{"id":"https://openalex.org/W3107225991","doi":"https://doi.org/10.1145/3372297.3417888","title":"WI is Almost Enough: Contingent Payment All Over Again","display_name":"WI is Almost Enough: Contingent Payment All Over Again","publication_year":2020,"publication_date":"2020-10-30","ids":{"openalex":"https://openalex.org/W3107225991","doi":"https://doi.org/10.1145/3372297.3417888","mag":"3107225991"},"language":"en","primary_location":{"id":"doi:10.1145/3372297.3417888","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417888","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417888","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417888","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030914695","display_name":"Ky Nguyen","orcid":"https://orcid.org/0000-0002-3867-4209"},"institutions":[{"id":"https://openalex.org/I2746051580","display_name":"Universit\u00e9 Paris Sciences et Lettres","ror":"https://ror.org/013cjyk83","country_code":"FR","type":"education","lineage":["https://openalex.org/I2746051580"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Ky Nguyen","raw_affiliation_strings":["\u00c9cole Normale Superieure, CNRS &amp; PSL University, Paris, France"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Normale Superieure, CNRS &amp; PSL University, Paris, France","institution_ids":["https://openalex.org/I29607241","https://openalex.org/I2746051580","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005806644","display_name":"Miguel Ambrona","orcid":"https://orcid.org/0000-0001-5927-9235"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Miguel Ambrona","raw_affiliation_strings":["NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091698608","display_name":"Masayuki Abe","orcid":"https://orcid.org/0000-0001-5619-3911"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masayuki Abe","raw_affiliation_strings":["NTT Secure Platform Laboratories, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories, Tokyo, Japan","institution_ids":["https://openalex.org/I2251713219"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030914695"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I2746051580","https://openalex.org/I29607241"],"apc_list":null,"apc_paid":null,"fwci":0.6628,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.76622335,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"641","last_page":"656"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243360280990601},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7108551263809204},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.7008399963378906},{"id":"https://openalex.org/keywords/impossibility","display_name":"Impossibility","score":0.679577112197876},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.5923994779586792},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.5582667589187622},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.5238437652587891},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4976826012134552},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.49300381541252136},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4587261378765106},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.42576703429222107},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.411954790353775},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.3626019358634949},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.326121985912323},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.26480966806411743},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19101902842521667},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17648106813430786},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1415765881538391},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.13326895236968994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243360280990601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7108551263809204},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.7008399963378906},{"id":"https://openalex.org/C2776261394","wikidata":"https://www.wikidata.org/wiki/Q315562","display_name":"Impossibility","level":2,"score":0.679577112197876},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.5923994779586792},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.5582667589187622},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.5238437652587891},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4976826012134552},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.49300381541252136},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4587261378765106},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.42576703429222107},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.411954790353775},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.3626019358634949},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.326121985912323},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.26480966806411743},