{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:59:07Z","timestamp":1760623147993,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338498.3358653","type":"proceedings-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T18:15:00Z","timestamp":1573496100000},"page":"50-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["zksk"],"prefix":"10.1145","author":[{"given":"Wouter","family":"Lueks","sequence":"first","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Bogdan","family":"Kulynych","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Jules","family":"Fasquelle","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Simon","family":"Le Bail-Collet","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"volume-title":"Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios","author":"Adida Ben","key":"e_1_3_2_1_1_1","unstructured":"Ben Adida , Olivier de Marneffe , Olivier Pereira , and Jean-Jacques Quisquater . 2009. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios . In EVT\/WOTE. USENIX Association . Ben Adida, Olivier de Marneffe, Olivier Pereira, and Jean-Jacques Quisquater. 2009. Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. In EVT\/WOTE. USENIX Association."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Jos\u00e9 Bacelar Almeida Endre Bangerter Manuel Barbosa Stephan Krenn Ahmad-Reza Sadeghi and Thomas Schneider. 2010. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. In ESORICS. 151--167.  Jos\u00e9 Bacelar Almeida Endre Bangerter Manuel Barbosa Stephan Krenn Ahmad-Reza Sadeghi and Thomas Schneider. 2010. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. In ESORICS. 151--167.","DOI":"10.1007\/978-3-642-15497-3_10"},{"volume-title":"Constant-Size Dynamic k-TAA","author":"Au Man Ho","key":"e_1_3_2_1_3_1","unstructured":"Man Ho Au , Willy Susilo , and Yi Mu. 2006. Constant-Size Dynamic k-TAA . In SCN. Springer . Man Ho Au, Willy Susilo, and Yi Mu. 2006. Constant-Size Dynamic k-TAA. In SCN. Springer."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Shafi Goldwasser. 1997. Verifiable Partial Key Escrow. In ACM CCS .  Mihir Bellare and Shafi Goldwasser. 1997. Verifiable Partial Key Escrow. In ACM CCS .","DOI":"10.1145\/266420.266439"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium. 781--796","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 . Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture . In USENIX Security Symposium. 781--796 . Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In USENIX Security Symposium. 781--796."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"David Bernhard Olivier Pereira and Bogdan Warinschi. 2012. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. In ASIACRYPT. 626--643.  David Bernhard Olivier Pereira and Bogdan Warinschi. 2012. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. In ASIACRYPT. 626--643.","DOI":"10.1007\/978-3-642-34961-4_38"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Markus Stadler. 1997. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In CRYPTO. 410--424.  Jan Camenisch and Markus Stadler. 1997. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In CRYPTO. 410--424.","DOI":"10.1007\/BFb0052252"},{"key":"e_1_3_2_1_8_1","unstructured":"Ivan Damg\u00e5rd. 2010. On \u03a3-protocols. http:\/\/www.cs.au.dk\/ ivan\/Sigma.pdf  Ivan Damg\u00e5rd. 2010. On \u03a3-protocols. http:\/\/www.cs.au.dk\/ ivan\/Sigma.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0026"},{"key":"e_1_3_2_1_10_1","unstructured":"Henry de Valence. 2019. zkp: a toolkit for Schnorr proofs. https:\/\/medium.com\/@hdevalence\/zkp-a-toolkit-for-schnorr-proofs-6e381b4f0a31  Henry de Valence. 2019. zkp: a toolkit for Schnorr proofs. https:\/\/medium.com\/@hdevalence\/zkp-a-toolkit-for-schnorr-proofs-6e381b4f0a31"},{"key":"e_1_3_2_1_11_1","first-page":"629","article-title":"SCAPI: The Secure Computation Application Programming Interface","volume":"2012","author":"Ejgenberg Yael","year":"2012","unstructured":"Yael Ejgenberg , Moriya Farbstein , Meital Levy , and Yehuda Lindell . 2012 . SCAPI: The Secure Computation Application Programming Interface . IACR Cryptology ePrint Archive , Vol. 2012 (2012), 629 . Yael Ejgenberg, Moriya Farbstein, Meital Levy, and Yehuda Lindell. 2012. SCAPI: The Secure Computation Application Programming Interface. IACR Cryptology ePrint Archive , Vol. 2012 (2012), 629.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Amos Fiat and Adi Shamir. 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO. 186--194.  Amos Fiat and Adi Shamir. 