{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:31:44Z","timestamp":1769315504839,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-15-C-4066"],"award-info":[{"award-number":["N66001-15-C-4066"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1413920, 1718782, 1514261, 1652259"],"award-info":[{"award-number":["1413920, 1718782, 1514261, 1652259"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC","award":["ECS-26208318"],"award-info":[{"award-number":["ECS-26208318"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3345652","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1299-1316","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Transparency Logs via Append-Only Authenticated Dictionaries"],"prefix":"10.1145","author":[{"given":"Alin","family":"Tomescu","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vivek","family":"Bhupatiraju","sequence":"additional","affiliation":[{"name":"Lexington High School &amp; MIT PRIMES, Lexington, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dimitrios","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Charalampos","family":"Papamanthou","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, DC, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nikos","family":"Triandopoulos","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Heather Adkins. 2011. An update on attempted man-in-the-middle attacks. http:\/\/googleonlinesecurity.blogspot.com\/2011\/08\/update-on-attempted-man-in-middle.html. Accessed: 2015-08--22.  Heather Adkins. 2011. An update on attempted man-in-the-middle attacks. http:\/\/googleonlinesecurity.blogspot.com\/2011\/08\/update-on-attempted-man-in-middle.html. Accessed: 2015-08--22."},{"key":"e_1_3_2_2_2_1","volume-title":"Contour: A Practical System for Binary Transparency. In Data Privacy Management, Cryptocurrencies and Blockchain Technology.","author":"Al-Bassam Mustafa","year":"2018","unstructured":"Mustafa Al-Bassam and Sarah Meiklejohn . 2018 . Contour: A Practical System for Binary Transparency. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Mustafa Al-Bassam and Sarah Meiklejohn. 2018. Contour: A Practical System for Binary Transparency. In Data Privacy Management, Cryptocurrencies and Blockchain Technology."},{"key":"e_1_3_2_2_3_1","volume-title":"MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In ASIACRYPT'16","author":"Albrecht Martin","year":"2016","unstructured":"Martin Albrecht , Lorenzo Grassi , Christian Rechberger , Arnab Roy , and Tyge Tiessen . 2016 . MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In ASIACRYPT'16 . Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, and Tyge Tiessen. 2016. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In ASIACRYPT'16."},{"key":"e_1_3_2_2_4_1","volume-title":"Freedman","author":"Ali Muneeb","year":"2016","unstructured":"Muneeb Ali , Jude Nelson , Ryan Shea , and Michael J . Freedman . 2016 . Blockstack : A Global Naming and Storage System Secured by Blockchains. In USENIX ATC '16. Muneeb Ali, Jude Nelson, Ryan Shea, and Michael J. Freedman. 2016. Blockstack: A Global Naming and Storage System Secured by Blockchains. In USENIX ATC'16."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Aris Anagnostopoulos Michael T. Goodrich and Roberto Tamassia. 2001. Persistent Authenticated Dictionaries and Their Applications. In Information Security.  Aris Anagnostopoulos Michael T. Goodrich and Roberto Tamassia. 2001. Persistent Authenticated Dictionaries and Their Applications. In Information Security.","DOI":"10.1007\/3-540-45439-X_26"},{"key":"e_1_3_2_2_7_1","volume-title":"Barreto and Michael Naehrig","author":"Paulo S. L.","year":"2006","unstructured":"Paulo S. L. M. Barreto and Michael Naehrig . 2006 . Pairing-Friendly Elliptic Curves of Prime Order. In Selected Areas in Cryptography . Paulo S. L. M. Barreto and Michael Naehrig. 2006. Pairing-Friendly Elliptic Curves of Prime Order. In Selected Areas in Cryptography."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_17"},{"key":"e_1_3_2_2_11_1","volume-title":"Ward","author":"Ben-Sasson Eli","year":"2019","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Michael Riabzev , Nicholas Spooner , Madars Virza , and Nicholas P . Ward . 