{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:34Z","timestamp":1774946374161,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","award":["Investigator Award Agreement Dated June 5th, 2012"],"award-info":[{"award-number":["Investigator Award Agreement Dated June 5th, 2012"]}],"id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["MACS (CNS-1413920)"],"award-info":[{"award-number":["MACS (CNS-1413920)"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["IBM (W911NF-15-C-0236)"],"award-info":[{"award-number":["IBM (W911NF-15-C-0236)"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139565","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"99-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Public Accountability vs. Secret Laws: Can They Coexist?"],"prefix":"10.1145","author":[{"given":"Shafi","family":"Goldwasser","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology &amp; Weizmann, Cambridge, MA, USA"}]},{"given":"Sunoo","family":"Park","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Generating Hard Instances of Lattice Problems (Extended Abstract) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing","author":"Ajtai Mikl\u00f3s","year":"1996","unstructured":"Mikl\u00f3s Ajtai . 1996 . Generating Hard Instances of Lattice Problems (Extended Abstract) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing , Philadelphia, Pennsylvania, USA , May 22-24, 1996, Gary L. Miller (Ed.). ACM, 99--108. https:\/\/doi.org\/10.1145\/237814.237838 10.1145\/237814.237838 Mikl\u00f3s Ajtai. 1996. Generating Hard Instances of Lattice Problems (Extended Abstract) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996, Gary L. Miller (Ed.). ACM, 99--108. https:\/\/doi.org\/10.1145\/237814.237838"},{"key":"e_1_3_2_1_2_1","first-page":"646","article-title":"Computational integrity with a public random string from quasi-linear PCPs","volume":"2016","author":"Ben-Sasson Eli","year":"2016","unstructured":"Eli Ben-Sasson , Iddo Bentov , Alessandro Chiesa , Ariel Gabizon , Daniel Genkin , Matan Hamilis , Evgenya Pergament , Michael Riabzev , Mark Silberstein , Eran Tromer , and Madars Virza . 2016 . Computational integrity with a public random string from quasi-linear PCPs . IACR Cryptology ePrint Archive Vol. 2016 (2016), 646 . http:\/\/eprint.iacr.org\/2016\/646 Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, and Madars Virza. 2016. Computational integrity with a public random string from quasi-linear PCPs. IACR Cryptology ePrint Archive Vol. 2016 (2016), 646. http:\/\/eprint.iacr.org\/2016\/646","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_4_1","volume-title":"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. 2015 IEEE Symposium on Security and Privacy, SP 2015","author":"Ben-Sasson Eli","year":"2015","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Matthew Green , Eran Tromer , and Madars Virza . 2015 . Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. 2015 IEEE Symposium on Security and Privacy, SP 2015 , San Jose, CA, USA , May 17-21, 2015. IEEE Computer Society, 287--304. https:\/\/doi.org\/10.1109\/SP.2015.25 10.1109\/SP.2015.25 Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, and Madars Virza. 2015. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs. 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015. IEEE Computer Society, 287--304. https:\/\/doi.org\/10.1109\/SP.2015.25"},{"key":"e_1_3_2_1_5_1","volume-title":"USA","volume":"8617","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 . Scalable Zero Knowledge via Cycles of Elliptic Curves Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA , USA , August 17-21, 2014, Proceedings, Part II (Lecture Notes in Computer Science), Juan A. Garay and Rosario Gennaro (Eds.) , Vol. 8617 . Springer, 276--294. https:\/\/doi.org\/10.1007\/978-3-662-44381-1_16 10.1007\/978-3-662-44381-1_16 Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Scalable Zero Knowledge via Cycles of Elliptic Curves Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II (Lecture Notes in Computer Science), Juan A. Garay and Rosario Gennaro (Eds.), Vol. 8617. Springer, 276--294. https:\/\/doi.org\/10.1007\/978-3-662-44381-1_16"},{"key":"e_1_3_2_1_6_1","volume-title":"Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture 23rd USENIX Security Symposium (USENIX Security 14)","author":"Ben-Sasson Eli","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association , San Diego, CA , 781--796. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/ben-sasson Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 781--796. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/ben-sasson"},{"key":"e_1_3_2_1_7_1","volume-title":"20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings (Lecture Notes in Computer Science), Mihir Bellare (Ed.)","volume":"1880","author":"Boneh Dan","year":"2000","unstructured":"Dan Boneh and Moni Naor . 2000 . Timed Commitments Advances in Cryptology - CRYPTO 2000 , 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings (Lecture Notes in Computer Science), Mihir Bellare (Ed.) , Vol. 1880 . Springer, 236--254. https:\/\/doi.org\/10.1007\/3-540-44598-6_15 10.1007\/3-540-44598-6_15 Dan Boneh and Moni Naor. 2000. Timed Commitments Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings (Lecture Notes in Computer Science), Mihir Bellare (Ed.), Vol. 1880. Springer, 236--254. https:\/\/doi.org\/10.1007\/3-540-44598-6_15"},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Chiesa Alessandro","year":"2015","unstructured":"Alessandro Chiesa , Eran Tromer , and Madars Virza . 2015. Cluster Computing in Zero Knowledge . In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Sofia, Bulgaria, April 26-30, 2015 , Proceedings, Part II (Lecture Notes in Computer Science), Elisabeth Oswald and Marc Fischlin (Eds.), Vol. 9057 . Springer , 371--403. https:\/\/doi.org\/10.1007\/978-3-662-46803-6_13 10.1007\/978-3-662-46803-6_13 Alessandro Chiesa, Eran Tromer, and Madars Virza. 2015. Cluster Computing in Zero Knowledge. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (Lecture Notes in Computer Science), Elisabeth Oswald and Marc Fischlin (Eds.), Vol. 9057. Springer, 371--403. https:\/\/doi.org\/10.1007\/978-3-662-46803-6_13"},{"key":"e_1_3_2_1_9_1","unstructured":"Ad\u00e1n S\u00e1nchez de Pedro Crespo and Luis Ivan Cuende Garc\u00eda. 2016. Stampery Blockchain Timestamping Architecture (BTA). (2016). Available online: https:\/\/s3.amazonaws.com\/stampery-cdn\/docs\/Stampery-BTA-v5-whitepaper.pdf.  Ad\u00e1n S\u00e1nchez de Pedro Crespo and Luis Ivan Cuende Garc\u00eda. 2016. Stampery Blockchain Timestamping Architecture (BTA). (2016). Available online: https:\/\/s3.amazonaws.com\/stampery-cdn\/docs\/Stampery-BTA-v5-whitepaper.pdf."},{"key":"e_1_3_2_1_10_1","volume-title":"Electronic Colloquium on Computational Complexity (ECCC)","volume":"3","author":"Goldreich Oded","year":"1996","unstructured":"Oded Goldreich , Shafi Goldwasser , and Shai Halevi . 1996 . Collision-Free Hashing from Lattice Problems . Electronic Colloquium on Computational Complexity (ECCC) , Vol. 3 , 42 (1996). http:\/\/eccc.hpi-web.de\/eccc-reports\/1996\/TR96-042\/index.html Oded Goldreich, Shafi Goldwasser, and Shai Halevi. 1996. Collision-Free Hashing from Lattice Problems. Electronic Colloquium on Computational Complexity (ECCC), Vol. 3, 42 (1996). http:\/\/eccc.hpi-web.de\/eccc-reports\/1996\/TR96-042\/index.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Deciphering the Debate Over Encryption: Industry and Law Enforcement Perspectives. (April","author":"House Energy and Commerce Committee","year":"2016","unstructured":"House Energy and Commerce Committee . 2016. Deciphering the Debate Over Encryption: Industry and Law Enforcement Perspectives. (April 2016 ). https:\/\/energycommerce.house.gov\/hearings-and-votes\/hearings\/deciphering-debate-over-encryption-industry-and-law-enforcement. House Energy and Commerce Committee. 2016. Deciphering the Debate Over Encryption: Industry and Law Enforcement Perspectives. (April 2016). https:\/\/energycommerce.house.gov\/hearings-and-votes\/hearings\/deciphering-debate-over-encryption-industry-and-law-enforcement."