{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:48Z","timestamp":1767339768562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministerio de Ciencia e Innovaci\u00f3n, Spain","award":["RTI2018-102043-B-I00,EUR2019-103816,RED2018-102321-T"],"award-info":[{"award-number":["RTI2018-102043-B-I00,EUR2019-103816,RED2018-102321-T"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101001283"],"award-info":[{"award-number":["101001283"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Comunidad de Madrid","award":["S2018\/TCS-4339"],"award-info":[{"award-number":["S2018\/TCS-4339"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560630","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1067-1080","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams"],"prefix":"10.1145","author":[{"given":"Dario","family":"Fiore","sequence":"first","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Ida","family":"Tucker","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Homomorphic Network Coding Signatures in the Standard Model. In PKC 2011 (LNCS","volume":"34","author":"Attrapadung Nuttapong","year":"2011","unstructured":"Nuttapong Attrapadung and Beno\u00eet Libert . 2011 . Homomorphic Network Coding Signatures in the Standard Model. In PKC 2011 (LNCS , Vol. 6571),, Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi (Eds.). Springer, Heidelberg, Germany, Taormina, Italy, 17-- 34 . https:\/\/doi.org\/10.1007\/978-3-642-19379-8_2 10.1007\/978-3-642-19379-8_2 Nuttapong Attrapadung and Beno\u00eet Libert. 2011. Homomorphic Network Coding Signatures in the Standard Model. In PKC 2011 (LNCS, Vol. 6571),, Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi (Eds.). Springer, Heidelberg, Germany, Taormina, Italy, 17--34. https:\/\/doi.org\/10.1007\/978-3-642-19379-8_2"},{"key":"e_1_3_2_1_2_1","volume-title":"Computing on Authenticated Data: New Privacy Definitions and Constructions. In ASIACRYPT 2012 (LNCS","volume":"385","author":"Attrapadung Nuttapong","year":"2012","unstructured":"Nuttapong Attrapadung , Beno\u00eet Libert , and Thomas Peters . 2012 . Computing on Authenticated Data: New Privacy Definitions and Constructions. In ASIACRYPT 2012 (LNCS , Vol. 7658),, Xiaoyun Wang and Kazue Sako (Eds.). Springer, Heidelberg, Germany, Beijing, China, 367-- 385 . https:\/\/doi.org\/10.1007\/978-3-642-34961-4_23 10.1007\/978-3-642-34961-4_23 Nuttapong Attrapadung, Beno\u00eet Libert, and Thomas Peters. 2012. Computing on Authenticated Data: New Privacy Definitions and Constructions. In ASIACRYPT 2012 (LNCS, Vol. 7658),, Xiaoyun Wang and Kazue Sako (Eds.). Springer, Heidelberg, Germany, Beijing, China, 367--385. https:\/\/doi.org\/10.1007\/978-3-642-34961-4_23"},{"key":"e_1_3_2_1_3_1","volume-title":"Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. In PKC 2013 (LNCS","volume":"404","author":"Attrapadung Nuttapong","year":"2013","unstructured":"Nuttapong Attrapadung , Beno\u00eet Libert , and Thomas Peters . 2013 . Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. In PKC 2013 (LNCS , Vol. 7778),, Kaoru Kurosawa and Goichiro Hanaoka (Eds.). Springer, Heidelberg, Germany, Nara, Japan, 386-- 404 . https:\/\/doi.org\/10.1007\/978-3-642-36362-7_24 10.1007\/978-3-642-36362-7_24 Nuttapong Attrapadung, Beno\u00eet Libert, and Thomas Peters. 2013. Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. In PKC 2013 (LNCS, Vol. 7778),, Kaoru Kurosawa and Goichiro Hanaoka (Eds.). Springer, Heidelberg, Germany, Nara, Japan, 386--404. https:\/\/doi.org\/10.1007\/978-3-642-36362-7_24"},{"key":"e_1_3_2_1_4_1","volume-title":"ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press","author":"Backes Michael","year":"2015","unstructured":"Michael Backes , Manuel Barbosa , Dario Fiore , and Raphael M. Reischuk . 2015 . ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press , San Jose, CA, USA, 271--286. https:\/\/doi.org\/10.1109\/SP. 2015 .24 10.1109\/SP.2015.24 Michael Backes, Manuel Barbosa, Dario Fiore, and Raphael M. Reischuk. 2015. ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, San Jose, CA, USA, 271--286. https:\/\/doi.org\/10.1109\/SP.2015.24"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9241-9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_5"},{"key":"e_1_3_2_1_9_1","volume-title":"Homomorphic Signatures for Polynomial Functions. In EUROCRYPT 2011 (LNCS","volume":"168","author":"Boneh Dan","year":"2011","unstructured":"Dan Boneh and David Mandell Freeman . 2011 a. Homomorphic Signatures for Polynomial Functions. In EUROCRYPT 2011 (LNCS , Vol. 6632),, Kenneth G. Paterson (Ed.). Springer, Heidelberg, Germany, Tallinn, Estonia, 149-- 168 . https:\/\/doi.org\/10.1007\/978-3-642-20465-4_10 10.1007\/978-3-642-20465-4_10 Dan Boneh and David Mandell Freeman. 2011a. Homomorphic Signatures for Polynomial Functions. In EUROCRYPT 2011 (LNCS, Vol. 6632),, Kenneth G. Paterson (Ed.). Springer, Heidelberg, Germany, Tallinn, Estonia, 149--168. https:\/\/doi.org\/10.1007\/978-3-642-20465-4_10"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Sean Bowe. 2017. ebfull\/pairing source code BLS12--381 -- README.md as of commit e726600. https:\/\/github.com\/ebfull\/pairing\/tree\/e72660056e00c93d6b054dfb08ff34a1c67cb799\/src\/bls12_381  Sean Bowe. 2017. ebfull\/pairing source code BLS12--381 -- README.md as of commit e726600. https:\/\/github.com\/ebfull\/pairing\/tree\/e72660056e00c93d6b054dfb08ff34a1c67cb799\/src\/bls12_381"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522733"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339820"},{"key":"e_1_3_2_1_14_1","volume-title":"Algebraic (Trapdoor) One-Way Functions and Their Applications. In TCC 2013 (LNCS","volume":"699","author":"Catalano Dario","year":"2013","unstructured":"Dario Catalano , Dario Fiore , Rosario Gennaro , and Konstantinos Vamvourellis . 2013 . Algebraic (Trapdoor) One-Way Functions and Their Applications. In TCC 2013 (LNCS , Vol. 7785),, Amit Sahai (Ed.). Springer, Heidelberg, Germany, Tokyo, Japan, 680-- 699 . https:\/\/doi.org\/10.1007\/978-3-642-36594-2_38 10.1007\/978-3-642-36594-2_38 Dario Catalano, Dario Fiore, Rosario Gennaro, and Konstantinos Vamvourellis. 2013. Algebraic (Trapdoor) One-Way Functions and Their Applications. In TCC 2013 (LNCS, Vol. 7785),, Amit Sahai (Ed.). Springer, Heidelberg, Germany, Tokyo, Japan, 680--699. https:\/\/doi.org\/10.1007\/978-3-642-36594-2_38"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_13"},{"volume-title":"ACNS 18 (LNCS","author":"Catalano Dario","key":"e_1_3_2_1_16_1","unstructured":"Dario Catalano , Dario Fiore , and Luca Nizzardo . 2018. On the Security Notions for Homomorphic Signatures . In ACNS 18 (LNCS , Vol. 10892),, Bart Preneel and Frederik Vercauteren (Eds.). Springer, Heidelberg, Germany, Leuven, Belgium, 183-- 201 . https:\/\/doi.org\/10.1007\/978-3-319-93387-0_10 10.1007\/978-3-319-93387-0_10 Dario Catalano, Dario Fiore, and Luca Nizzardo. 2018. On the Security Notions for Homomorphic Signatures. In ACNS 18 (LNCS, Vol. 10892),, Bart Preneel and Frederik Vercauteren (Eds.). Springer, Heidelberg, Germany, Leuven, Belgium, 183--201. https:\/\/doi.org\/10.1007\/978-3-319-93387-0_10"},{"key":"e_1_3_2_1_17_1","volume-title":"Efficient Network Coding Signatures in the Standard Model. In PKC 2012 (LNCS","volume":"696","author":"Catalano Dario","year":"2012","unstructured":"Dario Catalano , Dario Fiore , and Bogdan Warinschi . 2012 . Efficient Network Coding Signatures in the Standard Model. In PKC 2012 (LNCS , Vol. 7293),, Marc Fischlin, Johannes Buchmann, and Mark Manulis (Eds.). Springer, Heidelberg, Germany, Darmstadt, Germany, 680-- 696 . https:\/\/doi.org\/10.1007\/978-3-642-30057-8_40 10.1007\/978-3-642-30057-8_40 Dario Catalano, Dario Fiore, and Bogdan Warinschi. 2012. Efficient Network Coding Signatures in the Standard Model. In PKC 2012 (LNCS, Vol. 7293),, Marc Fischlin, Johannes Buchmann, and Mark Manulis (Eds.). Springer, Heidelberg, Germany, Darmstadt, Germany, 680--696. https:\/\/doi.org\/10.1007\/978-3-642-30057-8_40"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_21"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_11"},{"key":"e_1_3_2_1_20_1","volume-title":"EUROCRYPT","volume":"768","author":"Chiesa Alessandro","year":"2020","unstructured":"Alessandro Chiesa , Yuncong Hu , Mary Maller , Pratyush Mishra , Noah Vesely , and Nicholas P. Ward . 