2019 . Aurora : Transparent Succinct Arguments for R1CS. In EUROCRYPT '19. Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward. 2019. Aurora: Transparent Succinct Arguments for R1CS. In EUROCRYPT'19."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-016-0221-0"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_24"},{"key":"e_1_3_2_2_14_1","volume-title":"Recursive Composition and Bootstrapping for SNARKS and Proof-carrying Data. In STOC'13","author":"Bitansky Nir","year":"2013","unstructured":"Nir Bitansky , Ran Canetti , Alessandro Chiesa , and Eran Tromer . 2013 . Recursive Composition and Bootstrapping for SNARKS and Proof-carrying Data. In STOC'13 . Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. 2013. Recursive Composition and Bootstrapping for SNARKS and Proof-carrying Data. In STOC'13."},{"key":"e_1_3_2_2_15_1","volume-title":"On the Existence of Extractable One-way Functions. In STOC'14","author":"Bitansky Nir","year":"2014","unstructured":"Nir Bitansky , Ran Canetti , Omer Paneth , and Alon Rosen . 2014 . On the Existence of Extractable One-way Functions. In STOC'14 . Nir Bitansky, Ran Canetti, Omer Paneth, and Alon Rosen. 2014. On the Existence of Extractable One-way Functions. In STOC'14."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_7"},{"key":"e_1_3_2_2_19_1","unstructured":"Sean Bowe. 2017. Switch from BN254 to BLS12--381. https:\/\/github.com\/zcash\/zcash\/issues\/2502. Accessed: 2019-02-03.  Sean Bowe. 2017. Switch from BN254 to BLS12--381. https:\/\/github.com\/zcash\/zcash\/issues\/2502. Accessed: 2019-02-03."},{"key":"e_1_3_2_2_20_1","volume-title":"Financial Cryptography '19","author":"Bowe Sean","unstructured":"Sean Bowe , Ariel Gabizon , and Matthew D. Green . 2019. A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK . In Financial Cryptography '19 . Sean Bowe, Ariel Gabizon, and Matthew D. Green. 2019. A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK. In Financial Cryptography '19."},{"key":"e_1_3_2_2_22_1","volume-title":"Limits of Extractability Assumptions with Distributional Auxiliary Input. In ASIACRYPT'15","author":"Boyle Elette","year":"2015","unstructured":"Elette Boyle and Rafael Pass . 2015 . Limits of Extractability Assumptions with Distributional Auxiliary Input. In ASIACRYPT'15 . Elette Boyle and Rafael Pass. 2015. Limits of Extractability Assumptions with Distributional Auxiliary Input. In ASIACRYPT'15."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352604"},{"key":"e_1_3_2_2_24_1","volume-title":"Bulletproofs: Short Proofs for Confidential Transactions and More","author":"B\u00fcnz Benedikt","year":"2018","unstructured":"Benedikt B\u00fcnz , Jonathan Bootle , Dan Boneh , Andrew Poelstra , Pieter Wuille , and Gregory Maxwell . 2018 . Bulletproofs: Short Proofs for Confidential Transactions and More . In IEEE S &P'18. Benedikt B\u00fcnz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Gregory Maxwell. 2018. Bulletproofs: Short Proofs for Confidential Transactions and More. In IEEE S&P'18."},{"key":"e_1_3_2_2_25_1","volume-title":"Practical Byzantine Fault Tolerance and Proactive Recovery. TOCS","volume":"20","author":"Castro M.","year":"2002","unstructured":"M. Castro and B. Liskov . 2002 . Practical Byzantine Fault Tolerance and Proactive Recovery. TOCS , Vol. 20 , 4 ( 2002 ). M. Castro and B. Liskov. 2002. Practical Byzantine Fault Tolerance and Proactive Recovery. TOCS, Vol. 20, 4 (2002)."},{"key":"e_1_3_2_2_27_1","volume-title":"Transparency Overlays and Applications. In ACM CCS'16","author":"Chase Melissa","year":"2016","unstructured":"Melissa Chase and Sarah Meiklejohn . 2016 . Transparency Overlays and Applications. In ACM CCS'16 . Melissa Chase and Sarah Meiklejohn. 2016. Transparency Overlays and Applications. In ACM CCS'16."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346853"},{"key":"e_1_3_2_2_29_1","volume-title":"Efficient Data Structures for Tamper-evident Logging. In USENIX Security '09","author":"Scott","unstructured":"Scott A. Crosby and Dan S. Wallach. 