{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T04:20:41Z","timestamp":1778127641527,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2240976"],"award-info":[{"award-number":["2240976"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623096","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"356-370","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5298-621X","authenticated-orcid":false,"given":"Sourav","family":"Das","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6026-9069","authenticated-orcid":false,"given":"Philippe","family":"Camacho","sequence":"additional","affiliation":[{"name":"Espresso Systems, Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4398-3428","authenticated-orcid":false,"given":"Zhuolun","family":"Xiang","sequence":"additional","affiliation":[{"name":"Aptos Labs, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8792-4010","authenticated-orcid":false,"given":"Javier","family":"Nieto","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2082-4480","authenticated-orcid":false,"given":"Benedikt","family":"B\u00fcnz","sequence":"additional","affiliation":[{"name":"Espresso Systems, Menlo Park, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3437-7570","authenticated-orcid":false,"given":"Ling","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USA","author":"Abe Masayuki","year":"2010","unstructured":"Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, and Miyako Ohkubo. 2010. Structure-preserving signatures and commitments to group elements. In Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings 30. Springer, 209--236."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331612"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"e_1_3_2_1_4_1","unstructured":"Algorand. 2023. Algorand's official implementation in Go. (2023). https:\/\/github.com\/algorand\/go-algorand"},{"key":"e_1_3_2_1_5_1","volume-title":"Threshold Signatures in the Multiverse. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE.","author":"Baird Leemon","year":"2023","unstructured":"Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. Threshold Signatures in the Multiverse. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1126302.1711160"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"e_1_3_2_1_9_1","volume-title":"Weighted Secret Sharing from Wiretap Channels. Cryptology ePrint Archive","author":"Benhamouda Fabrice","year":"2022","unstructured":"Fabrice Benhamouda, Shai Halevi, and Lev Stambler. 2022. Weighted Secret Sharing from Wiretap Channels. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_26"},{"key":"e_1_3_2_1_11_1","first-page":"31","article-title":"Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme","volume":"2567","author":"Boldyreva Alexandra","year":"2003","unstructured":"Alexandra Boldyreva. 2003. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In Public Key Cryptography, Vol. 2567. Springer, 31--46.","journal-title":"Public Key Cryptography"},{"key":"e_1_3_2_1_12_1","volume-title":"QLD","author":"Boneh Dan","year":"2018","unstructured":"Dan Boneh, Manu Drijvers, and Gregory Neven. 2018. Compact multi-signatures for smaller blockchains. Advances in Cryptology-ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Springer, 435--464."},{"key":"e_1_3_2_1_13_1","volume-title":"CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV. Springer, 551--581","author":"Boneh Dan","year":"2022","unstructured":"Dan Boneh and Chelsea Komlo. 2022. Threshold signatures with private accountability. Advances in Cryptology-CRYPTO 2022: 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV. Springer, 551--581."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70700-6_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.5815453"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_24"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_3"},{"key":"e_1_3_2_1_20_1","volume-title":"Combining GHOST and casper. arXiv preprint arXiv:2003.03052","author":"Buterin Vitalik","year":"2020","unstructured":"Vitalik Buterin, Diego Hernandez, Thor Kamphefner, Khiem Pham, Zhi Qiao, Danny Ryan, Juhyeok Sin, Ying Wang, and Yan X Zhang. 2020. Combining GHOST and casper. arXiv preprint arXiv:2003.03052 (2020)."},{"key":"e_1_3_2_1_21_1","unstructured":"Vitalik Buterin and Christian Reitwiessner. 2017. EIP-197: Precompiled contracts for optimal ate pairing check on the elliptic curve alt_bn128. https:\/\/eips.ethereum.org\/EIPS\/eip-197. (2017)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427796.3433933"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704283"},{"key":"e_1_3_2_1_24_1","volume-title":"Linear-Map Vector Commitments and Their Practical Applications. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 189--219","author":"Campanelli Matteo","year":"2022","unstructured":"Matteo Campanelli, Anca Nitulescu, Carla R\u00e0fols, Alexandros Zacharakis, and Arantxa Zapico. 2022. Linear-Map Vector Commitments and Their Practical Applications. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 189--219."},{"key":"e_1_3_2_1_25_1","volume-title":"Mithril: Stake-based threshold multisignatures. Cryptology ePrint Archive","author":"Chaidos Pyrros","year":"2021","unstructured":"Pyrros Chaidos and Aggelos Kiayias. 2021. Mithril: Stake-based threshold multisignatures. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_1_26_1","volume-title":"Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. Cryptology ePrint Archive","author":"Das Sourav","year":"2023","unstructured":"Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bunz, and Ling Ren. 2023. Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_27_1","volume-title":"Powers of Tau in Asynchrony. Cryptology ePrint Archive","author":"Das Sourav","year":"2022","unstructured":"Sourav Das, Zhuolun Xiang, and Ling Ren. 2022a. Powers of Tau in Asynchrony. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_47"},{"key":"e_1_3_2_1_31_1","volume-title":"cq: Cached quotients for fast lookups. Cryptology ePrint Archive","author":"Eagen Liam","year":"2022","unstructured":"Liam Eagen, Dario Fiore, and Ariel Gabizon. 2022. cq: Cached quotients for fast lookups. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"Chainlink: A decentralized oracle network","volume":"11","author":"Ellis Steve","year":"2017","unstructured":"Steve Ellis, Ari Juels, and Sergey Nazarov. 2017. Chainlink: A decentralized oracle network. Retrieved March, Vol. 11, 2018 (2017), 1.","journal-title":"Retrieved March"},{"key":"e_1_3_2_1_33_1","unstructured":"Ethereum. 2023. Decentralized autonomous organizations (DAOs). https:\/\/ethereum.org\/en\/dao\/. (2023)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182034"},{"key":"e_1_3_2_1_35_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 186--194","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the theory and application of cryptographic techniques. Springer, 186--194."},{"key":"e_1_3_2_1_36_1","unstructured":"Ethereum Foundation. 2020. PROOF-OF-STAKE (POS). https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/. (2020)."},{"key":"e_1_3_2_1_37_1","volume-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon, Zachary J Williamson, and Oana Ciobotaru. 2019. Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive (2019)."},{"key":"e_1_3_2_1_38_1","volume-title":"Encryption and Signatures. In Annual International Cryptology Conference. Springer, 295--327","author":"Garg Sanjam","year":"2023","unstructured":"Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang. 2023. Cryptography with Weights: MPC, Encryption and Signatures. In Annual International Cryptology Conference. Springer, 295--327."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Sanjam Garg Abhishek Jain Pratyay Mukherjee Rohit Sinha Mingyuan Wang and Yinuo Zhang. 2024. hinTS: Threshold Signatures with Silent Setup. (2024).","DOI":"10.1109\/SP54263.2024.00057"},{"key":"e_1_3_2_1_40_1","volume-title":"Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback. In International conference on financial cryptography and data security. Springer.","author":"Gelashvili Rati","year":"2022","unstructured":"Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, and Zhuolun Xiang. 2022. Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback. In International conference on financial cryptography and data security. Springer."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_31"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19941293"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129782"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90453-1_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22966-4_9"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382734.3405707"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354225"},{"key":"e_1_3_2_1_52_1","volume-title":"Byzantine quorum systems. Distributed computing","author":"Malkhi Dahlia","year":"1998","unstructured":"Dahlia Malkhi and Michael Reiter. 1998. Byzantine quorum systems. Distributed computing, Vol. 11, 4 (1998), 203--213."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00096"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_55_1","volume-title":"Powers-of-Tau to the People: Decentralizing Setup Ceremonies. Cryptology ePrint Archive","author":"Nikolaenko Valeria","year":"2022","unstructured":"Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, and Dan Boneh. 2022. Powers-of-Tau to the People: Decentralizing Setup Ceremonies. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_56_1","unstructured":"National Institute of Standard and Technology. 2023. Multi-Party Threshold Cryptography. https:\/\/csrc.nist.gov\/Projects\/threshold-cryptography. (2023)."},{"key":"e_1_3_2_1_57_1","unstructured":"Christian Reitwiessner. 2017. EIP-196: Precompiled contracts for addition and scalar multiplication on the elliptic curve alt_bn128. https:\/\/eips.ethereum.org\/EIPS\/eip-196. (2017)."},{"key":"e_1_3_2_1_58_1","unstructured":"Antonio Salazar Cardozo and Zachary Williamson. 2018. EIP-1108: Reduce alt_bn128 precompile gas costs. https:\/\/eips.ethereum.org\/EIPS\/eip-1109. (2018)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_15"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0334-8"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00059"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00028"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6005766"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623096","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:38:31Z","timestamp":1755740311000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":65,"alternative-id":["10.1145\/3576915.3623096","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623096","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}