{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:04:11Z","timestamp":1772240651539,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Initiative for Cryptocurrencies and Contracts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3524128","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"393-407","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Aggregating and Thresholdizing Hash-based Signatures using STARKs"],"prefix":"10.1145","author":[{"given":"Irakliy","family":"Khaburzaniya","sequence":"first","affiliation":[{"name":"Polygon &amp; Meta, Menlo Park, CA, USA"}]},{"given":"Konstantinos","family":"Chalkias","sequence":"additional","affiliation":[{"name":"Meta, Menlo Park, CA, USA"}]},{"given":"Kevin","family":"Lewi","sequence":"additional","affiliation":[{"name":"Meta, Menlo Park, CA, USA"}]},{"given":"Harjasleen","family":"Malvai","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign &amp; IC3, Champaign-Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NIST","author":"Alagic G.","year":"2020","unstructured":"G. Alagic , J. Alperin-Sheriff , D. Apon , D. Cooper , Q. Dang , J. Kelsey , Y.-K. Liu , C. Miller , D. Moody , R. Peralta , Status report on the second round of the nist post-quantum cryptography standardization process. US Department of Commerce , NIST , 2020 . G. Alagic, J. Alperin-Sheriff, D. Apon, D. Cooper, Q. Dang, J. Kelsey, Y.-K. Liu, C. Miller, D. Moody, R. Peralta, et al. Status report on the second round of the nist post-quantum cryptography standardization process. US Department of Commerce, NIST, 2020."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.i3.1-45"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"IACR Transactions on Symmetric Cryptology","author":"Ashur T.","year":"2020","unstructured":"T. Ashur , S. Dhooghe , and A. Szepieniec . Rescue-prime: a standard specification (sok) . IACR Transactions on Symmetric Cryptology , pages 1 -- 16 , 2020 . T. Ashur, S. Dhooghe, and A. Szepieniec. Rescue-prime: a standard specification (sok). IACR Transactions on Symmetric Cryptology, pages 1--16, 2020."},{"key":"e_1_3_2_1_6_1","unstructured":"A. authors. STARK prover and verifier (Rust implementation). https:\/\/github.com\/anonauthorsub\/asiaccs_2021_440.  A. authors. STARK prover and verifier (Rust implementation). https:\/\/github.com\/anonauthorsub\/asiaccs_2021_440."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/www.crowdcast.io\/e\/recursive-starks","author":"Ben-Sasson E.","year":"2020","unstructured":"E. Ben-Sasson . Recursive STAR Ks . https:\/\/www.crowdcast.io\/e\/recursive-starks , 2020 . E. Ben-Sasson. Recursive STARKs. https:\/\/www.crowdcast.io\/e\/recursive-starks, 2020."},{"key":"e_1_3_2_1_8_1","volume-title":"Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch","author":"Ben-Sasson E.","year":"2018","unstructured":"E. Ben-Sasson , I. Bentov , Y. Horesh , and M. Riabzev . Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch ., 2018 :46, 2018. E. Ben-Sasson, I. Bentov, Y. Horesh, and M. Riabzev. Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch., 2018:46, 2018."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"e_1_3_2_1_12_1","volume-title":"Average Transactions Per Block. https:\/\/www.blockchain.com\/charts\/n-transactions-per-block","year":"2021","unstructured":"Blockchain-Charts. Average Transactions Per Block. https:\/\/www.blockchain.com\/charts\/n-transactions-per-block , 2021 . Blockchain-Charts. Average Transactions Per Block. https:\/\/www.blockchain.com\/charts\/n-transactions-per-block, 2021."