2009 . Efficient Data Structures for Tamper-evident Logging. In USENIX Security '09 . Scott A. Crosby and Dan S. Wallach. 2009. Efficient Data Structures for Tamper-evident Logging. In USENIX Security '09."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019602"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Rasmus Dahlberg and Tobias Pulls. 2018. Verifiable Light-Weight Monitoring for Certificate Transparency Logs. In NordSec 2018: Secure IT Systems.  Rasmus Dahlberg and Tobias Pulls. 2018. Verifiable Light-Weight Monitoring for Certificate Transparency Logs. In NordSec 2018: Secure IT Systems.","DOI":"10.1007\/978-3-030-03638-6_11"},{"key":"e_1_3_2_2_32_1","volume-title":"Aggregation-Based Gossip for Certificate Transparency. CoRR","author":"Dahlberg Rasmus","year":"2018","unstructured":"Rasmus Dahlberg , Tobias Pulls , Jonathan Vestin , Toke H\u00f8iland-J\u00f8rgensen , and Andreas Kassler . 2018. Aggregation-Based Gossip for Certificate Transparency. CoRR , Vol. abs\/ 1806 .08817 ( 2018 ). arxiv: 1806.08817 http:\/\/arxiv.org\/abs\/1806.08817 Rasmus Dahlberg, Tobias Pulls, Jonathan Vestin, Toke H\u00f8iland-J\u00f8rgensen, and Andreas Kassler. 2018. Aggregation-Based Gossip for Certificate Transparency. CoRR, Vol. abs\/1806.08817 (2018). arxiv: 1806.08817 http:\/\/arxiv.org\/abs\/1806.08817"},{"key":"e_1_3_2_2_34_1","volume-title":"Secure Logging Schemes and Certificate Transparency. In ESORICS'16","author":"Dowling Benjamin","year":"2016","unstructured":"Benjamin Dowling , Felix G\u00fc nther, Udyani Herath , and Douglas Stebila . 2016 . Secure Logging Schemes and Certificate Transparency. In ESORICS'16 . Benjamin Dowling, Felix G\u00fc nther, Udyani Herath, and Douglas Stebila. 2016. Secure Logging Schemes and Certificate Transparency. In ESORICS'16."},{"key":"e_1_3_2_2_35_1","unstructured":"Graham Edgecombe. 2016. Compressing X.509 certificates. https:\/\/www.grahamedgecombe.com\/blog\/2016\/12\/22\/compressing-x509-certificates. Accessed: 2018-04--12.  Graham Edgecombe. 2016. Compressing X.509 certificates. https:\/\/www.grahamedgecombe.com\/blog\/2016\/12\/22\/compressing-x509-certificates. Accessed: 2018-04--12."},{"key":"e_1_3_2_2_36_1","unstructured":"Adam Eijdenberg Ben Laurie and Al Cutter. 2016. Verifiable Data Structures. https:\/\/github.com\/google\/trillian\/blob\/master\/docs\/papers\/VerifiableDataStructures.pdf. Accessed: 2018-04--12.  Adam Eijdenberg Ben Laurie and Al Cutter. 2016. Verifiable Data Structures. https:\/\/github.com\/google\/trillian\/blob\/master\/docs\/papers\/VerifiableDataStructures.pdf. Accessed: 2018-04--12."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0052"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660311"},{"key":"e_1_3_2_2_39_1","volume-title":"Felten","author":"Feldman Ariel J.","year":"2012","unstructured":"Ariel J. Feldman , Aaron Blankstein , Michael J. Freedman , and Edward W . Felten . 2012 . Social Networking with Frientegrity : Privacy and Integrity with an Untrusted Provider. In USENIX Security '12. Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, and Edward W. Felten. 2012. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. In USENIX Security '12."},{"key":"e_1_3_2_2_40_1","volume-title":"Felten","author":"Feldman Ariel J.","year":"2010","unstructured":"Ariel J. Feldman , William P. Zeller , Michael J. Freedman , and Edward W . Felten . 2010 . SPORC : Group Collaboration Using Untrusted Cloud Resources . In OSDI'10. Ariel J. Feldman, William P. Zeller, Michael J. Freedman, and Edward W. Felten. 2010. SPORC: Group Collaboration Using Untrusted Cloud Resources. In OSDI'10."},{"key":"e_1_3_2_2_41_1","volume-title":"Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries. In CRYPTO'18","author":"Frederiksen Tore Kasper","year":"2018","unstructured":"Tore Kasper Frederiksen , Yehuda Lindell , Valery Osheter , and Benny Pinkas . 2018 . Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries. In CRYPTO'18 . Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, and Benny Pinkas. 2018. Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries. In CRYPTO'18."