{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:53Z","timestamp":1766441693722,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744806","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"423-437","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9992-1771","authenticated-orcid":false,"given":"Elizabeth","family":"Crites","sequence":"first","affiliation":[{"name":"Web3 Foundation, Zug, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2451-1430","authenticated-orcid":false,"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"The University of Edinburgh and IOG, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8660-9663","authenticated-orcid":false,"given":"Markulf","family":"Kohlweiss","sequence":"additional","affiliation":[{"name":"The University of Edinburgh and IOG, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3133-7485","authenticated-orcid":false,"given":"Amirreza","family":"Sarencheh","sequence":"additional","affiliation":[{"name":"The University of Edinburgh and IOG, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.10.031"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.13"},{"key":"e_1_3_2_1_3_1","volume-title":"Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang.","author":"Baldimtsi Foteini","year":"2024","unstructured":"Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang. 2024. zklogin: Privacy-preserving blockchain authentication with existing credentials. arXiv preprint arXiv:2401.11735 (2024)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33383-5_7"},{"key":"e_1_3_2_1_5_1","volume-title":"Pseudonymous signature schemes. Advances in Cyber Security: Principles, Techniques, and Applications","author":"B\u0142a'skiewicz Przemys\u0142aw","year":"2019","unstructured":"Przemys\u0142aw B\u0142a'skiewicz, Lucjan Hanzlik, Kamil Kluczniak, \u0141ukasz Krzywiecki, Miros\u0142aw Kuty\u0142owski, Marcin S\u0142owik, and Marta Wszo\u0142a. 2019. Pseudonymous signature schemes. Advances in Cyber Security: Principles, Techniques, and Applications (2019), 185-255."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_12"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"e_1_3_2_1_11_1","volume-title":"Alistair Stewart, and Sergey Vasilyev.","author":"Burdges Jeffrey","year":"2023","unstructured":"Jeffrey Burdges, Oana Ciobotaru, Elizabeth Crites, Handan Kilin\u00e7 Alper, Alistair Stewart, and Sergey Vasilyev. 2023. Ring Verifiable Random Functions. Cryptology ePrint Archive, Paper 2023\/002. https:\/\/eprint.iacr.org\/2023\/002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180431"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_18"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423367"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_20_1","unstructured":"Electric Coin Company. 2024. New SNARK Curve. https:\/\/electriccoin.co\/blog\/new-snark-curve\/."},{"key":"e_1_3_2_1_21_1","unstructured":"The World Wide Web Consortium. 2022. Decentralized Identifiers (DIDs). https:\/\/w3c.github.io\/did-core\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Cothority. 2024. DKG Implementation. Available at: hrefhttps:\/\/github.com\/dedis\/cothority\/blob\/main\/dkg\/DKG.mdLink. ."},{"key":"e_1_3_2_1_23_1","unstructured":"Elizabeth Crites Aggelos Kiayias Markulf Kohlweiss and Amirreza Sarencheh. 2024. SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. Cryptology ePrint Archive Paper 2024\/379. https:\/\/eprint.iacr.org\/2024\/379"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_33"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_23"},{"key":"e_1_3_2_1_26_1","volume-title":"MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. Cryptology ePrint Archive, Paper 2024\/628. https:\/\/eprint.iacr.org\/2024\/628","author":"David Bernardo","year":"2024","unstructured":"Bernardo David, Rafael Dowsley, Anders Konring, and Mario Larangeira. 2024. MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. Cryptology ePrint Archive, Paper 2024\/628. https:\/\/eprint.iacr.org\/2024\/628"},{"key":"e_1_3_2_1_27_1","unstructured":"Dfns. 2024. CGGMP21 In Rust At Last. Available at: hrefhttps:\/\/www.dfns.co\/article\/cggmp21-in-rust-at-lastLink. ."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-009-0012-8"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_28"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179470"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_36"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"e_1_3_2_1_34_1","first-page":"649","volume-title":"Kobe","author":"Fauzi Prastudy","year":"2019","unstructured":"Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, and Claudio Orlandi. 2019. Quisquis: A new design for anonymous cryptocurrencies. In Advances in Cryptology-ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I 25. Springer, 649-678."},{"key":"e_1_3_2_1_35_1","unstructured":"Fedimint. 2024. DKG Implementation. Available at: hrefhttps:\/\/github.com\/fedimint\/fedimint\/blob\/ddff6142999e45cdb5da1f1eb9a40ff17bc1f8f5\/README.mdLink. ."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978385"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"e_1_3_2_1_38_1","unstructured":"Decentralized Identity Foundation. 