{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T15:55:42Z","timestamp":1772553342225,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Defence Advanced Research Projects Agency","award":["HR001120C0085"],"award-info":[{"award-number":["HR001120C0085"]}]},{"name":"FWO","award":["Odysseus project GOH9718N"],"award-info":[{"award-number":["Odysseus project GOH9718N"]}]},{"name":"European Research Council","award":["ERC-2015-AdG-IMPaCT"],"award-info":[{"award-number":["ERC-2015-AdG-IMPaCT"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3559354","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"293-306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Feta"],"prefix":"10.1145","author":[{"given":"Carsten","family":"Baum","sequence":"first","affiliation":[{"name":"Aarhus University, Aarhus, Denmark"}]},{"given":"Robin","family":"Jadoul","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Emmanuela","family":"Orsini","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Peter","family":"Scholl","sequence":"additional","affiliation":[{"name":"Aarhus University, Aarhus, Denmark"}]},{"given":"Nigel P.","family":"Smart","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Advances in Cryptology -- ASIACRYPT 2002 (Lecture Notes in Computer Science","author":"Abe Masayuki","unstructured":"Masayuki Abe , Ronald Cramer , and Serge Fehr . 2002. Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments . In Advances in Cryptology -- ASIACRYPT 2002 (Lecture Notes in Computer Science , Vol. 2501),, Yuliang Zheng (Ed.). Springer, Heidelberg, Germany, Queenstown, New Zealand, 206-- 223 . https:\/\/doi.org\/10.1007\/3-540-36178-2_13 10.1007\/3-540-36178-2_13 Masayuki Abe, Ronald Cramer, and Serge Fehr. 2002. Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. In Advances in Cryptology -- ASIACRYPT 2002 (Lecture Notes in Computer Science, Vol. 2501),, Yuliang Zheng (Ed.). Springer, Heidelberg, Germany, Queenstown, New Zealand, 206--223. https:\/\/doi.org\/10.1007\/3-540-36178-2_13"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_4_1","volume-title":"Part III (Lecture Notes in Computer Science","volume":"748","author":"Baldimtsi Foteini","year":"2020","unstructured":"Foteini Baldimtsi , Aggelos Kiayias , Thomas Zacharias , and Bingsheng Zhang . 2020 . Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation. In Advances in Cryptology -- ASIACRYPT 2020 , Part III (Lecture Notes in Computer Science , Vol. 12493),, Shiho Moriai and Huaxiong Wang (Eds.). Springer, Heidelberg, Germany, Daejeon, South Korea, 717-- 748 . https:\/\/doi.org\/10.1007\/978-3-030-64840-4_24 10.1007\/978-3-030-64840-4_24 Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, and Bingsheng Zhang. 2020. Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation. In Advances in Cryptology -- ASIACRYPT 2020, Part III (Lecture Notes in Computer Science, Vol. 12493),, Shiho Moriai and Huaxiong Wang (Eds.). Springer, Heidelberg, Germany, Daejeon, South Korea, 717--748. https:\/\/doi.org\/10.1007\/978-3-030-64840-4_24"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75245-3_11"},{"key":"e_1_3_2_2_6_1","volume-title":"Part IV (Lecture Notes in Computer Science","volume":"122","author":"Baum Carsten","year":"2021","unstructured":"Carsten Baum , Alex J. Malozemoff , Marc B. Rosen , and Peter Scholl . 2021 b. Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions. In Advances in Cryptology -- CRYPTO 2021 , Part IV (Lecture Notes in Computer Science , Vol. 12828), Tal Malkin and Chris Peikert (Eds.). Springer, Heidelberg, Germany, Virtual Event, 92-- 122 . https:\/\/doi.org\/10.1007\/978-3-030-84259-8_4 10.1007\/978-3-030-84259-8_4 Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, and Peter Scholl. 2021b. Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions. In Advances in Cryptology -- CRYPTO 2021, Part IV (Lecture Notes in Computer Science, Vol. 12828), Tal Malkin and Chris Peikert (Eds.). Springer, Heidelberg, Germany, Virtual Event, 92--122. https:\/\/doi.org\/10.1007\/978-3-030-84259-8_4"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196771"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62223"},{"key":"e_1_3_2_2_9_1","volume-title":"Part III (Lecture Notes in Computer Science","volume":"732","author":"Ben-Sasson Eli","year":"2019","unstructured":"Eli Ben-Sasson , Iddo Bentov , Yinon Horesh , and Michael Riabzev . 