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993651"},{"key":"e_1_3_2_2_44_1","unstructured":"Google. 2016a. HTTPS encryption on the web: Certificate transparency. https:\/\/transparencyreport.google.com\/https\/certificates. Accessed: 2018-04--12.  Google. 2016a. HTTPS encryption on the web: Certificate transparency. https:\/\/transparencyreport.google.com\/https\/certificates. Accessed: 2018-04--12."},{"key":"e_1_3_2_2_45_1","volume-title":"Trillian: General Transparency. https:\/\/github.com\/google\/trillian. Accessed: 2018-04--12.","year":"2016","unstructured":"Google. 2016 b. Trillian: General Transparency. https:\/\/github.com\/google\/trillian. Accessed: 2018-04--12. Google. 2016b. Trillian: General Transparency. https:\/\/github.com\/google\/trillian. Accessed: 2018-04--12."},{"key":"e_1_3_2_2_46_1","volume-title":"Reducing Trust in the PKG in Identity Based Cryptosystems. In CRYPTO'07","author":"Goyal Vipul","year":"2007","unstructured":"Vipul Goyal . 2007 . Reducing Trust in the PKG in Identity Based Cryptosystems. In CRYPTO'07 . Vipul Goyal. 2007. Reducing Trust in the PKG in Identity Based Cryptosystems. In CRYPTO'07."},{"key":"e_1_3_2_2_47_1","volume-title":"Short Pairing-Based Non-interactive Zero-Knowledge Arguments. In ASIACRYPT'10","author":"Groth Jens","year":"2010","unstructured":"Jens Groth . 2010 . Short Pairing-Based Non-interactive Zero-Knowledge Arguments. In ASIACRYPT'10 . Jens Groth. 2010. Short Pairing-Based Non-interactive Zero-Knowledge Arguments. In ASIACRYPT'10."},{"key":"e_1_3_2_2_48_1","volume-title":"On the Size of Pairing-Based Non-interactive Arguments. In EUROCRYPT'16","author":"Groth Jens","year":"2016","unstructured":"Jens Groth . 2016 . On the Size of Pairing-Based Non-interactive Arguments. In EUROCRYPT'16 . Jens Groth. 2016. On the Size of Pairing-Based Non-interactive Arguments. In EUROCRYPT'16."},{"key":"e_1_3_2_2_49_1","volume-title":"Software Distribution Transparency and Auditability. CoRR","author":"Hof Benjamin","year":"2017","unstructured":"Benjamin Hof and Georg Carle . 2017. Software Distribution Transparency and Auditability. CoRR , Vol. abs\/ 1711 .07278 ( 2017 ). arxiv: 1711.07278 http:\/\/arxiv.org\/abs\/1711.07278 Benjamin Hof and Georg Carle. 2017. Software Distribution Transparency and Auditability. CoRR, Vol. abs\/1711.07278 (2017). arxiv: 1711.07278 http:\/\/arxiv.org\/abs\/1711.07278"},{"key":"e_1_3_2_2_50_1","unstructured":"Daira Hopwood Sean Bowe Taylor Hornby and Nathan Wilcox. 2015. Zcash Protocol Specification. https:\/\/github.com\/zcash\/zips\/blob\/master\/protocol\/protocol.pdf. Accessed: 2017--11--17.  Daira Hopwood Sean Bowe Taylor Hornby and Nathan Wilcox. 2015. Zcash Protocol Specification. https:\/\/github.com\/zcash\/zips\/blob\/master\/protocol\/protocol.pdf. Accessed: 2017--11--17."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","unstructured":"Antoine Joux. 2000. A One Round Protocol for Tripartite Diffie--Hellman. In Algorithmic Number Theory.  Antoine Joux. 2000. A One Round Protocol for Tripartite Diffie--Hellman. In Algorithmic Number Theory.","DOI":"10.1007\/10722028_23"},{"key":"e_1_3_2_2_52_1","volume-title":"Raluca Ada Popa, and Srdjan Capkun","author":"Karapanos Nikolaos","year":"2016","unstructured":"Nikolaos Karapanos , Alexandros Filios , Raluca Ada Popa, and Srdjan Capkun . 2016 . Verena : End-to-End Integrity Protection for Web Applications. In IEEE S &P'16. Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, and Srdjan Capkun. 2016. Verena: End-to-End Integrity Protection for Web Applications. In IEEE S&P'16."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Aggelos Kiayias Ozgur Oksuz and Qiang Tang. 2015. Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications. In Information Security.  Aggelos Kiayias Ozgur Oksuz and Qiang Tang. 2015. Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications. In Information Security.","DOI":"10.1007\/978-3-319-23318-5_30"},{"key":"e_1_3_2_2_55_1","volume-title":"WWW'13","author":"Hyun-Jin Kim Tiffany","year":"2013","unstructured":"Tiffany Hyun-Jin Kim , Lin-Shung Huang , Adrian Perring , Collin Jackson , and Virgil Gligor . 