{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:04Z","timestamp":1773512584039,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484802","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"3465-3486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Generalized Proof of Liabilities"],"prefix":"10.1145","author":[{"given":"Yan","family":"Ji","sequence":"first","affiliation":[{"name":"Cornell Tech &amp; IC3, New York, NY, USA"}]},{"given":"Konstantinos","family":"Chalkias","sequence":"additional","affiliation":[{"name":"Novi \/ Facebook, Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Niko Bari\u0107 and Birgit Pfitzmann. 1997. Collision-free accumulators and fail-stop signature schemes without trees. In Eurocrypt.","DOI":"10.1007\/3-540-69053-0_33"},{"key":"e_1_3_2_2_3_1","volume-title":"Breaking the O (n\/sup 1\/(2k-1)\/) barrier for information-theoretic Private Information Retrieval","author":"Beimel Amos","unstructured":"Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and J-F Raymond. 2002. Breaking the O (n\/sup 1\/(2k-1)\/) barrier for information-theoretic Private Information Retrieval. In IEEE FOCS."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.50372"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Josh Benaloh and Michael De Mare. 1993. One-way accumulators: A decentralized alternative to digital signatures. In Eurocrypt.","DOI":"10.1007\/3-540-48285-7_24"},{"key":"e_1_3_2_2_6_1","unstructured":"Josh Benaloh and Eric Lazarus. 2011. The trash attack: An attack on verifiable voting systems and a simple mitigation. Technical Report. MSR-TR-2011--115 Microsoft."},{"key":"e_1_3_2_2_7_1","unstructured":"Bitfury. 2013. On Blockchain Auditability. White Paper."},{"key":"e_1_3_2_2_8_1","unstructured":"Bitfury. 2016. On Blockchain Auditability. https:\/\/bitfury.com\/content\/downloads\/bitfury_white_paper_on_blockchain_auditability.pdf."},{"key":"e_1_3_2_2_9_1","unstructured":"Blake3-team. 2021. Blake3. https:\/\/github.com\/BLAKE3-team\/BLAKE3\/."},{"key":"e_1_3_2_2_10_1","unstructured":"Sean Bowe Jack Grigg and Daira Hopwood. 2019. Recursive proof composition without a trusted setup. Technical Report. Cryptology ePrint Archive Report 2019\/1021 2019. https:\/\/eprint. iacr. org ?."},{"key":"e_1_3_2_2_11_1","volume-title":"Bulletproofs: Short proofs for confidential transactions and more. In S&P.","author":"B\u00fcnz Benedikt","year":"2018","unstructured":"Benedikt B\u00fcnz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In S&P."},{"key":"e_1_3_2_2_12_1","unstructured":"Vitalik Buterin. 2021. Why sharding is great: demystifying the technical properties. https:\/\/vitalik.ca\/general\/2021\/04\/07\/sharding.html."},{"key":"e_1_3_2_2_13_1","unstructured":"Philippe Camacho. 2014. Secure Protocols for Provable Security. https:\/\/www.slideshare.net\/philippecamacho\/protocols-for-provable-solvency-38501620."},{"key":"e_1_3_2_2_14_1","unstructured":"Philippe Camacho Alejandro Hevia Marcos Kiwi and Roberto Opazo. 2008. Strong accumulators from collision-resistant hashing. In ISC."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Crypto.","DOI":"10.1007\/3-540-45708-9_5"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134010"},{"key":"e_1_3_2_2_17_1","unstructured":"Konstantinos Chalkias Francc ois Garillot Yashvanth Kondi and Valeria Nikolaenko. [n. d.]. Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures. ( [n. d.])."},{"key":"e_1_3_2_2_18_1","unstructured":"Konstantinos Chalkias Yan Ji and Irakliy Khaburzaniya. 2021. Rust DAPOL"},{"key":"e_1_3_2_2_19_1","unstructured":"library. https:\/\/github.com\/novifinancial\/solvency."},{"key":"e_1_3_2_2_20_1","unstructured":"Konstantinos Chalkias Kevin Lewi Payman Mohassel and Valeria Nikolaenko. 2019. Practical Privacy Preserving Proofs of Solvency. Amsterdam ZKProof Community Event."},{"key":"e_1_3_2_2_21_1","volume-title":"Distributed Auditing Proofs of Liabilities. 