2020. Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS . In EUROCRYPT 2020 , Part I (LNCS , Vol. 12105),, Anne Canteaut and Yuval Ishai (Eds.). Springer, Heidelberg, Germany, Zagreb, Croatia, 738-- 768 . https:\/\/doi.org\/10.1007\/978-3-030-45721-1_26 10.1007\/978-3-030-45721-1_26 Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Noah Vesely, and Nicholas P. Ward. 2020. Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS. In EUROCRYPT 2020, Part I (LNCS, Vol. 12105),, Anne Canteaut and Yuval Ishai (Eds.). Springer, Heidelberg, Germany, Zagreb, Croatia, 738--768. https:\/\/doi.org\/10.1007\/978-3-030-45721-1_26"},{"key":"e_1_3_2_1_21_1","volume-title":"Memory Delegation. In CRYPTO 2011 (LNCS","volume":"168","author":"Chung Kai-Min","year":"2011","unstructured":"Kai-Min Chung , Yael Tauman Kalai , Feng-Hao Liu , and Ran Raz . 2011 . Memory Delegation. In CRYPTO 2011 (LNCS , Vol. 6841), Phillip Rogaway (Ed.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 151-- 168 . https:\/\/doi.org\/10.1007\/978-3-642-22792-9_9 10.1007\/978-3-642-22792-9_9 Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, and Ran Raz. 2011. Memory Delegation. In CRYPTO 2011 (LNCS, Vol. 6841), Phillip Rogaway (Ed.). Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 151--168. https:\/\/doi.org\/10.1007\/978-3-642-22792-9_9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_1_23_1","volume-title":"Geppetto: Versatile Verifiable Computation. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press","author":"Costello Craig","year":"2015","unstructured":"Craig Costello , C\u00e9dric Fournet , Jon Howell , Markulf Kohlweiss , Benjamin Kreuter , Michael Naehrig , Bryan Parno , and Samee Zahur . 2015 . Geppetto: Versatile Verifiable Computation. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press , San Jose, CA, USA, 253--270. https:\/\/doi.org\/10.1109\/SP. 2015.23 10.1109\/SP.2015.23 Craig Costello, C\u00e9dric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur. 2015. Geppetto: Versatile Verifiable Computation. In 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, San Jose, CA, USA, 253--270. https:\/\/doi.org\/10.1109\/SP.2015.23"},{"key":"e_1_3_2_1_24_1","volume-title":"Hash First","author":"Fiore Dario","year":"2016","unstructured":"Dario Fiore , C\u00e9dric Fournet , Esha Ghosh , Markulf Kohlweiss , Olga Ohrimenko , and Bryan Parno . 2016. Hash First , Argue Later : Adaptive Verifiable Computations on Outsourced Data. In ACM CCS 2016 , Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM Press , Vienna, Austria, 1304--1316. https:\/\/doi.org\/10.1145\/2976749.2978368 10.1145\/2976749.2978368 Dario Fiore, C\u00e9dric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, and Bryan Parno. 2016. Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. In ACM CCS 2016, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM Press, Vienna, Austria, 1304--1316. https:\/\/doi.org\/10.1145\/2976749.2978368"},{"key":"e_1_3_2_1_25_1","volume-title":"On the (In)Security of SNARKs in the Presence of Oracles. In TCC 2016-B, Part I (LNCS","volume":"138","author":"Fiore Dario","year":"2016","unstructured":"Dario Fiore and Anca Nitulescu . 2016 . On the (In)Security of SNARKs in the Presence of Oracles. In TCC 2016-B, Part I (LNCS , Vol. 9985),, Martin Hirt and Adam D. Smith (Eds.). Springer, Heidelberg, Germany, Beijing, China, 108-- 138 . https:\/\/doi.org\/10.1007\/978-3-662-53641-4_5 10.1007\/978-3-662-53641-4_5 Dario Fiore and Anca Nitulescu. 2016. On the (In)Security of SNARKs in the Presence of Oracles. In TCC 2016-B, Part I (LNCS, Vol. 9985),, Martin Hirt and Adam D. Smith (Eds.). Springer, Heidelberg, Germany, Beijing, China, 108--138. https:\/\/doi.org\/10.1007\/978-3-662-53641-4_5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_5"},{"key":"e_1_3_2_1_27_1","volume-title":"Improved Security for Linearly Homomorphic Signatures: A Generic Framework. In PKC 2012 (LNCS","volume":"714","author":"Freeman David Mandell","year":"2012","unstructured":"David Mandell Freeman . 