2013 . Accountable Key Infrastructure (AKI): A Proposal for a Public-key Validation Infrastructure . In WWW'13 . Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perring, Collin Jackson, and Virgil Gligor. 2013. Accountable Key Infrastructure (AKI): A Proposal for a Public-key Validation Infrastructure. In WWW'13."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055481"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_2_58_1","unstructured":"Ben Laurie. 2015. Revocation Transparency. https:\/\/www.links.org\/files\/RevocationTransparency.pdf. Accessed: 2018-07--31.  Ben Laurie. 2015. Revocation Transparency. https:\/\/www.links.org\/files\/RevocationTransparency.pdf. Accessed: 2018-07--31."},{"key":"e_1_3_2_2_59_1","volume-title":"RFC: Certificate Transparency","author":"Laurie Ben","year":"2013","unstructured":"Ben Laurie , Adam Langley , and Emilia Kasper . 2013 . RFC: Certificate Transparency . http:\/\/tools.ietf.org\/html\/rfc6962. Accessed: 2015--5--13. Ben Laurie, Adam Langley, and Emilia Kasper. 2013. RFC: Certificate Transparency. http:\/\/tools.ietf.org\/html\/rfc6962. Accessed: 2015--5--13."},{"key":"e_1_3_2_2_60_1","volume-title":"OSDI'04","author":"Li Jinyuan","year":"2004","unstructured":"Jinyuan Li , Maxwell Krohn , David Mazi\u00e8res , and Dennis Shasha . 2004 . Secure Untrusted Data Repository (SUNDR) . In OSDI'04 . Jinyuan Li, Maxwell Krohn, David Mazi\u00e8res, and Dennis Shasha. 2004. Secure Untrusted Data Repository (SUNDR). In OSDI'04."},{"key":"e_1_3_2_2_61_1","volume-title":"Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. In NSDI'07","author":"Li Jinyuan","year":"2007","unstructured":"Jinyuan Li and David Mazi\u00e9res . 2007 . Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. In NSDI'07 . Jinyuan Li and David Mazi\u00e9res. 2007. Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. In NSDI'07."},{"key":"e_1_3_2_2_62_1","unstructured":"Vincent Lynch. 2018. Scaling CT Logs: Temporal Sharding. https:\/\/www.digicert.com\/blog\/scaling-certificate-transparency-logs-temporal-sharding\/. Accessed: 2019-02-03.  Vincent Lynch. 2018. Scaling CT Logs: Temporal Sharding. https:\/\/www.digicert.com\/blog\/scaling-certificate-transparency-logs-temporal-sharding\/. Accessed: 2019-02-03."},{"key":"e_1_3_2_2_63_1","unstructured":"Ravi Mandalia. 2012. Security breach in CA networks - Comodo DigiNotar GlobalSign. http:\/\/blog.isc2.org\/isc2_blog\/2012\/04\/test.html. Accessed: 2015-08--22.  Ravi Mandalia. 2012. Security breach in CA networks - Comodo DigiNotar GlobalSign. http:\/\/blog.isc2.org\/isc2_blog\/2012\/04\/test.html. Accessed: 2015-08--22."},{"key":"e_1_3_2_2_64_1","volume-title":"Authenticated Append-only Skip Lists. CoRR","author":"Maniatis Petros","year":"2003","unstructured":"Petros Maniatis and Mary Baker . 2003. Authenticated Append-only Skip Lists. CoRR , Vol. cs.CR\/ 0302010 ( 2003 ). http:\/\/arxiv.org\/abs\/cs.CR\/0302010 Petros Maniatis and Mary Baker. 2003. Authenticated Append-only Skip Lists. CoRR, Vol. cs.CR\/0302010 (2003). http:\/\/arxiv.org\/abs\/cs.CR\/0302010"},{"key":"e_1_3_2_2_65_1","volume-title":"USENIX Security '15","author":"Melara Marcela S.","unstructured":"Marcela S. Melara , Aaron Blankstein , Joseph Bonneau , Edward W. Felten , and Michael J. Freedman . 2015. Bringing Deployable Key Transparency to End Users . In USENIX Security '15 . Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. Bringing Deployable Key Transparency to End Users. In USENIX Security '15."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"Alfred Menezes Palash Sarkar and Shashank Singh. 2017. Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. In Mycrypt'16.  Alfred Menezes Palash Sarkar and Shashank Singh. 2017. Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. In Mycrypt'16.","DOI":"10.1007\/978-3-319-61273-7_5"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103434"},{"key":"e_1_3_2_2_68_1","unstructured":"Ralph C. Merkle. 1982. Method of providing digital signatures.  Ralph C. Merkle. 1982. Method of providing digital signatures."