{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:27:07Z","timestamp":1766442427106,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","funder":[{"name":"MICIU\/AEI\/10.13039\/501100011033","award":["CEX2024-001471-M"],"award-info":[{"award-number":["CEX2024-001471-M"]}]},{"name":"MCIN\/AEI\/10.13039\/501100011033\/ FEDER, UE","award":["PID2022-142290OB-I00"],"award-info":[{"award-number":["PID2022-142290OB-I00"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765182","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:37:25Z","timestamp":1763854645000},"page":"2114-2128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Lite-PoT: Practical Powers-of-Tau Setup Ceremony"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3662-3237","authenticated-orcid":false,"given":"Lucien K. L.","family":"Ng","sequence":"first","affiliation":[{"name":"Visa Research, Foster City, CA, USA and Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2315-7839","authenticated-orcid":false,"given":"Pedro","family":"Moreno-Sanchez","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain, Max Planck Institute for Security and Privacy, Bochum, Germany, and VISA Research, Foster City, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3899-697X","authenticated-orcid":false,"given":"Mohsen","family":"Minaei","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5970-0664","authenticated-orcid":false,"given":"Panagiotis","family":"Chatzigiannis","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4099-4014","authenticated-orcid":false,"given":"Adithya","family":"Bhat","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8123-2713","authenticated-orcid":false,"given":"Duc V.","family":"Le","sequence":"additional","affiliation":[{"name":"Visa Research, Foster City, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Danksharding. Available at: https:\/\/ethereum.org\/en\/roadmap\/ danksharding\/"},{"key":"e_1_3_2_1_2_1","first-page":"189","article-title":"Accumulators and U-Prove Revocation","author":"Acar Tolga","year":"2013","unstructured":"Tolga Acar, Sherman S. M. Chow, and Lan Nguyen. 2013. Accumulators and U-Prove Revocation. In FC. 189-196.","journal-title":"FC."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Renas Bacho and Julian Loss. 2022. On the Adaptive Security of the Threshold BLS Signature Scheme. In ACM SIGSAC.","DOI":"10.1145\/3548606.3560656"},{"key":"e_1_3_2_1_4_1","volume-title":"HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. In Advances in Cryptology - ASIACRYPT.","author":"Bacho Renas","year":"2024","unstructured":"Renas Bacho, Julian Loss, Gilad Stern, and Benedikt Wagner. 2024. HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. In Advances in Cryptology - ASIACRYPT."},{"key":"e_1_3_2_1_5_1","volume-title":"Zerocash: Decentralized Anonymous Payments from Bitcoin. Cryptology ePrint Archive, Paper 2014\/349. https:\/\/eprint.iacr.org\/2014\/349","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. Cryptology ePrint Archive, Paper 2014\/349. https:\/\/eprint.iacr.org\/2014\/349"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.25"},{"key":"e_1_3_2_1_7_1","unstructured":"Blagoj. 2021a. Private message sharing for ETH2 validators. Available at: https:\/\/ethresear.ch\/t\/private-message-sharing-for-eth2-validators\/10664."},{"key":"e_1_3_2_1_8_1","unstructured":"Blagoj. 2021b. Rate Limiting Nullifier: A spam-protection mechanism for anonymous environments. Available at: https:\/\/medium.com\/privacy-scaling-explorations\/rate-limiting-nullifier-a-spam-protection-mechanism-for-anonymous-environments-bbe4006a57d."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"e_1_3_2_1_10_1","first-page":"258","article-title":"Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys","author":"Boneh Dan","year":"2005","unstructured":"Dan Boneh, Craig Gentry, and Brent Waters. 2005. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In CRYPTO. 258-275.","journal-title":"CRYPTO."},{"key":"e_1_3_2_1_11_1","first-page":"514","volume-title":"7th International Conference on the Theory and Application of Cryptology and Information Security","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh, Ben Lynn, and Hovav Shacham. 2001. Short Signatures from the Weil Pairing. In Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Springer, 514-532."},{"key":"e_1_3_2_1_12_1","volume-title":"A graduate course in applied cryptography. Draft 0.5","author":"Boneh Dan","year":"2020","unstructured":"Dan Boneh and Victor Shoup. 