3rd ZKProof Workshop. ZKProof","author":"Chalkias Konstantinos","year":"2020","unstructured":"Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, and Valeria Nikolaenko. 2020. Distributed Auditing Proofs of Liabilities. 3rd ZKProof Workshop. ZKProof (2020)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Melissa Chase Apoorvaa Deshpande Esha Ghosh and Harjasleen Malvai. 2019. SEEMless: Secure End-to-End Encrypted Messaging with less Trust. In ACM CCS.","DOI":"10.1145\/3319535.3363202"},{"key":"e_1_3_2_2_23_1","unstructured":"Panagiotis Chatzigiannis Foteini Baldimtsi and Konstantinos Chalkias. [n. d.]. SoK: Auditability and Accountability in Distributed Payment Systems. ( [n. d.])."},{"key":"e_1_3_2_2_24_1","volume-title":"Private information retrieval","author":"Chor Benny","unstructured":"Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. 1995. Private information retrieval. In IEEE FOCS."},{"key":"e_1_3_2_2_25_1","unstructured":"CoinMarketCap. 2021. Today's Cryptocurrency Prices by Market Cap. https:\/\/coinmarketcap.com\/."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813674"},{"key":"e_1_3_2_2_27_1","unstructured":"Etherscan. 2021. Ethereum Gas Tracker. https:\/\/etherscan.io\/gastracker."},{"key":"e_1_3_2_2_28_1","unstructured":"FATF. 2020. 12-Month Review of the Revised FATF Standards on Virtual Assets and Virtual Asset Service Providers."},{"key":"e_1_3_2_2_29_1","unstructured":"Centers for Disease Control and Prevention. 2020. Cases and Deaths in the U.S. https:\/\/www.cdc.gov\/coronavirus\/2019-ncov\/cases-updates\/us-cases-deaths.html."},{"key":"e_1_3_2_2_30_1","unstructured":"Reid Forgrave. 2018. The Man Who Cracked the Lottery. The New York Times."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_2"},{"key":"e_1_3_2_2_32_1","first-page":"953","article-title":"PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge","volume":"2019","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon, Zachary J Williamson, and Oana Ciobotaru. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. IACR Cryptol. ePrint Arch., Vol. 2019 (2019), 953.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_33_1","volume-title":"Zero-knowledge Proofs: Efficient Techniques for Combination Statements and their Applications. Ph.,D. Dissertation","author":"Ganesh Chaya","year":"2017","unstructured":"Chaya Ganesh. 2017. Zero-knowledge Proofs: Efficient Techniques for Combination Statements and their Applications. Ph.,D. Dissertation. New York University."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Christina Garman Matthew Green and Ian Miers. 2014. Decentralized Anonymous Credentials.. In NDSS. Citeseer.","DOI":"10.14722\/ndss.2014.23253"},{"key":"e_1_3_2_2_35_1","volume-title":"Crypto Valley Conference on Blockchain Technology.","author":"Peter Gavz","year":"2018","unstructured":"Peter Gavz i, Aggelos Kiayias, and Alexander Russell. 2018. Stake-bleeding attacks on proof-of-stake blockchains. In Crypto Valley Conference on Blockchain Technology."},{"key":"e_1_3_2_2_36_1","unstructured":"Ashrujit Ghoshal and Stefano Tessaro. 2020. Tight State-Restoration Soundness in the Algebraic Group Model. Technical Report. Cryptology ePrint Archive Report 2020\/1351."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich. 1987. Towards a theory of software protection and simulation by oblivious RAMs. In ACM STOC.","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_2_40_1","unstructured":"Seena Gressin. 2017. The Equifax Data Breach: What to Do. Federal Trade Commission."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_42_1","volume-title":"International Workshop on Formal Aspects in Security and Trust. Springer, 242--256","author":"Heather James","year":"2008","unstructured":"James Heather and David Lundin. 2008. The append-only web bulletin board. In International Workshop on Formal Aspects in Security and Trust. Springer, 242--256."