2012 . Improved Security for Linearly Homomorphic Signatures: A Generic Framework. In PKC 2012 (LNCS , Vol. 7293),, Marc Fischlin, Johannes Buchmann, and Mark Manulis (Eds.). Springer, Heidelberg, Germany, Darmstadt, Germany, 697-- 714 . https:\/\/doi.org\/10.1007\/978-3-642-30057-8_41 10.1007\/978-3-642-30057-8_41 David Mandell Freeman. 2012. Improved Security for Linearly Homomorphic Signatures: A Generic Framework. In PKC 2012 (LNCS, Vol. 7293),, Marc Fischlin, Johannes Buchmann, and Mark Manulis (Eds.). Springer, Heidelberg, Germany, Darmstadt, Germany, 697--714. https:\/\/doi.org\/10.1007\/978-3-642-30057-8_41"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_2"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_9"},{"key":"e_1_3_2_1_32_1","volume-title":"Fully Homomorphic Message Authenticators. In ASIACRYPT 2013","volume":"320","author":"Gennaro Rosario","year":"2013","unstructured":"Rosario Gennaro and Daniel Wichs . 2013 . Fully Homomorphic Message Authenticators. In ASIACRYPT 2013 , Part II (LNCS , Vol. 8270),, Kazue Sako and Palash Sarkar (Eds.). Springer, Heidelberg, Germany, Bengalore, India, 301-- 320 . https:\/\/doi.org\/10.1007\/978-3-642-42045-0_16 10.1007\/978-3-642-42045-0_16 Rosario Gennaro and Daniel Wichs. 2013. Fully Homomorphic Message Authenticators. In ASIACRYPT 2013, Part II (LNCS, Vol. 8270),, Kazue Sako and Palash Sarkar (Eds.). Springer, Heidelberg, Germany, Bengalore, India, 301--320. https:\/\/doi.org\/10.1007\/978-3-642-42045-0_16"},{"key":"e_1_3_2_1_33_1","volume-title":"Yael Tauman Kalai, and Guy N. Rothblum","author":"Goldwasser Shafi","year":"2008","unstructured":"Shafi Goldwasser , Yael Tauman Kalai, and Guy N. Rothblum . 2008 . Delegating computation: interactive proofs for muggles. In 40th ACM STOC,, Richard E. Ladner and Cynthia Dwork (Eds.). ACM Press , Victoria, BC, Canada, 113--122. https:\/\/doi.org\/10.1145\/1374376.1374396 10.1145\/1374376.1374396 Shafi Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum. 2008. Delegating computation: interactive proofs for muggles. In 40th ACM STOC,, Richard E. Ladner and Cynthia Dwork (Eds.). ACM Press, Victoria, BC, Canada, 113--122. https:\/\/doi.org\/10.1145\/1374376.1374396"},{"volume-title":"47th ACM STOC,, Rocco A","author":"Gorbunov Sergey","key":"e_1_3_2_1_34_1","unstructured":"Sergey Gorbunov , Vinod Vaikuntanathan , and Daniel Wichs . 2015. Leveled Fully Homomorphic Signatures from Standard Lattices . In 47th ACM STOC,, Rocco A . Servedio and Ronitt Rubinfeld (Eds.). ACM Press , Portland, OR, USA , 469--477. https:\/\/doi.org\/10.1145\/2746539.2746576 10.1145\/2746539.2746576 Sergey Gorbunov, Vinod Vaikuntanathan, and Daniel Wichs. 2015. Leveled Fully Homomorphic Signatures from Standard Lattices. In 47th ACM STOC,, Rocco A. Servedio and Ronitt Rubinfeld (Eds.). ACM Press, Portland, OR, USA, 469--477. https:\/\/doi.org\/10.1145\/2746539.2746576"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_24"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_17"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00018"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_17"},{"key":"e_1_3_2_1_40_1","volume-title":"Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. In TCC 2012 (LNCS","volume":"189","author":"Lipmaa Helger","year":"2012","unstructured":"Helger Lipmaa . 2012 . Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. In TCC 2012 (LNCS , Vol. 7194), Ronald Cramer (Ed.). Springer, Heidelberg, Germany, Taormina, Sicily, Italy, 169-- 189 . https:\/\/doi.org\/10.1007\/978-3-642-28914-9_10 10.1007\/978-3-642-28914-9_10 Helger Lipmaa. 2012. Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. In TCC 2012 (LNCS, Vol. 7194), Ronald Cramer (Ed.). Springer, Heidelberg, Germany, Taormina, Sicily, Italy, 169--189. https:\/\/doi.org\/10.1007\/978-3-642-28914-9_10"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:58Z","timestamp":1750182538000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":42,"alternative-id":["10.1145\/3548606.3560630","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560630","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}