},{"key":"e_1_3_2_1_13_1","volume-title":"A lattice-based universal thresholdizer for cryptographic systems. IACR Cryptol. ePrint Arch","author":"Boneh D.","year":"2017","unstructured":"D. Boneh , R. Gennaro , S. Goldfeder , and S. Kim . A lattice-based universal thresholdizer for cryptographic systems. IACR Cryptol. ePrint Arch ., 2017 :251, 2017. D. Boneh, R. Gennaro, S. Goldfeder, and S. Kim. A lattice-based universal thresholdizer for cryptographic systems. IACR Cryptol. ePrint Arch., 2017:251, 2017."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766207"},{"key":"e_1_3_2_1_15_1","volume-title":"A survey of two signature aggregation techniques","author":"Boneh D.","year":"2003","unstructured":"D. Boneh , C. Gentry , B. Lynn , H. Shacham , A survey of two signature aggregation techniques , 2003 . D. Boneh, C. Gentry, B. Lynn, H. Shacham, et al. A survey of two signature aggregation techniques, 2003."},{"key":"e_1_3_2_1_16_1","unstructured":"D. Boneh and S. Kim. One-time and interactive aggregate signatures from lattices.  D. Boneh and S. Kim. One-time and interactive aggregate signatures from lattices."},{"key":"e_1_3_2_1_18_1","volume-title":"August, 1: 15","author":"Brown R. G.","year":"2016","unstructured":"R. G. Brown , J. Carlyle , I. Grigg , and M. Hearn . Corda: an introduction. R3 CEV , August, 1: 15 , 2016 . R. G. Brown, J. Carlyle, I. Grigg, and M. Hearn. Corda: an introduction. R3 CEV, August, 1:15, 2016."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21969-6_23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"e_1_3_2_1_21_1","volume-title":"Applied Crypto Symposium","author":"Chalkias K.","year":"2020","unstructured":"K. Chalkias , M. Baudet , Y. Sun , and D. Wong . Hash-based signatures for blockchains . Applied Crypto Symposium , 2020 . https:\/\/drive.google.com\/file\/d\/1pPdJhThmJCnTKBlqbEE32G31T5ELzG19. K. Chalkias, M. Baudet, Y. Sun, and D. Wong. Hash-based signatures for blockchains. Applied Crypto Symposium, 2020. https:\/\/drive.google.com\/file\/d\/1pPdJhThmJCnTKBlqbEE32G31T5ELzG19."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36033-7_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_27"},{"key":"e_1_3_2_1_26_1","first-page":"208","article-title":"Recommendation for stateful hash-based signature schemes","volume":"800","author":"Cooper D. A.","year":"2020","unstructured":"D. A. Cooper , D. C. Apon , Q. H. Dang , M. S. Davidson , M. J. Dworkin , and C. A. Miller . Recommendation for stateful hash-based signature schemes . NIST Special Publication , 800 : 208 , 2020 . D. A. Cooper, D. C. Apon, Q. H. Dang, M. S. Davidson, M. J. Dworkin, and C. A. Miller. Recommendation for stateful hash-based signature schemes. NIST Special Publication, 800:208, 2020.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_7"},{"key":"e_1_3_2_1_28_1","volume-title":"Mmsat: A scheme for multimessage multiuser signature aggregation. IACR Cryptol. ePrint Arch","author":"Dor\u00f6z Y.","year":"2020","unstructured":"Y. Dor\u00f6z , J. Hoffstein , J. H. Silverman , and B. Sunar . Mmsat: A scheme for multimessage multiuser signature aggregation. IACR Cryptol. ePrint Arch ., 2020 . Y. Dor\u00f6z, J. Hoffstein, J. H. Silverman, and B. Sunar. Mmsat: A scheme for multimessage multiuser signature aggregation. IACR Cryptol. ePrint Arch., 2020."