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19101902842521667},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17648106813430786},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1415765881538391},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.13326895236968994},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3372297.3417888","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417888","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417888","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3372297.3417888","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417888","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417888","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3107225991.pdf","grobid_xml":"https://content.openalex.org/works/W3107225991.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W827005847","https://openalex.org/W945570858","https://openalex.org/W1501894674","https://openalex.org/W1561641428","https://openalex.org/W1969344535","https://openalex.org/W1970606468","https://openalex.org/W2018746447","https://openalex.org/W2019891719","https://openalex.org/W2038517014","https://openalex.org/W2039275540","https://openalex.org/W2052267638","https://openalex.org/W2058648304","https://openalex.org/W2079913403","https://openalex.org/W2095708839","https://openalex.org/W2142968417","https://openalex.org/W2143783692","https://openalex.org/W2144752539","https://openalex.org/W2164736940","https://openalex.org/W2169194339","https://openalex.org/W2170696315","https://openalex.org/W2394843291","https://openalex.org/W2475985589","https://openalex.org/W2496543269","https://openalex.org/W2519202739","https://openalex.org/W2522469987","https://openalex.org/W2529173666","https://openalex.org/W2725135237","https://openalex.org/W2739487772","https://openalex.org/W2765986519","https://openalex.org/W2949534539","https://openalex.org/W2986639510","https://openalex.org/W3203084829"],"related_works":["https://openalex.org/W2977508505","https://openalex.org/W3198275368","https://openalex.org/W2370770334","https://openalex.org/W2057152612","https://openalex.org/W1993458326","https://openalex.org/W2379715389","https://openalex.org/W2388209206","https://openalex.org/W1993973390","https://openalex.org/W3158728532","https://openalex.org/W3192998623"],"abstract_inverted_index":{"The":[0],"problem":[1],"of":[2,6,41,87,136],"fair":[3,39],"exchange":[4,40],"consists":[5],"interchanging":[7],"goods":[8,43],"between":[9],"two":[10],"parties":[11],"that":[12,37,108,131,138,205],"do":[13],"not":[14,112],"trust":[15],"each":[16],"other.":[17],"Despite":[18],"known":[19],"impossibility":[20],"results,":[21],"recent":[22],"works":[23],"leverage":[24],"the":[25,65,101,115],"block-chain":[26],"and":[27,51,89,157,181],"zero-knowledge":[28,32],"proofs":[29],"to":[30,123,175,187,198],"implement":[31,176],"contingent":[33,203],"payment":[34,204],"(zkCP)":[35],"systems":[36,47,156],"make":[38],"digital":[42],"possible.":[44],"Implementing":[45],"these":[46,168],"in":[48,100,195,209],"a":[49,55,74,98,132,183,196,215],"secure":[50],"efficient":[52],"way":[53],"is":[54,111],"big":[56],"challenge,":[57],"as":[58],"evidenced":[59],"by":[60,119],"several":[61,91],"unsuccessful":[62],"attempts":[63],"from":[64],"literature.":[66],"Campanelli":[67,120,162],"et":[68,121,163],"al.":[69,122],"(ACM":[70,94],"CCS":[71,95],"2017)":[72],"discovered":[73],"vulnerability":[75],"on":[76,82],"an":[77],"existing":[78],"zkCP":[79,116],"proposal":[80,165],"based":[81],"SNARKs":[83],"(succinct":[84],"non-interactive":[85],"arguments":[86],"knowledge)":[88],"suggested":[90],"repairs.":[92],"Fuchsbauer":[93],"2019)":[96],"found":[97],"flaw":[99],"mentioned":[102],"countermeasures.":[103],"In":[104,126],"particular,":[105],"he":[106],"showed":[107],"witness-indistinguishability":[109],"(WI)":[110],"sufficient":[113],"for":[114,154],"schemes":[117],"proposed":[118],"be":[124,207],"secure.":[125],"this":[127],"work,":[128],"we":[129,139,171],"observe":[130],"slightly":[133],"stronger":[134],"notion":[135],"WI,":[137],"coin":[140],"trapdoor":[141],"subversion":[142],"WI":[143],"(tS-WI),":[144],"rules":[145],"out":[146],"Fuchsbauer's":[147],"attack.":[148],"We":[149],"formally":[150],"define":[151],"security":[152],"properties":[153],"CP":[155],"show":[158],"that,":[159],"under":[160],"tS-WI,":[161],"al.'s":[164],"indeed":[166],"satisfies":[167],"properties.":[169],"Additionally,":[170],"explore":[172],"alternative":[173],"approaches":[174],"ZK":[177],"(other":[178],"than":[179,211],"SNARKs)":[180],"develop":[182],"prototype,":[184],"using":[185],"it":[186],"demonstrate":[188],"their":[189],"potential.":[190],"Our":[191],"new":[192],"ideas":[193],"result":[194],"protocol":[197],"sell":[199],"ECDSA":[200],"signatures":[201],"with":[202],"can":[206],"executed":[208],"less":[210],"$150$":[212],"milliseconds":[213],"over":[214],"LAN":[216],"network.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