1986. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO. 186--194.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_1_15_1","volume-title":"LIBSCAPI -- The Secure Computation API . https:\/\/github.com\/cryptobiu\/libscapi Last accessed","author":"Bar Ilan University Cryptography Research Group. 2019.","year":"2019","unstructured":"Bar Ilan University Cryptography Research Group. 2019. LIBSCAPI -- The Secure Computation API . https:\/\/github.com\/cryptobiu\/libscapi Last accessed : July 9, 2019 . Bar Ilan University Cryptography Research Group. 2019. LIBSCAPI -- The Secure Computation API . https:\/\/github.com\/cryptobiu\/libscapi Last accessed: July 9, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Ryan Henry and Ian Goldberg. 2013. Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. In WPES.  Ryan Henry and Ian Goldberg. 2013. Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting. In WPES.","DOI":"10.1145\/2517840.2517855"},{"key":"e_1_3_2_1_17_1","unstructured":"Sarah Jamie Lewis Olivier Pereira and Vanessa Teague. 2019 a. Addendum to How not to prove your election outcome. https:\/\/people.eng.unimelb.edu.au\/vjteague\/HowNotToProveElectionOutcomeAddendum.pdf  Sarah Jamie Lewis Olivier Pereira and Vanessa Teague. 2019 a. Addendum to How not to prove your election outcome. https:\/\/people.eng.unimelb.edu.au\/vjteague\/HowNotToProveElectionOutcomeAddendum.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"Sarah Jamie Lewis Olivier Pereira and Vanessa Teague. 2019 b. How not to prove your election outcome. https:\/\/people.eng.unimelb.edu.au\/vjteague\/HowNotToProveElectionOutcome.pdf  Sarah Jamie Lewis Olivier Pereira and Vanessa Teague. 2019 b. How not to prove your election outcome. https:\/\/people.eng.unimelb.edu.au\/vjteague\/HowNotToProveElectionOutcome.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Simon Le Bail-Collet, and Carmela Troncoso","author":"Lueks Wouter","year":"2019","unstructured":"Wouter Lueks , Bogdan Kulynych , Jules Fasquelle , Simon Le Bail-Collet, and Carmela Troncoso . 2019 . zksk: A Library for Composable Zero-Knowledge Proofs . (2019). https:\/\/doi.org\/10.6084\/m9.figshare.9752087 10.6084\/m9.figshare.9752087 Wouter Lueks, Bogdan Kulynych, Jules Fasquelle, Simon Le Bail-Collet, and Carmela Troncoso. 2019. zksk: A Library for Composable Zero-Knowledge Proofs. (2019). https:\/\/doi.org\/10.6084\/m9.figshare.9752087"},{"key":"e_1_3_2_1_20_1","volume-title":"ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. In USENIX Security Symposium .","author":"Meiklejohn Sarah","year":"2010","unstructured":"Sarah Meiklejohn , C. Christopher Erway , Alptekin K\u00fc pcc \u00fc, Theodora Hinkle , and Anna Lysyanskaya . 2010 . ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. In USENIX Security Symposium . Sarah Meiklejohn, C. Christopher Erway, Alptekin K\u00fc pcc \u00fc, Theodora Hinkle, and Anna Lysyanskaya. 2010. ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_21_1","volume-title":"CRYPTO","volume":"435","author":"Schnorr Claus-Peter","year":"1989","unstructured":"Claus-Peter Schnorr . 1989 . Efficient Identification and Signatures for Smart Cards . In CRYPTO , Vol. 435 . Claus-Peter Schnorr. 1989. Efficient Identification and Signatures for Smart Cards. In CRYPTO , Vol. 435."},{"key":"e_1_3_2_1_22_1","volume-title":"Interval Proofs Revisisted. In Workshop Frontiers in Electronic Elections .","author":"Schoenmakers Berry","year":"2005","unstructured":"Berry Schoenmakers . 2005 . Interval Proofs Revisisted. In Workshop Frontiers in Electronic Elections . Berry Schoenmakers. 2005. Interval Proofs Revisisted. In Workshop Frontiers in Electronic Elections ."},{"key":"e_1_3_2_1_23_1","volume-title":"d.]. emmy - Library for zero-knowledge proofs. https:\/\/github.com\/xlab-si\/emmy Last accessed","author":"XLAB.","year":"2019","unstructured":"XLAB. [n. d.]. emmy - Library for zero-knowledge proofs. https:\/\/github.com\/xlab-si\/emmy Last accessed : July 9, 2019 . XLAB. [n. d.]. emmy - Library for zero-knowledge proofs. https:\/\/github.com\/xlab-si\/emmy Last accessed: July 9, 2019."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338498.3358653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358653"}},"subtitle":["A Library for Composable Zero-Knowledge Proofs"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":23,"alternative-id":["10.1145\/3338498.3358653","10.1145\/3338498"],"URL":"https:\/\/doi.org\/10.1145\/3338498.3358653","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}