},{"key":"e_1_3_2_1_29_1","volume-title":"May","author":"Drake J.","year":"2018","unstructured":"J. Drake . Pragmatic signature aggregation with bls , May 2018 . J. Drake. Pragmatic signature aggregation with bls, May 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_9"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"e_1_3_2_1_32_1","volume-title":"Plumo: Towards scalable interoperable blockchains using ultra light validation systems","author":"Gabizon A.","year":"2020","unstructured":"A. Gabizon , K. Gurkan , P. Jovanovic , G. Konstantopoulos , A. Oines , M. Olszewski , M. Straka , E. Tromer , and P. Vesely . Plumo: Towards scalable interoperable blockchains using ultra light validation systems , 2020 . A. Gabizon, K. Gurkan, P. Jovanovic, G. Konstantopoulos, A. Oines, M. Olszewski, M. Straka, E. Tromer, and P. Vesely. Plumo: Towards scalable interoperable blockchains using ultra light validation systems, 2020."},{"key":"e_1_3_2_1_33_1","volume-title":"Cairo--a turing-complete stark-friendly cpu architecture. Cryptology ePrint Archive","author":"Goldberg L.","year":"2021","unstructured":"L. Goldberg , S. Papini , and M. Riabzev . Cairo--a turing-complete stark-friendly cpu architecture. Cryptology ePrint Archive , 2021 . L. Goldberg, S. Papini, and M. Riabzev. Cairo--a turing-complete stark-friendly cpu architecture. Cryptology ePrint Archive, 2021."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 30th USENIX Security Symposium. USENIX Association","author":"Grassi L.","year":"2020","unstructured":"L. Grassi , D. Khovratovich , C. Rechberger , A. Roy , and M. Schofnegger . Poseidon: A new hash function for zero-knowledge proof systems . In Proceedings of the 30th USENIX Security Symposium. USENIX Association , 2020 . L. Grassi, D. Khovratovich, C. Rechberger, A. Roy, and M. Schofnegger. Poseidon: A new hash function for zero-knowledge proof systems. In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 2020."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38553-7_10"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243805"},{"key":"e_1_3_2_1_37_1","volume-title":"Frost: Flexible round-optimized schnorr threshold signatures","author":"Komlo C.","year":"2020","unstructured":"C. Komlo and I. Goldberg . Frost: Flexible round-optimized schnorr threshold signatures . 2020 . C. Komlo and I. Goldberg. Frost: Flexible round-optimized schnorr threshold signatures. 2020."},{"key":"e_1_3_2_1_38_1","volume-title":"abhi shelat, and E. Shi. C$ptysetcptyset$: A framework for building composable zero-knowledge proofs. Cryptology ePrint Archive","author":"Kosba A.","year":"2015","unstructured":"A. Kosba , Z. Zhao , A. Miller , Y. Qian , H. Chan , C. Papamanthou , R. Pass , abhi shelat, and E. Shi. C$ptysetcptyset$: A framework for building composable zero-knowledge proofs. Cryptology ePrint Archive , 2015 . https:\/\/eprint.iacr.org\/2015\/1093. A. Kosba, Z. Zhao, A. Miller, Y. Qian, H. Chan, C. Papamanthou, R. Pass, abhi shelat, and E. Shi. C$ptysetcptyset$: A framework for building composable zero-knowledge proofs. Cryptology ePrint Archive, 2015. https:\/\/eprint.iacr.org\/2015\/1093."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881456"},{"key":"e_1_3_2_1_40_1","volume-title":"Matter labs announces $50m in new funding for zksync. https:\/\/blog.matter-labs.io\/funding-ea89c1fa731e","author":"Labs M.","year":"2021","unstructured":"M. Labs . Matter labs announces $50m in new funding for zksync. https:\/\/blog.matter-labs.io\/funding-ea89c1fa731e , 2021 . M. Labs. Matter labs announces $50m in new funding for zksync. https:\/\/blog.matter-labs.io\/funding-ea89c1fa731e, 2021."},{"key":"e_1_3_2_1_42_1","first-page":"218","volume-title":"Conference on the Theory and Application of Cryptology","author":"Merkle R. C.","year":"1989","unstructured":"R. C. Merkle . A certified digital signature . In Conference on the Theory and Application of Cryptology , pages 218 -- 238 . Springer , 1989 . R. C. Merkle. A certified digital signature. In Conference on the Theory and Application of Cryptology, pages 218--238. Springer, 1989."