{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:47:27Z","timestamp":1743065247433,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031786785"},{"type":"electronic","value":"9783031786792"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78679-2_11","type":"book-chapter","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:29:43Z","timestamp":1739611783000},"page":"209-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAVER: SNARK-Compatible Verifiable Encryption"],"prefix":"10.1007","author":[{"given":"Jiwon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jaekyoung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jihye","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyunok","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,16]]},"reference":[{"issue":"1","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/984334.984335","volume":"7","author":"G Ateniese","year":"2004","unstructured":"Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM Transact. Inform. Syst. Secur. (TISSEC) 7(1), 1\u201320 (2004)","journal-title":"ACM Transact. Inform. Syst. Secur. (TISSEC)"},{"key":"11_CR2","unstructured":"Bowe, S.,\u00a0Gabizon, A.: Making groth\u2019s zk-snark simulation extractable in the random oracle model. Cryptology ePrint Archive, Report 2018\/187 (2018). https:\/\/eprint.iacr.org\/2018\/187"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Camenisch, J.,\u00a0Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Annual International Cryptology Conference, pp. 126\u2013144. Springer (2003)","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Campanelli, M.,\u00a0Fiore, D.,\u00a0Querol, A.: Legosnark: Modular design and composition of succinct zero-knowledge proofs. Cryptology ePrint Archive, Report 2019\/142 (2019). https:\/\/eprint.iacr.org\/2019\/142","DOI":"10.1145\/3319535.3339820"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1007\/978-3-030-45721-1_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"A Chiesa","year":"2020","unstructured":"Chiesa, A., Hu, Y., Maller, M., Mishra, P., Vesely, N., Ward, N.: Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 738\u2013768. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_26"},{"issue":"5","key":"11_CR6","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1002\/ett.4460080506","volume":"8","author":"R Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Eur. Trans. Telecommun. 8(5), 481\u2013490 (1997)","journal-title":"Eur. Trans. Telecommun."},{"key":"11_CR7","unstructured":"Gabizon, A.: On the efficiency of pairing-based proofs under the d-pke. Cryptology ePrint Archive, Report 2019\/148 (2019). https:\/\/eprint.iacr.org\/2019\/148"},{"key":"11_CR8","unstructured":"Gabizon, A., Williamson, Z.J.,\u00a0Ciobotaru, O.: Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive, Paper 2019\/953 (2019). https:\/\/eprint.iacr.org\/2019\/953"},{"key":"11_CR9","unstructured":"Gentry, C.,\u00a0Halevi, S.,\u00a0Lyubashevsky, V.: Practical non-interactive publicly verifiable secret sharing with thousands of parties. Cryptology ePrint Archive, Paper 2021\/1397 (2021). https:\/\/eprint.iacr.org\/2021\/1397"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"11_CR11","unstructured":"Groth, J.: Non-interactive distributed key generation and key resharing. Cryptology ePrint Archive, Paper 2021\/339 (2021). https:\/\/eprint.iacr.org\/2021\/339"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-319-63715-0_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"J Groth","year":"2017","unstructured":"Groth, J., Maller, M.: Snarky signatures: minimal signatures of knowledge from simulation-extractable SNARKs. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10402, pp. 581\u2013612. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_20"},{"key":"11_CR13","unstructured":"Kate, A., Mangipudi, E.V., Mukherjee, P., Saleem, H., Thyagarajan, S.A.K.: Non-interactive vss using class groups and application to dkg. Cryptology ePrint Archive, Paper 2023\/451 (2023). https:\/\/eprint.iacr.org\/2023\/451"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kim, J., Lee, J.,\u00a0Oh, H.: Simulation-extractable zk-snark with a single verification. IEEE Access (2020)","DOI":"10.1109\/ACCESS.2020.3019980"},{"key":"11_CR15","unstructured":"Kosba, A., et al.: A framework for building composable zero-knowledge proofs. Technical report, Cryptology ePrint Archive, Report 2015\/1093 (2015). http:\/\/eprintiacr.org"},{"key":"11_CR16","first-page":"1093","volume":"2015","author":"AE Kosba","year":"2015","unstructured":"Kosba, A.E., et al.: How to use snarks in universally composable protocols. IACR Cryptol. ePrint Arch. 2015, 1093 (2015)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"11_CR17","unstructured":"Lee, J., Choi, J., Kim, J., Oh, H.: Saver: Snark-friendly, additively-homomorphic, and verifiable encryption and decryption with rerandomization. Cryptology ePrint Archive, Paper 2019\/1270 (2019). https:\/\/eprint.iacr.org\/2019\/1270"},{"key":"11_CR18","unstructured":"Lipmaa, H.: Simulation-extractable snarks revisited (2019)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Maller, M., Bowe, S., Kohlweiss, M., Meiklejohn, S.: Sonic: Zero-knowledge snarks from linear-size universal and updatable structured reference strings. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201919, page 2111\u20132128, New York, NY, USA, 2019. Association for Computing Machinery (2019)","DOI":"10.1145\/3319535.3339817"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly practical verifiable computation. In: 2013 IEEE Symposium on Security and Privacy, pp. 238\u2013252. IEEE (2013)","DOI":"10.1109\/SP.2013.47"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Prabhakaran, M.,\u00a0Rosulek, M.: Rerandomizable rcca encryption. In: Annual International Cryptology Conference, pp. 517\u2013534. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-540-74143-5_29","DOI":"10.1007\/978-3-540-74143-5_29"},{"key":"11_CR22","unstructured":"SCIPR-Lab. libsnark. https:\/\/github.com\/scipr-lab\/libsnark (2014)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78679-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:29:53Z","timestamp":1739611793000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78679-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031786785","9783031786792"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78679-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}