{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:33:46Z","timestamp":1768437226358,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608874","type":"print"},{"value":"9789819608881","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0888-1_14","type":"book-chapter","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:10:11Z","timestamp":1733821811000},"page":"423-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Extractable Witness Encryption for\u00a0KZG Commitments and\u00a0Efficient Laconic OT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3971-9368","authenticated-orcid":false,"given":"Nils","family":"Fleischhacker","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0195-6659","authenticated-orcid":false,"given":"Mathias","family":"Hall-Andersen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7325-5261","authenticated-orcid":false,"given":"Mark","family":"Simkin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Aranha, D.F., Lin, C., Orlandi, C., Simkin, M.: Laconic private set-intersection from pairings. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022. pp. 111\u2013124. ACM Press (Nov 2022). https:\/\/doi.org\/10.1145\/3548606.3560642","DOI":"10.1145\/3548606.3560642"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO\u00a02001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Berlin, Heidelberg (Aug 2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_1","DOI":"10.1007\/3-540-44647-8_1"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Benhamouda, F., Jain, A., Komargodski, I., Lin, H.: Multiparty reusable non-interactive secure computation from LWE. In: Canteaut, A., Standaert, F.X. (eds.) EUROCRYPT\u00a02021, Part\u00a0II. LNCS, vol. 12697, pp. 724\u2013753. Springer, Cham (Oct 2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_25","DOI":"10.1007\/978-3-030-77886-6_25"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Benhamouda, F., Lin, H.: k-round multiparty computation from k-round oblivious transfer via garbled interactive circuits. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT\u00a02018, Part\u00a0II. LNCS, vol. 10821, pp. 500\u2013532. Springer, Cham (Apr\u00a0\/\u00a0May 2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_17","DOI":"10.1007\/978-3-319-78375-8_17"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Benhamouda, F., Lin, H.: Mr NISC: Multiparty reusable non-interactive secure computation. In: Pass, R., Pietrzak, K. (eds.) TCC\u00a02020, Part\u00a0II. LNCS, vol. 12551, pp. 349\u2013378. Springer, Cham (Nov 2020). https:\/\/doi.org\/10.1007\/978-3-030-64378-2_13","DOI":"10.1007\/978-3-030-64378-2_13"},{"key":"14_CR6","unstructured":"Bowe, S.: Bls12-381: New zk-snark elliptic curve construction (Mar 2017), https:\/\/electriccoin.co\/blog\/new-snark-curve\/"},{"key":"14_CR7","unstructured":"Campanelli, M., Fiore, D., Khoshakhlagh, H.: Witness encryption for succinct functional commitments and applications. Cryptology ePrint Archive, Report 2022\/1510 (2022), https:\/\/eprint.iacr.org\/2022\/1510"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC\u00a02013. LNCS, vol.\u00a07778, pp. 55\u201372. Springer, Berlin, Heidelberg (Feb\u00a0\/\u00a0Mar 2013). https:\/\/doi.org\/10.1007\/978-3-642-36362-7_5","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Chiesa, A., Hu, Y., Maller, M., Mishra, P., Vesely, P., Ward, N.P.: Marlin: Preprocessing zkSNARKs with universal and updatable SRS. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT\u00a02020, Part\u00a0I. LNCS, vol. 12105, pp. 738\u2013768. Springer, Cham (May 2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_26","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Cho, C., D\u00f6ttling, N., Garg, S., Gupta, D., Miao, P., Polychroniadou, A.: Laconic oblivious transfer and its applications. In: Katz, J., Shacham, H. (eds.) CRYPTO\u00a02017, Part\u00a0II. LNCS, vol. 10402, pp. 33\u201365. Springer, Cham (Aug 2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_2","DOI":"10.1007\/978-3-319-63715-0_2"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Choi, G., Vaudenay, S.: Towards witness encryption without multilinear maps - extractable witness encryption for multi-subset sum instances with no small solution to the homogeneous problem. In: Park, J.H., Seo, S.H. (eds.) ICISC 21. LNCS, vol. 13218, pp. 28\u201347. Springer, Cham (Dec 2021). https:\/\/doi.org\/10.1007\/978-3-031-08896-4_2","DOI":"10.1007\/978-3-031-08896-4_2"},{"key":"14_CR12","unstructured":"arkworks contributors: arkworks zksnark ecosystem (2022), https:\/\/arkworks.rs"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"D\u00f6ttling, N., Kolonelos, D., Lai, R.W.F., Lin, C., Malavolta, G., Rahimi, A.: Efficient laconic cryptography from learning with errors. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0III. LNCS, vol. 14006, pp. 417\u2013446. Springer, Cham (Apr 2023). https:\/\/doi.org\/10.1007\/978-3-031-30620-4_14","DOI":"10.1007\/978-3-031-30620-4_14"},{"key":"14_CR14","unstructured":"Feist, D., Khovratovich, D.: Fast amortized KZG proofs. Cryptology ePrint Archive, Report 2023\/033 (2023), https:\/\/eprint.iacr.org\/2023\/033"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Kiltz, E., Loss, J.: The algebraic group model and its applications. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO\u00a02018, Part\u00a0II. LNCS, vol. 10992, pp. 33\u201362. Springer, Cham (Aug 2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_2","DOI":"10.1007\/978-3-319-96881-0_2"},{"key":"14_CR16","unstructured":"Gabizon, A., Williamson, Z.J., Ciobotaru, O.: PLONK: Permutations over Lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive, Report 2019\/953 (2019), https:\/\/eprint.iacr.org\/2019\/953"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th FOCS. pp. 40\u201349. IEEE Computer Society Press (Oct 2013). https:\/\/doi.org\/10.1109\/FOCS.2013.13","DOI":"10.1109\/FOCS.2013.13"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO\u00a02014, Part\u00a0I. LNCS, vol.\u00a08616, pp. 518\u2013535. Springer, Berlin, Heidelberg (Aug 2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_29","DOI":"10.1007\/978-3-662-44371-2_29"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Garg, S., Gentry, C., Sahai, A., Waters, B.: Witness encryption and its applications. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) 45th ACM STOC. pp. 467\u2013476. ACM Press (Jun 2013). https:\/\/doi.org\/10.1145\/2488608.2488667","DOI":"10.1145\/2488608.2488667"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Garg, S., Srinivasan, A.: Garbled protocols and two-round MPC from bilinear maps. In: Umans, C. (ed.) 58th FOCS. pp. 588\u2013599. IEEE Computer Society Press (Oct 2017). https:\/\/doi.org\/10.1109\/FOCS.2017.60","DOI":"10.1109\/FOCS.2017.60"},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: How to run Turing machines on encrypted data. In: Canetti, R., Garay, J.A. (eds.) CRYPTO\u00a02013, Part\u00a0II. LNCS, vol.\u00a08043, pp. 536\u2013553. Springer, Berlin, Heidelberg (Aug 2013). https:\/\/doi.org\/10.1007\/978-3-642-40084-1_30","DOI":"10.1007\/978-3-642-40084-1_30"},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"Gorbunov, S., Reyzin, L., Wee, H., Zhang, Z.: Pointproofs: Aggregating proofs for multiple vector commitments. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020. pp. 2007\u20132023. ACM Press (Nov 2020). https:\/\/doi.org\/10.1145\/3372297.3417244","DOI":"10.1145\/3372297.3417244"},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Green, M., Jain, A., Laer, G.V.: Efficient set membership encryption and applications. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) ACM CCS 2023. pp. 1080\u20131092. ACM Press (Nov 2023). https:\/\/doi.org\/10.1145\/3576915.3623131","DOI":"10.1145\/3576915.3623131"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT\u00a02010. LNCS, vol.\u00a06477, pp. 177\u2013194. Springer, Berlin, Heidelberg (Dec 2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_11","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Libert, B., Passel\u00e8gue, A., Riahinia, M.: PointProofs, revisited. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT\u00a02022, Part\u00a0IV. LNCS, vol. 13794, pp. 220\u2013246. Springer, Cham (Dec 2022). https:\/\/doi.org\/10.1007\/978-3-031-22972-5_8","DOI":"10.1007\/978-3-031-22972-5_8"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Maller, M., Bowe, S., Kohlweiss, M., Meiklejohn, S.: Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) ACM CCS 2019. pp. 2111\u20132128. ACM Press (Nov 2019). https:\/\/doi.org\/10.1145\/3319535.3339817","DOI":"10.1145\/3319535.3339817"},{"key":"14_CR27","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. Technical Report TR-81, Aiken Computation Lab, Harvard University, (1981), http:\/\/eprint.iacr.org\/2005\/187"},{"key":"14_CR28","unstructured":"Srinivasan, S., Chepurnoy, A., Papamanthou, C., Tomescu, A., Zhang, Y.: Hyperproofs: Aggregating and maintaining proofs in vector commitments. In: Butler, K.R.B., Thomas, K. (eds.) USENIX Security 2022. pp. 3001\u20133018. USENIX Association (Aug 2022)"},{"key":"14_CR29","doi-asserted-by":"publisher","unstructured":"Tomescu, A., Abraham, I., Buterin, V., Drake, J., Feist, D., Khovratovich, D.: Aggregatable subvector commitments for stateless cryptocurrencies. In: Galdi, C., Kolesnikov, V. (eds.) SCN 20. LNCS, vol. 12238, pp. 45\u201364. Springer, Cham (Sep 2020). https:\/\/doi.org\/10.1007\/978-3-030-57990-6_3","DOI":"10.1007\/978-3-030-57990-6_3"},{"key":"14_CR30","doi-asserted-by":"publisher","unstructured":"Tsabary, R.: Candidate witness encryption from lattice techniques. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO\u00a02022, Part\u00a0I. LNCS, vol. 13507, pp. 535\u2013559. Springer, Cham (Aug 2022). https:\/\/doi.org\/10.1007\/978-3-031-15802-5_19","DOI":"10.1007\/978-3-031-15802-5_19"},{"key":"14_CR31","doi-asserted-by":"publisher","unstructured":"Vaikuntanathan, V., Wee, H., Wichs, D.: Witness encryption and null-IO from evasive LWE. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT\u00a02022, Part\u00a0I. LNCS, vol. 13791, pp. 195\u2013221. Springer, Cham (Dec 2022). https:\/\/doi.org\/10.1007\/978-3-031-22963-3_7","DOI":"10.1007\/978-3-031-22963-3_7"},{"key":"14_CR32","unstructured":"Wang, W., Ulichney, A., Papamanthou, C.: BalanceProofs: Maintainable vector commitments with fast aggregation. In: Calandrino, J.A., Troncoso, C. (eds.) USENIX Security 2023. pp. 4409\u20134426. USENIX Association (Aug 2023)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0888-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:36:35Z","timestamp":1733823395000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0888-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"ISBN":["9789819608874","9789819608881"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0888-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,11]]},"assertion":[{"value":"11 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}