2019 . Scalable Zero Knowledge with No Trusted Setup. In Advances in Cryptology -- CRYPTO 2019 , Part III (Lecture Notes in Computer Science , Vol. 11694), Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 701-- 732 . https:\/\/doi.org\/10.1007\/978-3-030-26954-8_23 10.1007\/978-3-030-26954-8_23 Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2019. Scalable Zero Knowledge with No Trusted Setup. In Advances in Cryptology -- CRYPTO 2019, Part III (Lecture Notes in Computer Science, Vol. 11694), Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 701--732. https:\/\/doi.org\/10.1007\/978-3-030-26954-8_23"},{"key":"e_1_3_2_2_10_1","volume-title":"Part II (Lecture Notes in Computer Science","volume":"108","author":"Ben-Sasson Eli","year":"2013","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Daniel Genkin , Eran Tromer , and Madars Virza . 2013 . SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In Advances in Cryptology -- CRYPTO 2013 , Part II (Lecture Notes in Computer Science , Vol. 8043),, Ran Canetti and Juan A. Garay (Eds.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 90-- 108 . https:\/\/doi.org\/10.1007\/978-3-642-40084-1_6 10.1007\/978-3-642-40084-1_6 Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza. 2013. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. In Advances in Cryptology -- CRYPTO 2013, Part II (Lecture Notes in Computer Science, Vol. 8043),, Ran Canetti and Juan A. Garay (Eds.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 90--108. https:\/\/doi.org\/10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_2_11_1","volume-title":"Part III (Lecture Notes in Computer Science","volume":"97","author":"Boneh Dan","year":"2019","unstructured":"Dan Boneh , Elette Boyle , Henry Corrigan-Gibbs , Niv Gilboa , and Yuval Ishai . 2019 . Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In Advances in Cryptology -- CRYPTO 2019 , Part III (Lecture Notes in Computer Science , Vol. 11694),, Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 67-- 97 . https:\/\/doi.org\/10.1007\/978-3-030-26954-8_3 10.1007\/978-3-030-26954-8_3 Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In Advances in Cryptology -- CRYPTO 2019, Part III (Lecture Notes in Computer Science, Vol. 11694),, Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 67--97. https:\/\/doi.org\/10.1007\/978-3-030-26954-8_3"},{"key":"e_1_3_2_2_12_1","volume-title":"Advances in Cryptology -- EUROCRYPT'91 (Lecture Notes in Computer Science","author":"Burmester Mike","unstructured":"Mike Burmester and Yvo Desmedt . 1991. Broadcast Interactive Proofs (Extended Abstract) . In Advances in Cryptology -- EUROCRYPT'91 (Lecture Notes in Computer Science , Vol. 547), Donald W. Davies (Ed.). Springer, Heidelberg, Germany, Brighton, UK, 81-- 95 . https:\/\/doi.org\/10.1007\/3-540-46416-6_7 10.1007\/3-540-46416-6_7 Mike Burmester and Yvo Desmedt. 1991. Broadcast Interactive Proofs (Extended Abstract). In Advances in Cryptology -- EUROCRYPT'91 (Lecture Notes in Computer Science, Vol. 547), Donald W. Davies (Ed.). Springer, Heidelberg, Germany, Brighton, UK, 81--95. https:\/\/doi.org\/10.1007\/3-540-46416-6_7"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133997"},{"key":"e_1_3_2_2_14_1","volume-title":"BBQ: Using AES in Picnic Signatures. In SAC 2019: 26th Annual International Workshop on Selected Areas in Cryptography (Lecture Notes in Computer Science","volume":"692","author":"de Saint Guilhem Cyprien","unstructured":"Cyprien de Saint Guilhem , Lauren De Meyer , Emmanuela Orsini , and Nigel P. Smart . 2019 . BBQ: Using AES in Picnic Signatures. In SAC 2019: 26th Annual International Workshop on Selected Areas in Cryptography (Lecture Notes in Computer Science , Vol. 11959),, Kenneth G. Paterson and Douglas Stebila (Eds.). Springer, Heidelberg, Germany, Waterloo, ON, Canada, 669-- 692 . https:\/\/doi.org\/10.1007\/978-3-030-38471--5_27 10.1007\/978-3-030-38471--5_27 Cyprien de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, and Nigel P. Smart. 2019. BBQ: Using AES in Picnic Signatures. In SAC 2019: 26th Annual International Workshop on Selected Areas in Cryptography (Lecture Notes in Computer Science, Vol. 11959),, Kenneth G. Paterson and Douglas Stebila (Eds.). Springer, Heidelberg, Germany, Waterloo, ON, Canada, 669--692. https:\/\/doi.org\/10.1007\/978-3-030-38471--5_27"},{"key":"e_1_3_2_2_15_1","volume-title":"Limbo: Efficient Zero-knowledge MPCitH-based Arguments. In ACM CCS 2021: 28th Conference on Computer and Communications Security,","author":"de Saint Guilhem Cyprien","year":"2021","unstructured":"Cyprien de Saint Guilhem , Emmanuela Orsini , and Titouan Tanguy . 