},{"key":"e_1_3_2_2_43_1","unstructured":"Chabeli Herrera. 2016. Largest lawsuit against an auditor goes to court for $5.5 billion. https:\/\/www.miamiherald.com\/news\/business\/banking\/article92700782.html."},{"key":"e_1_3_2_2_44_1","volume-title":"Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications. Computers & Security","author":"Hu Kexin","year":"2019","unstructured":"Kexin Hu, Zhenfeng Zhang, and Kaiwen Guo. 2019. Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications. Computers & Security (2019)."},{"key":"e_1_3_2_2_45_1","unstructured":"Julia Kagan. 2020. Bank Failure. https:\/\/www.investopedia.com\/terms\/b\/bank-failure.asp."},{"key":"e_1_3_2_2_46_1","volume-title":"Audit value and charitable organizations. Journal of Accounting and Public Policy","author":"Kitching Karen","year":"2009","unstructured":"Karen Kitching. 2009. Audit value and charitable organizations. Journal of Accounting and Public Policy (2009)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk. 2010. Cryptographic extraction and key derivation: The HKDF scheme. In Crypto.","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"e_1_3_2_2_48_1","volume-title":"Clash attacks on the verifiability of e-voting systems","author":"Kusters Ralf","unstructured":"Ralf Kusters, Tomasz Truderung, and Andreas Vogt. 2012. Clash attacks on the verifiability of e-voting systems. In IEEE S&P."},{"key":"e_1_3_2_2_49_1","volume-title":"Resource pools and the cap theorem. arXiv preprint arXiv:2006.10698","author":"Lewis-Pye Andrew","year":"2020","unstructured":"Andrew Lewis-Pye and Tim Roughgarden. 2020. Resource pools and the cap theorem. arXiv preprint arXiv:2006.10698 (2020)."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Helger Lipmaa. 2005. An oblivious transfer protocol with log-squared communication. In ISC.","DOI":"10.1007\/11556992_23"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","unstructured":"Helger Lipmaa. 2009. First CPIR protocol with data-dependent computation. In ICISC.","DOI":"10.1007\/978-3-642-14423-3_14"},{"key":"e_1_3_2_2_52_1","unstructured":"Isis Agora Lovecruft and Henry de Valence. [n. d.]. curve25519-dalek. https:\/\/github.com\/dalek-cryptography\/curve25519-dalek."},{"key":"e_1_3_2_2_53_1","unstructured":"Robert McMillan. 2014. The Inside Story of Mt. Gox Bitcoin's $460 Million Disaster. https:\/\/www.wired.com\/2014\/03\/bitcoin-exchange\/."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Crypto.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"e_1_3_2_2_55_1","volume-title":"10 AMAZON STATISTICS YOU NEED TO KNOW IN 2020 [INFOGRAPHIC]. https:\/\/www.oberlo.com\/blog\/amazon-statistics.","author":"Mohsin Maryam","year":"2020","unstructured":"Maryam Mohsin. 2020. 10 AMAZON STATISTICS YOU NEED TO KNOW IN 2020 [INFOGRAPHIC]. https:\/\/www.oberlo.com\/blog\/amazon-statistics."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"Tyler Moore and Nicolas Christin. 2013. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In FC.","DOI":"10.1007\/978-3-642-39884-1_3"},{"key":"e_1_3_2_2_57_1","unstructured":"Chamber of Digital Commerce. 2021. Proof of Reserves -- Establishing Best Practices to Build Trust in the Digital Assets Industry. https:\/\/4actl02jlq5u2o7ouq1ymaad-wpengine.netdna-ssl.com\/wp-content\/uploads\/2021\/05\/Proof-of-Reserves-.pdf."},{"key":"e_1_3_2_2_58_1","unstructured":"U.S. Bureau of Labor Statistics. 2015. How the Government Measures Unemployment. https:\/\/www.bls.gov\/cps\/cps_htgm.htm."},{"key":"e_1_3_2_2_59_1","unstructured":"U.S. Bureau of Labor Statistics. 2017. Counting injuries and illnesses in the workplace: an international review. https:\/\/www.bls.gov\/opub\/mlr\/2017\/article\/counting-injuries-and-illnesses-in-the-workplace.htm."},{"key":"e_1_3_2_2_60_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 158--172","author":"Olumofin Femi","year":"2011","unstructured":"Femi Olumofin and Ian Goldberg. 