},{"key":"e_1_3_2_1_43_1","volume-title":"https:\/\/www.algorand.com\/resources\/blog\/algorand-2021-performance","author":"Micali S.","year":"2021","unstructured":"S. Micali . Algorand 2021 Performance . https:\/\/www.algorand.com\/resources\/blog\/algorand-2021-performance , 2021 . S. Micali. Algorand 2021 Performance. https:\/\/www.algorand.com\/resources\/blog\/algorand-2021-performance, 2021."},{"key":"e_1_3_2_1_44_1","volume-title":"Musig2: Simple two-round schnorr multi-signatures","author":"Nick J.","year":"2020","unstructured":"J. Nick , T. Ruffing , and Y. Seurin . Musig2: Simple two-round schnorr multi-signatures . 2020 . J. Nick, T. Ruffing, and Y. Seurin. Musig2: Simple two-round schnorr multi-signatures. 2020."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12007"},{"key":"e_1_3_2_1_46_1","first-page":"3","article-title":"The tangle","volume":"1","author":"Popov S.","year":"2018","unstructured":"S. Popov . The tangle . White paper , 1 : 3 , 2018 . S. Popov. The tangle. White paper, 1:3, 2018.","journal-title":"White paper"},{"key":"e_1_3_2_1_47_1","volume-title":"Starkware launches layer 2 product starknet on ethereum. https:\/\/www.coindesk.com\/business\/2022\/02\/23\/starkware-launches-layer-2-product-starknet-on-ethereum\/","author":"Reynolds S.","year":"2022","unstructured":"S. Reynolds . Starkware launches layer 2 product starknet on ethereum. https:\/\/www.coindesk.com\/business\/2022\/02\/23\/starkware-launches-layer-2-product-starknet-on-ethereum\/ , 2022 . S. Reynolds. Starkware launches layer 2 product starknet on ethereum. https:\/\/www.coindesk.com\/business\/2022\/02\/23\/starkware-launches-layer-2-product-starknet-on-ethereum\/, 2022."},{"key":"e_1_3_2_1_48_1","volume-title":"Ziggy signature. https:\/\/github.com\/starkware-libs\/ethSTARK\/tree\/ziggy#Glossary","year":"2020","unstructured":"StarkWare. Ziggy signature. https:\/\/github.com\/starkware-libs\/ethSTARK\/tree\/ziggy#Glossary , 2020 . StarkWare. Ziggy signature. https:\/\/github.com\/starkware-libs\/ethSTARK\/tree\/ziggy#Glossary, 2020."},{"key":"e_1_3_2_1_49_1","volume-title":"Aleo raises $200m in series b to expand private-by-default, blockchain platform. https:\/\/www.aleo.org\/post\/aleo-raises-series-b","author":"Team T. A.","year":"2022","unstructured":"T. A. Team . Aleo raises $200m in series b to expand private-by-default, blockchain platform. https:\/\/www.aleo.org\/post\/aleo-raises-series-b , 2022 . T. A. Team. Aleo raises $200m in series b to expand private-by-default, blockchain platform. https:\/\/www.aleo.org\/post\/aleo-raises-series-b, 2022."},{"key":"e_1_3_2_1_51_1","unstructured":"P. Waterland. The QRL Whitepaper. Technical report Quantum Resistant Ledger.  P. Waterland. The QRL Whitepaper. Technical report Quantum Resistant Ledger."},{"key":"e_1_3_2_1_52_1","volume-title":"ePrint Arch","author":"Zhao Y.","year":"2018","unstructured":"Y. Zhao . Aggregation of gamma-signatures and applications to bitcoin. IACR Cryptol . ePrint Arch ., 2018 :414, 2018. Y. Zhao. Aggregation of gamma-signatures and applications to bitcoin. IACR Cryptol. ePrint Arch., 2018:414, 2018."}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3524128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3524128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3524128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":48,"alternative-id":["10.1145\/3488932.3524128","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3524128","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}