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795284959"},{"key":"e_1_3_2_2_70_1","volume-title":"Zero-Knowledge Sets. In FOCS'03","author":"Micali Silvio","year":"2003","unstructured":"Silvio Micali , Michael Rabin , and Joe Kilian . 2003 . Zero-Knowledge Sets. In FOCS'03 . Silvio Micali, Michael Rabin, and Joe Kilian. 2003. Zero-Knowledge Sets. In FOCS'03."},{"key":"e_1_3_2_2_71_1","volume-title":"Verifiable Random Functions. In FOCS'99","author":"Micali Silvio","year":"1999","unstructured":"Silvio Micali , Salil Vadhan , and Michael Rabin . 1999 . Verifiable Random Functions. In FOCS'99 . Silvio Micali, Salil Vadhan, and Michael Rabin. 1999. Verifiable Random Functions. In FOCS'99."},{"key":"e_1_3_2_2_72_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. Accessed: 2017-03-08.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. Accessed: 2017-03-08. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. Accessed: 2017-03-08."},{"key":"e_1_3_2_2_73_1","unstructured":"Namecoin. 2011. Namecoin. https:\/\/namecoin.info\/. Accessed: 2015-08--23.  Namecoin. 2011. Namecoin. https:\/\/namecoin.info\/. Accessed: 2015-08--23."},{"key":"e_1_3_2_2_74_1","volume-title":"On Cryptographic Assumptions and Challenges. In CRYPTO'03","author":"Naor Moni","year":"2003","unstructured":"Moni Naor . 2003 . On Cryptographic Assumptions and Challenges. In CRYPTO'03 . Moni Naor. 2003. On Cryptographic Assumptions and Challenges. In CRYPTO'03."},{"key":"e_1_3_2_2_75_1","volume-title":"Certificate Revocation and Certificate Update. In USENIX Security '98","author":"Naor Moni","year":"1998","unstructured":"Moni Naor and Kobbi Nissim . 1998 . Certificate Revocation and Certificate Update. In USENIX Security '98 . Moni Naor and Kobbi Nissim. 1998. Certificate Revocation and Certificate Update. In USENIX Security '98."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"crossref","unstructured":"Lan Nguyen. 2005. Accumulators from Bilinear Pairings and Applications. In CT-RSA'05.  Lan Nguyen. 2005. Accumulators from Bilinear Pairings and Applications. In CT-RSA'05.","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"e_1_3_2_2_77_1","unstructured":"Andr\u00e9 Niemann and Jacqueline Brendel. 2014. A Survey on CA Compromises.  Andr\u00e9 Niemann and Jacqueline Brendel. 2014. A Survey on CA Compromises."},{"key":"e_1_3_2_2_78_1","volume-title":"USENIX Security '17","author":"Nikitin Kirill","year":"2017","unstructured":"Kirill Nikitin , Eleftherios Kokoris-Kogias , Philipp Jovanovic , Nicolas Gailly , Linus Gasser , Ismail Khoffi , Justin Cappos , and Bryan Ford . 2017 . CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds . In USENIX Security '17 . Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, and Bryan Ford. 2017. CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. In USENIX Security '17."},{"key":"e_1_3_2_2_79_1","volume-title":"Authentic Time-Stamps for Archival Storage. In ESORICS'09","author":"Oprea Alina","unstructured":"Alina Oprea and Kevin D. Bowers . 2009 . Authentic Time-Stamps for Archival Storage. In ESORICS'09 . Alina Oprea and Kevin D. Bowers. 2009. Authentic Time-Stamps for Archival Storage. In ESORICS'09."},{"key":"e_1_3_2_2_80_1","unstructured":"Mark H. Overmars. 1987. Design of Dynamic Data Structures.  Mark H. Overmars. 1987. Design of Dynamic Data Structures."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(81)90093-4"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"crossref","unstructured":"Charalampos Papamanthou and Roberto Tamassia. 2007. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. In Information and Communications Security.  Charalampos Papamanthou and Roberto Tamassia. 2007. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. In Information and Communications Security.","DOI":"10.1007\/978-3-540-77048-0_1"},{"key":"e_1_3_2_2_83_1","volume-title":"Insynd: Improved Privacy-Preserving Transparency Logging. In ESORICS'16","author":"Peeters Roel","year":"2016","unstructured":"Roel Peeters and Tobias Pulls . 2016 . Insynd: Improved Privacy-Preserving Transparency Logging. In ESORICS'16 . Roel Peeters and Tobias Pulls. 