2023. https:\/\/identity.foundation\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_19"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_11"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_6"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06944-4_7"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh153"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_20"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68394-7_10"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560707"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"e_1_3_2_1_50_1","volume-title":"Hidden Identity-Based Signatures. In FC 2007 (LNCS","volume":"147","author":"Kiayias Aggelos","year":"2007","unstructured":"Aggelos Kiayias and Hong-Sheng Zhou. 2007. Hidden Identity-Based Signatures. In FC 2007 (LNCS, Vol. 4886), Sven Dietrich and Rachna Dhamija (Eds.). Springer, Heidelberg, 134-147."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49151-6_17"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Yashvanth Kondi and abhi shelat. 2022. Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2022\/393","DOI":"10.1007\/978-3-031-22966-4_10"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_31"},{"key":"e_1_3_2_1_54_1","unstructured":"Bolt Labs. 2024. DKG Implementation. Available at: hrefhttps:\/\/github.com\/boltlabs-inc\/tss-ecdsa\/blob\/main\/src\/keygen\/mod.rsLink. ."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Anna Lysyanskaya and Leah Namisa Rosenbloom. 2022. Universally Composable Sigma-protocols in the Global Random-Oracle Model. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2022\/290","DOI":"10.1007\/978-3-031-22318-1_8"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00038"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_1"},{"key":"e_1_3_2_1_59_1","volume-title":"Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, and Soo-Mook Moon.","author":"Park Sanghyeon","year":"2023","unstructured":"Sanghyeon Park, Jeong Hyuk Lee, Seunghwa Lee, Jung Hyun Chun, Hyeonmyeong Cho, MinGi Kim, Hyun Ki Cho, and Soo-Mook Moon. 2023. Beyond the Blockchain Address: Zero-Knowledge Address Abstraction. IACR Cryptol. ePrint Arch. (2023), 191. https:\/\/eprint.iacr.org\/2023\/191"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_2_1_61_1","volume-title":"Breno De Medeiros, and Chuck Mortimore","author":"Sakimura Nat","year":"2014","unstructured":"Nat Sakimura, John Bradley, Mike Jones, Breno De Medeiros, and Chuck Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1. The OpenID Foundation, specification, Vol. 335 (2014)."},{"key":"e_1_3_2_1_62_1","volume-title":"DART: Decentralized, Anonymous, and Regulation-friendly Tokenization. Cryptology ePrint Archive","author":"Sarencheh Amirreza","year":"2025","unstructured":"Amirreza Sarencheh, Alireza Kavousi, Hamidreza Khoshakhlagh, and Aggelos Kiayias. 2025a. DART: Decentralized, Anonymous, and Regulation-friendly Tokenization. Cryptology ePrint Archive (2025)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-8013-6_13"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_24"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_67_1","volume-title":"Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS","volume":"53","author":"Shamir Adi","year":"1984","unstructured":"Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS, Vol. 196), G. R. Blakley and David Chaum (Eds.). Springer, Heidelberg, 47-53."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23272"},{"key":"e_1_3_2_1_69_1","volume-title":"UTT: Decentralized Ecash with Accountable Privacy. Cryptology ePrint Archive","author":"Tomescu Alin","year":"2022","unstructured":"Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, and Avishay Yanai. 2022. UTT: Decentralized Ecash with Accountable Privacy. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_70_1","volume-title":"Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, August, 2nd - 4th","author":"Volkamer Melanie","year":"2006","unstructured":"Melanie Volkamer and R\u00fcdiger Grimm. 2006. Multiple Casts in Online Voting: Analyzing Chances. In Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, August, 2nd - 4th, 2006 in Castle Hofen, Bregenz, Austria (LNI, Vol. P-86, ). GI, 97-106. https:\/\/dl.gi.de\/handle\/20.500.12116\/29174"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.30"},{"key":"e_1_3_2_1_72_1","unstructured":"Worldcoin. 2023. https:\/\/whitepaper.worldcoin.org\/."},{"key":"e_1_3_2_1_73_1","unstructured":"X-explore. 2023. Advanced Analysis For Arbitrum Airdrop. https:\/\/mirror.xyz\/x-explore.eth\/AFroG11e24I6S1oDvTitNdQSDh8lN5bz9VZAink8lZ4."},{"key":"e_1_3_2_1_74_1","volume-title":"Bo Yang, and Li Xi.","author":"Yang Kang","year":"2021","unstructured":"Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher JP Newton, Bo Yang, and Li Xi. 2021. Direct anonymous attestation with optimal tpm signing efficiency. IEEE transactions on information forensics and security, Vol. 16 (2021), 2260-2275."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417239"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:08:00Z","timestamp":1766441280000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":76,"alternative-id":["10.1145\/3719027.3744806","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3744806","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}