. Efficiently-Thresholdizable Batched Identity Based Encryption with Applications. Cryptology ePrint Archive Paper 2024\/1575. https:\/\/eprint.iacr.org\/2024\/1575"},{"key":"e_1_3_2_1_3_1","unstructured":"Lucas Ballard Matthew Green Breno de Medeiros and Fabian Monrose. 2005. Correlation-Resistant Storage via Keyword-Searchable Encryption. Cryptology ePrint Archive Paper 2005\/417. https:\/\/eprint.iacr.org\/2005\/417"},{"key":"e_1_3_2_1_4_1","unstructured":"Boaz Barak. 2023. An Intensive Introduction to Cryptography: Chosen Ciphertext Security. https:\/\/intensecrypto.org\/public\/lec_06_CCA.html. Accessed: 2025-01-09."},{"key":"e_1_3_2_1_5_1","volume-title":"CCA-Secure Traceable Threshold (ID-based) Encryption and Application. Cryptology ePrint Archive","author":"Bhattacharyya Rishiraj","year":"2025","unstructured":"Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, and Hussien Othman. 2025. CCA-Secure Traceable Threshold (ID-based) Encryption and Application. Cryptology ePrint Archive (2025)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/S009753970544713X"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455834"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68394-7_11"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68388-6_9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_36"},{"key":"e_1_3_2_1_17_1","unstructured":"Jan Bormet Sebastian Faust Hussien Othman and Ziyan Qu. 2024. BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention. Cryptology ePrint Archive Paper 2024\/1533. https:\/\/eprint.iacr.org\/2024\/1533"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_16"},{"key":"e_1_3_2_1_20_1","unstructured":"Arka Rai Choudhuri Sanjam Garg Julien Piet and Guru-Vamsi Policharla. 2024a. Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses. Cryptology ePrint Archive Paper 2024\/669. https:\/\/eprint.iacr.org\/2024\/669"},{"key":"e_1_3_2_1_21_1","unstructured":"Arka Rai Choudhuri Sanjam Garg Guru-Vamsi Policharla and Mingyuan Wang. 2024b. Practical Mempool Privacy via One-time Setup Batched Threshold Encryption. Cryptology ePrint Archive Paper 2024\/1516. https:\/\/eprint.iacr.org\/2024\/1516"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_19"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFB0055717"},{"key":"e_1_3_2_1_25_1","unstructured":"Philip Daian Steven Goldfeder Tyler Kell Yunqi Li Xueyuan Zhao Iddo Bentov Lorenz Breidenbach and Ari Juels. 2019. Flash Boys 2.0: Frontrunning Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv:1904.05234 [cs.CR] https:\/\/arxiv.org\/abs\/1904.05234"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_8"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690296"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/S00145-011-9114-1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_24"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_35"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_31"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97121-2_16"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24316-5_15"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_28"},{"key":"e_1_3_2_1_38_1","unstructured":"Shutter Network. 2021. Introducing Shutter - Combating Front Running and Malicious MEV Using Threshold Cryptography. https:\/\/blog.shutter.network\/introducing-shutter-network-combating-frontrunning-and-malicious-mev-using-threshold-cryptography\/. Accessed: 2025-01-05."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346330.1346335"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_22"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84259-8_11"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00113"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00027"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:53Z","timestamp":1766441873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":43,"alternative-id":["10.1145\/3719027.3744876","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3744876","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}