},{"key":"e_1_3_2_1_12_1","volume-title":"What You Need to Know About the FISA Court - and How it Needs to Change. (August","author":"Kayyali Dia","year":"2014","unstructured":"Dia Kayyali . 2014. What You Need to Know About the FISA Court - and How it Needs to Change. (August 2014 ). https:\/\/www.eff.org\/deeplinks\/2014\/08\/what-you-need-know-about-fisa-court-and-how-it-needs-change. Dia Kayyali. 2014. What You Need to Know About the FISA Court - and How it Needs to Change. (August 2014). https:\/\/www.eff.org\/deeplinks\/2014\/08\/what-you-need-know-about-fisa-court-and-how-it-needs-change."},{"key":"e_1_3_2_1_13_1","first-page":"1093","article-title":"How to Use SNARKs in Universally Composable Protocols","volume":"2015","author":"Kosba Ahmed E.","year":"2015","unstructured":"Ahmed E. Kosba , Zhichao Zhao , Andrew Miller , Yi Qian , Hubert Chan , Charalampos Papamanthou , Rafael Pass , Abhi Shelat , and Elaine Shi . 2015 . How to Use SNARKs in Universally Composable Protocols . IACR Cryptology ePrint Archive Vol. 2015 (2015), 1093 . http:\/\/eprint.iacr.org\/2015\/1093 Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, and Elaine Shi. 2015. How to Use SNARKs in Universally Composable Protocols. IACR Cryptology ePrint Archive Vol. 2015 (2015), 1093. http:\/\/eprint.iacr.org\/2015\/1093","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_14_1","volume-title":"Court: Ability to police U.S. spying program limited. (August","author":"Leonnig Carol D.","year":"2013","unstructured":"Carol D. Leonnig . 2013 . Court: Ability to police U.S. spying program limited. (August 2013). https:\/\/www.washingtonpost.com\/politics\/court-ability-to-police-us-spying-program-limited\/2013\/08\/15\/4a8c8c44-05cd-11e3-a07f-49ddc7417125_story.html. Carol D. Leonnig. 2013. Court: Ability to police U.S. spying program limited. (August 2013). https:\/\/www.washingtonpost.com\/politics\/court-ability-to-police-us-spying-program-limited\/2013\/08\/15\/4a8c8c44-05cd-11e3-a07f-49ddc7417125_story.html."},{"key":"e_1_3_2_1_15_1","article-title":"Law Is Code: A Software Engineering Approach to Analyzing the United States Code","volume":"10","author":"Li William","year":"2015","unstructured":"William Li , Pablo Azar , David Larochelle , Phil Hill , and Andrew W. Lo . 2015 . Law Is Code: A Software Engineering Approach to Analyzing the United States Code . Journal of Business and Technology Law Vol. 10 (2015). Issue 2. William Li, Pablo Azar, David Larochelle, Phil Hill, and Andrew W. Lo. 2015. Law Is Code: A Software Engineering Approach to Analyzing the United States Code. Journal of Business and Technology Law Vol. 10 (2015). Issue 2.","journal-title":"Journal of Business and Technology Law"},{"key":"e_1_3_2_1_16_1","unstructured":"Eric Lichtblau. 2013. In Secret Court Vastly Broadens Powers of N.S.A. (2013). http:\/\/www.nytimes.com\/2013\/07\/07\/us\/in-secret-court-vastly-broadens-powers-of-nsa.html.  Eric Lichtblau. 2013. In Secret Court Vastly Broadens Powers of N.S.A. (2013). http:\/\/www.nytimes.com\/2013\/07\/07\/us\/in-secret-court-vastly-broadens-powers-of-nsa.html."},{"key":"e_1_3_2_1_18_1","volume-title":"Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference","author":"Pedersen Torben P.","year":"1991","unstructured":"Torben P. Pedersen . 1991. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference , Santa Barbara , California, USA, August 11-15, 1991 , Proceedings (Lecture Notes in Computer Science), Joan Feigenbaum (Ed.), Vol. 576 . Springer , 129--140. https:\/\/doi.org\/10.1007\/3-540-46766-1_9 10.1007\/3-540-46766-1_9 Torben P. Pedersen. 1991. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings (Lecture Notes in Computer Science), Joan Feigenbaum (Ed.), Vol. 576. Springer, 129--140. https:\/\/doi.org\/10.1007\/3-540-46766-1_9"},{"key":"e_1_3_2_1_19_1","volume-title":"Coming to Terms with Secret Law. (November","author":"Rudesill Dakota S.","year":"2015","unstructured":"Dakota S. Rudesill . 2015. Coming to Terms with Secret Law. (November 2015 ). Harvard National Security Journal 241 (2015); Ohio State Public Law Working Paper No . 321. Available at SSRN: https:\/\/ssrn.com\/abstract=2687223. Dakota S. Rudesill. 