2016. Insynd: Improved Privacy-Preserving Transparency Logging. In ESORICS'16."},{"key":"e_1_3_2_2_84_1","volume-title":"Building Web Applications on Top of Encrypted Data Using Mylar. In NSDI'14","author":"Popa Raluca Ada","year":"2014","unstructured":"Raluca Ada Popa , Emily Stark , Jonas Helfer , Steven Valdez , Nickolai Zeldovich , M. Frans Kaashoek , and Hari Balakrishnan . 2014 . Building Web Applications on Top of Encrypted Data Using Mylar. In NSDI'14 . Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan. 2014. Building Web Applications on Top of Encrypted Data Using Mylar. In NSDI'14."},{"key":"e_1_3_2_2_85_1","volume-title":"Sarwate","author":"Preparata Franco P.","year":"1977","unstructured":"Franco P. Preparata and Dilip V . Sarwate . 1977 . Computational Fourier Transforms Complexity of Over Finite Fields. Math. Comp ., Vol. 31 , 139 (1977). Franco P. Preparata and Dilip V. Sarwate. 1977. Computational Fourier Transforms Complexity of Over Finite Fields. Math. Comp., Vol. 31, 139 (1977)."},{"key":"e_1_3_2_2_86_1","volume-title":"Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. In ESORICS'15","author":"Pulls Tobias","year":"2015","unstructured":"Tobias Pulls and Roel Peeters . 2015 . Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. In ESORICS'15 . Tobias Pulls and Roel Peeters. 2015. Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. In ESORICS'15."},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"crossref","unstructured":"Leonid Reyzin and Sophia Yakoubov. 2016. Efficient Asynchronous Accumulators for Distributed PKI. In Security and Cryptography for Networks.  Leonid Reyzin and Sophia Yakoubov. 2016. Efficient Asynchronous Accumulators for Distributed PKI. In Security and Cryptography for Networks.","DOI":"10.1007\/978-3-319-44618-9_16"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"},{"key":"e_1_3_2_2_89_1","volume-title":"Auditable Membership Proofs. In Financial Cryptography '01","author":"Sander Tomas","year":"2001","unstructured":"Tomas Sander , Amnon Ta-Shma , and Moti Yung . 2001 . Blind , Auditable Membership Proofs. In Financial Cryptography '01 . Tomas Sander, Amnon Ta-Shma, and Moti Yung. 2001. Blind, Auditable Membership Proofs. In Financial Cryptography '01."},{"key":"e_1_3_2_2_90_1","unstructured":"SCIPR Lab. 2016. libff. https:\/\/github.com\/scipr-lab\/libff. Accessed: 2018-07--28.  SCIPR Lab. 2016. libff. https:\/\/github.com\/scipr-lab\/libff. Accessed: 2018-07--28."},{"key":"e_1_3_2_2_91_1","unstructured":"SCIPR Lab. 2016. libfqfft. https:\/\/github.com\/scipr-lab\/libfqfft. Accessed: 2018-07--28.  SCIPR Lab. 2016. libfqfft. https:\/\/github.com\/scipr-lab\/libfqfft. Accessed: 2018-07--28."},{"key":"e_1_3_2_2_92_1","unstructured":"Victor Shoup. 2016. libntl. https:\/\/www.shoup.net\/ntl\/. Accessed: 2018-07--28.  Victor Shoup. 2016. libntl. https:\/\/www.shoup.net\/ntl\/. Accessed: 2018-07--28."},{"key":"e_1_3_2_2_93_1","unstructured":"Ryan Sleevi. 2017. Certificate Transparency in Chrome - Change to Enforcement Date. https:\/\/groups.google.com\/a\/chromium.org\/forum\/#!msg\/ct-policy\/sz_3W_xKBNY\/6jq2ghJXBAAJ. Accessed: 2018-04--20.  Ryan Sleevi. 2017. Certificate Transparency in Chrome - Change to Enforcement Date. https:\/\/groups.google.com\/a\/chromium.org\/forum\/#!msg\/ct-policy\/sz_3W_xKBNY\/6jq2ghJXBAAJ. Accessed: 2018-04--20."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"crossref","unstructured":"E. Syta I. Tamas D. Visher D. I. Wolinsky P. Jovanovic L. Gasser N. Gailly I. Khoffi and B. Ford. 2016. Keeping Authorities \u201cHonest or Bust\u201d with Decentralized Witness Cosigning. In IEEE S&P'16.  E. Syta I. Tamas D. Visher D. I. Wolinsky P. Jovanovic L. Gasser N. Gailly I. Khoffi and B. Ford. 2016. Keeping Authorities \u201cHonest or Bust\u201d with Decentralized Witness Cosigning. In IEEE S&P'16.","DOI":"10.1109\/SP.2016.38"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660355"},{"key":"e_1_3_2_2_96_1","volume-title":"Catena: Efficient Non-equivocation via Bitcoin","author":"Tomescu Alin","year":"2017","unstructured":"Alin Tomescu and Srinivas Devadas . 