2021 . Limbo: Efficient Zero-knowledge MPCitH-based Arguments. In ACM CCS 2021: 28th Conference on Computer and Communications Security, , Giovanni Vigna and Elaine Shi (Eds.). ACM Press , Virtual Event , Republic of Korea, 3022--3036. https:\/\/doi.org\/10.1145\/3460120.3484595 10.1145\/3460120.3484595 Cyprien de Saint Guilhem, Emmanuela Orsini, and Titouan Tanguy. 2021. Limbo: Efficient Zero-knowledge MPCitH-based Arguments. In ACM CCS 2021: 28th Conference on Computer and Communications Security,, Giovanni Vigna and Elaine Shi (Eds.). ACM Press, Virtual Event, Republic of Korea, 3022--3036. https:\/\/doi.org\/10.1145\/3460120.3484595"},{"key":"e_1_3_2_2_16_1","volume-title":"19th Annual ACM Symposium on Theory of Computing, Alfred Aho (Ed.). ACM Press","author":"Goldreich Oded","year":"1987","unstructured":"Oded Goldreich , Silvio Micali , and Avi Wigderson . 1987 . How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority . In 19th Annual ACM Symposium on Theory of Computing, Alfred Aho (Ed.). ACM Press , New York City, NY, USA, 218--229. https:\/\/doi.org\/10.1145\/28395.28420 10.1145\/28395.28420 Oded Goldreich, Silvio Micali, and Avi Wigderson. 1987. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In 19th Annual ACM Symposium on Theory of Computing, Alfred Aho (Ed.). ACM Press, New York City, NY, USA, 218--229. https:\/\/doi.org\/10.1145\/28395.28420"},{"key":"e_1_3_2_2_17_1","volume-title":"CA, USA","author":"Hopwood Daira","year":"2016","unstructured":"Daira Hopwood , Sean Bowe , Taylor Hornby , and Nathan Wilcox . 2016. Zcash protocol specification. GitHub: San Francisco , CA, USA ( 2016 ). Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2016. Zcash protocol specification. GitHub: San Francisco, CA, USA (2016)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250794"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516662"},{"key":"e_1_3_2_2_20_1","volume-title":"Felten","author":"Kalodner Harry A.","year":"2018","unstructured":"Harry A. Kalodner , Steven Goldfeder , Xiaoqi Chen , S. Matthew Weinberg , and Edward W . Felten . 2018 . Arbitrum : Scalable, private smart contracts. In USENIX Security 2018: 27th USENIX Security Symposium, William Enck and Adrienne Porter Felt (Eds.). USENIX Association , Baltimore, MD, USA, 1353--1370. Harry A. Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In USENIX Security 2018: 27th USENIX Security Symposium, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, Baltimore, MD, USA, 1353--1370."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243805"},{"key":"e_1_3_2_2_24_1","volume-title":"Fair-Zero Knowledge. In TCC 2005: 2nd Theory of Cryptography Conference (Lecture Notes in Computer Science","volume":"263","author":"Lepinski Matt","unstructured":"Matt Lepinski , Silvio Micali , and abhi shelat. 2005 . Fair-Zero Knowledge. In TCC 2005: 2nd Theory of Cryptography Conference (Lecture Notes in Computer Science , Vol. 3378), Joe Kilian (Ed.). Springer, Heidelberg, Germany, Cambridge, MA, USA, 245-- 263 . https:\/\/doi.org\/10.1007\/978-3-540-30576-7_14 10.1007\/978-3-540-30576-7_14 Matt Lepinski, Silvio Micali, and abhi shelat. 2005. Fair-Zero Knowledge. In TCC 2005: 2nd Theory of Cryptography Conference (Lecture Notes in Computer Science, Vol. 3378), Joe Kilian (Ed.). Springer, Heidelberg, Germany, Cambridge, MA, USA, 245--263. https:\/\/doi.org\/10.1007\/978-3-540-30576-7_14"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00056"},{"key":"e_1_3_2_2_27_1","volume-title":"Raluca Ada Popa, and Ion Stoica","author":"Wu Howard","year":"2018","unstructured":"Howard Wu , Wenting Zheng , Alessandro Chiesa , Raluca Ada Popa, and Ion Stoica . 2018 . DIZK : A Distributed Zero Knowledge Proof System. In USENIX Security 2018: 27th USENIX Security Symposium, William Enck and Adrienne Porter Felt (Eds.). USENIX Association , Baltimore, MD, USA, 675--692. Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. DIZK: A Distributed Zero Knowledge Proof System. In USENIX Security 2018: 27th USENIX Security Symposium, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, Baltimore, MD, USA, 675--692."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484556"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559354","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:56Z","timestamp":1750182656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559354"}},"subtitle":["Efficient Threshold Designated-Verifier Zero-Knowledge Proofs"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":25,"alternative-id":["10.1145\/3548606.3559354","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3559354","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}