2015. Coming to Terms with Secret Law. (November 2015). Harvard National Security Journal 241 (2015); Ohio State Public Law Working Paper No. 321. Available at SSRN: https:\/\/ssrn.com\/abstract=2687223."},{"key":"e_1_3_2_1_20_1","volume-title":"Alex Abdo, Arthur B. Spitzer, and Scott Michelman.","author":"Schulz David A.","year":"2016","unstructured":"David A. Schulz , Hannah Bloch-Wehba , John Langford , Patrick Toomey , Brett Max Kaufman , Alex Abdo, Arthur B. Spitzer, and Scott Michelman. 2016 . Motion of the American Civil Liberties Union for the Release of Court Records. (October 2016). Original document at: https:\/\/www.aclu.org\/legal-document\/aclu-motion-filed-foreign-intelligence-surveillance-court-fisc-requesting-release. Associated blog post at: https:\/\/www.aclu.org\/blog\/speak-freely\/constitution-leaves-no-room-secret-law. David A. Schulz, Hannah Bloch-Wehba, John Langford, Patrick Toomey, Brett Max Kaufman, Alex Abdo, Arthur B. Spitzer, and Scott Michelman. 2016. Motion of the American Civil Liberties Union for the Release of Court Records. (October 2016). Original document at: https:\/\/www.aclu.org\/legal-document\/aclu-motion-filed-foreign-intelligence-surveillance-court-fisc-requesting-release. Associated blog post at: https:\/\/www.aclu.org\/blog\/speak-freely\/constitution-leaves-no-room-secret-law."},{"key":"e_1_3_2_1_21_1","unstructured":"Edward Snowden. 2013. Snowden Surveillance Archive. (2013). Archive of documents leaked by Edward Snowden maintained by Canadian Journalists for Free Expression and the Politics of Surveillance Project at the Faculty of Information at the University of Toronto. Available at: https:\/\/snowdenarchive.cjfe.org.  Edward Snowden. 2013. Snowden Surveillance Archive. (2013). Archive of documents leaked by Edward Snowden maintained by Canadian Journalists for Free Expression and the Politics of Surveillance Project at the Faculty of Information at the University of Toronto. Available at: https:\/\/snowdenarchive.cjfe.org."},{"key":"e_1_3_2_1_22_1","volume-title":"Preventing Consensus Fraud with Commitments and Single-Use-Seals. (December","author":"Todd Peter","year":"2016","unstructured":"Peter Todd . 2016. Preventing Consensus Fraud with Commitments and Single-Use-Seals. (December 2016 ). https:\/\/petertodd.org\/2016\/commitments-and-single-use-seals. Peter Todd. 2016. Preventing Consensus Fraud with Commitments and Single-Use-Seals. (December 2016). https:\/\/petertodd.org\/2016\/commitments-and-single-use-seals."},{"key":"e_1_3_2_1_23_1","unstructured":"Madars Virza. 2016. (December 2016). Private communication.  Madars Virza. 2016. (December 2016). Private communication."},{"key":"e_1_3_2_1_24_1","volume-title":"Testimony of Daniel J. Weitzner. (April","author":"Weitzner Daniel J.","year":"2016","unstructured":"Daniel J. Weitzner . 2016. Testimony of Daniel J. Weitzner. (April 2016 ). http:\/\/docs.house.gov\/meetings\/IF\/IF02\/20160419\/104812\/HHRG-114-IF02-Wstate-WeitznerD-20160419.pdf. Daniel J. Weitzner. 2016. Testimony of Daniel J. Weitzner. (April 2016). http:\/\/docs.house.gov\/meetings\/IF\/IF02\/20160419\/104812\/HHRG-114-IF02-Wstate-WeitznerD-20160419.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"The Design of the Ceremony. (October","author":"Wilcox Zooko","year":"2016","unstructured":"Zooko Wilcox . 2016. The Design of the Ceremony. (October 2016 ). https:\/\/z.cash\/blog\/the-design-of-the-ceremony.html. Zooko Wilcox. 2016. The Design of the Ceremony. (October 2016). https:\/\/z.cash\/blog\/the-design-of-the-ceremony.html."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139565","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139565","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:02Z","timestamp":1750212842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139565"}},"subtitle":["A Cryptographic Proposal"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":24,"alternative-id":["10.1145\/3139550.3139565","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139565","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}