2017 . Catena: Efficient Non-equivocation via Bitcoin . In IEEE S &P'17. Alin Tomescu and Srinivas Devadas. 2017. Catena: Efficient Non-equivocation via Bitcoin. In IEEE S&P'17."},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660327"},{"key":"e_1_3_2_2_98_1","volume-title":"Modern Computer Algebra","author":"von zur Gathen Joachim","unstructured":"Joachim von zur Gathen and Jurgen Gerhard . 2013. Fast Euclidean Algorithm . In Modern Computer Algebra 3 rd ed.). Cambridge University Press , New York, NY, USA , Chapter 11, 313--333. Joachim von zur Gathen and Jurgen Gerhard. 2013. Fast Euclidean Algorithm. In Modern Computer Algebra 3rd ed.). Cambridge University Press, New York, NY, USA, Chapter 11, 313--333.","edition":"3"},{"key":"e_1_3_2_2_99_1","volume-title":"Modern Computer Algebra","author":"von zur Gathen Joachim","unstructured":"Joachim von zur Gathen and Jurgen Gerhard . 2013. Fast Multiplication . In Modern Computer Algebra 3 rd ed.). Cambridge University Press , New York, NY, USA , Chapter 8, 221--254. Joachim von zur Gathen and Jurgen Gerhard. 2013. Fast Multiplication. In Modern Computer Algebra 3rd ed.). Cambridge University Press, New York, NY, USA, Chapter 8, 221--254.","edition":"3"},{"key":"e_1_3_2_2_100_1","volume-title":"Modern Computer Algebra","author":"von zur Gathen Joachim","unstructured":"Joachim von zur Gathen and Jurgen Gerhard . 2013. Fast polynomial evaluation and interpolation . In Modern Computer Algebra 3 rd ed.). Cambridge University Press , New York, NY, USA , Chapter 10, 295--310. Joachim von zur Gathen and Jurgen Gerhard. 2013. Fast polynomial evaluation and interpolation. In Modern Computer Algebra 3rd ed.). Cambridge University Press, New York, NY, USA, Chapter 10, 295--310.","edition":"3"},{"key":"e_1_3_2_2_101_1","volume-title":"Justin Thaler, and Michael Walfish.","author":"Wahby Riad S.","year":"2018","unstructured":"Riad S. Wahby , Ioanna Tzialla , abhi shelat , Justin Thaler, and Michael Walfish. 2018 . Doubly-Efficient zkSNARKs Without Trusted Setup. In IEEE S &P'18. Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, and Michael Walfish. 2018. Doubly-Efficient zkSNARKs Without Trusted Setup. In IEEE S&P'18."},{"key":"e_1_3_2_2_102_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","author":"Wood Gavin","year":"2015","unstructured":"Gavin Wood . 2015 . Ethereum: A Secure Decentralised Generalised Transaction Ledger . http:\/\/gavwood.com\/paper.pdf. Accessed: 2016-05--15. Gavin Wood. 2015. Ethereum: A Secure Decentralised Generalised Transaction Ledger. http:\/\/gavwood.com\/paper.pdf. Accessed: 2016-05--15."},{"key":"e_1_3_2_2_103_1","volume-title":"DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security '18","author":"Wu Howard","year":"2018","unstructured":"Howard Wu , Wenting Zheng , Alessandro Chiesa , Raluca Ada Popa , and Ion Stoica . 2018 . DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security '18 . Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security '18."},{"key":"e_1_3_2_2_104_1","article-title":"DTKI","volume":"59","author":"Yu Jiangshan","year":"2016","unstructured":"Jiangshan Yu , Vincent Cheval , and Mark Ryan . 2016 . DTKI : A New Formalized PKI with Verifiable Trusted Parties. Comput. J. , Vol. 59 , 11 (2016). Jiangshan Yu, Vincent Cheval, and Mark Ryan. 2016. DTKI: A New Formalized PKI with Verifiable Trusted Parties. Comput. J., Vol. 59, 11 (2016).","journal-title":"A New Formalized PKI with Verifiable Trusted Parties. Comput. J."},{"key":"e_1_3_2_2_105_1","unstructured":"Zcash. 2017. What is Jubjub. https:\/\/z.cash\/technology\/jubjub\/. Accessed: 2019-02-03.  Zcash. 2017. What is Jubjub. https:\/\/z.cash\/technology\/jubjub\/. Accessed: 2019-02-03."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345652","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:01Z","timestamp":1750202641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":100,"alternative-id":["10.1145\/3319535.3345652","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3345652","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}