2011. Revisiting the computational practicality of private information retrieval. In International Conference on Financial Cryptography and Data Security. Springer, 158--172."},{"key":"e_1_3_2_2_61_1","unstructured":"Torben Pryds Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Crypto."},{"key":"e_1_3_2_2_62_1","volume-title":"Where does money come from","author":"Ryan-Collins Josh","year":"2012","unstructured":"Josh Ryan-Collins, Tony Greenham, Richard Werner, and Andrew Jackson. 2012. Where does money come from. London: New Economics Foundation. Pg, Vol. 7 (2012)."},{"key":"e_1_3_2_2_63_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium. Internet Society","author":"Sion Radu","year":"2007","unstructured":"Radu Sion and Bogdan Carbunar. 2007. On the computational practicality of private information retrieval. In Proceedings of the Network and Distributed Systems Security Symposium. Internet Society, 2006--06."},{"key":"e_1_3_2_2_64_1","volume-title":"Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas.","author":"Stefanov Emil","year":"2013","unstructured":"Emil Stefanov, Marten Van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2013. Path ORAM: an extremely simple oblivious RAM protocol. In ACM CCS."},{"key":"e_1_3_2_2_65_1","unstructured":"USA.gov. 2020. Credit Reports and Scores. https:\/\/www.usa.gov\/credit-reports."},{"key":"e_1_3_2_2_66_1","unstructured":"Henry de Valence Cathie Yun and Oleg Andreev. 2020. Rust Bulletproofs library. https:\/\/github.com\/dalek-cryptography\/bulletproofs."},{"key":"e_1_3_2_2_67_1","first-page":"963","article-title":"Financial accountability in charitable organizations: Mandating an audit committee function. Chi.","volume":"77","author":"Vanderwarren Karyn R","year":"2001","unstructured":"Karyn R Vanderwarren. 2001. Financial accountability in charitable organizations: Mandating an audit committee function. Chi.-Kent L. Rev., Vol. 77 (2001), 963.","journal-title":"-Kent L. Rev."},{"key":"e_1_3_2_2_68_1","unstructured":"Surya Viswanathan and Aakash Shah. 2018. The Scalability Trilemma in Blockchain. https:\/\/aakash-111.medium.com\/the-scalability-trilemma-in-blockchain-75fb57f646df."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Shuhong Wang Xuhua Ding Robert H Deng and Feng Bao. 2006. Private information retrieval using trusted hardware. In Esorics.","DOI":"10.1007\/11863908_4"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"crossref","unstructured":"Xiao Wang Hubert Chan and Elaine Shi. 2015. Circuit oram: On tightness of the goldreich-ostrovsky lower bound. In ACM CCS.","DOI":"10.1145\/2810103.2813634"},{"key":"e_1_3_2_2_71_1","unstructured":"Wikipedia. 2019. 2004 Chinese lottery scandal. https:\/\/en.wikipedia.org\/wiki\/2004_Chinese_lottery_scandal."},{"key":"e_1_3_2_2_72_1","unstructured":"Wikipedia. 2020. Hot Lotto fraud scandal. https:\/\/en.wikipedia.org\/wiki\/Hot_Lotto_fraud_scandal."},{"key":"e_1_3_2_2_73_1","unstructured":"Wikipedia. 2021. Enron scandal. https:\/\/en.wikipedia.org\/wiki\/Enron_scandal."},{"key":"e_1_3_2_2_74_1","unstructured":"Zak Wilcox. 2014. Proving your bitcoin reserves. https:\/\/bitcointalk.org\/index.php?topic=595180.0."},{"key":"e_1_3_2_2_75_1","unstructured":"Gavin Wood. 2014. Ethereum yellow paper. (2014)."},{"key":"e_1_3_2_2_76_1","volume-title":"World Population Clock: 7.8 Billion People","year":"2020","unstructured":"Worldmeters. 2020. World Population Clock: 7.8 Billion People (2020). worldometers.info."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964114.1964119"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:46:40Z","timestamp":1763498800000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":77,"alternative-id":["10.1145\/3460120.3484802","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484802","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}