2020. A graduate course in applied cryptography. Draft 0.5 (2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"Sean Bowe Ariel Gabizon and Ian Miers. 2017. Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model. IACR Cryptol. ePrint Arch. (2017) 1050. http:\/\/eprint.iacr.org\/2017\/1050"},{"key":"e_1_3_2_1_14_1","unstructured":"Vitalik Buterin Dankrad Feist Diederik Loerakker and Dmitry Shishov. 2022. EIP-4844: Shard Blob Transactions. https:\/\/eips.ethereum.org\/EIPS\/eip-4844. Accessed: 2024-07-11."},{"key":"e_1_3_2_1_15_1","unstructured":"Vitalik Buterin and Christian Reitwiessner. [n.d.]. EIP-197: Precompiled contracts for optimal ate pairing check on the elliptic curve alt_bn128. https:\/\/eips.ethereum.org\/EIPS\/eip-197."},{"key":"e_1_3_2_1_16_1","unstructured":"Benedikt B\u00fcnz Mary Maller Pratyush Mishra Nirvan Tyagi and Psi Vesely. 2019. Proofs for Inner Pairing Products and Applications. Cryptology ePrint Archive Paper 2019\/1177. https:\/\/eprint.iacr.org\/2019\/1177"},{"key":"e_1_3_2_1_17_1","first-page":"246","article-title":"Batch Verification of Short Signatures","volume":"2007","author":"Camenisch Jan","year":"2007","unstructured":"Jan Camenisch, Susan Hohenberger, and Michael \u00d8stergaard Pedersen. 2007. Batch Verification of Short Signatures. In Advances in Cryptology - EUROCRYPT 2007. 246-263.","journal-title":"Advances in Cryptology - EUROCRYPT"},{"key":"e_1_3_2_1_18_1","volume-title":"Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. In PKC.","author":"Campanelli Matteo","year":"2024","unstructured":"Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, and Helger Lipmaa. 2024. Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. In PKC."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.112"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Elizabeth C. Crites Chelsea Komlo and Mary Maller. 2023. Fully Adaptive Schnorr Threshold Signatures. In CRYPTO.","DOI":"10.1007\/978-3-031-38557-5_22"},{"key":"e_1_3_2_1_21_1","volume-title":"Powers of Tau in Asynchrony. In Network and Distributed System Security (NDSS) Symposium. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2024-733-paper.pdf.","author":"Das Sourav","year":"2024","unstructured":"Sourav Das, Zhuolun Xiang, and Ling Ren. 2024. Powers of Tau in Asynchrony. In Network and Distributed System Security (NDSS) Symposium. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2024-733-paper.pdf."},{"key":"e_1_3_2_1_22_1","volume-title":"Lipton","author":"DeMillo Richard A.","year":"1978","unstructured":"Richard A. DeMillo and Richard J. Lipton. 1978. A Probabilistic Remark on Algebraic Program Testing. Inf. Process. Lett. (1978), 193-195."},{"key":"e_1_3_2_1_23_1","unstructured":"Ethereum Foundation. 2024. Optimistic Rollups. https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/optimistic-rollups\/ Accessed: 2024-09-05."},{"key":"e_1_3_2_1_24_1","first-page":"309","article-title":"Practical Short Signature Batch Verification","volume":"2009","author":"Ferrara Anna Lisa","year":"2009","unstructured":"Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, and Michael \u00d8stergaard Pedersen. 2009. Practical Short Signature Batch Verification. In Topics in Cryptology - CT-RSA 2009. 309-324.","journal-title":"Topics in Cryptology - CT-RSA"},{"key":"e_1_3_2_1_25_1","first-page":"33","article-title":"The Algebraic Group Model and its Applications","volume":"2018","author":"Fuchsbauer Georg","year":"2018","unstructured":"Georg Fuchsbauer, Eike Kiltz, and Julian Loss. 2018. The Algebraic Group Model and its Applications. In Advances in Cryptology - CRYPTO 2018. 33-62.","journal-title":"Advances in Cryptology - CRYPTO"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Georg Fuchsbauer Antoine Plouviez and Yannick Seurin. 2020. Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model. In EUROCRYPT.","DOI":"10.1007\/978-3-030-45724-2_3"},{"key":"e_1_3_2_1_27_1","unstructured":"Ariel Gabizon Zachary J. Williamson and Oana Ciobotaru. 2019. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge. Cryptology ePrint Archive Paper 2019\/953. https:\/\/eprint.iacr.org\/2019\/953 https:\/\/eprint.iacr.org\/2019\/953."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Joseph Jaeger and Deep Inder Mohan. 2024. Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM. In CRYPTO.","DOI":"10.1007\/978-3-031-68388-6_2"},{"key":"e_1_3_2_1_29_1","first-page":"1353","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Kalodner Harry A.","year":"2018","unstructured":"Harry A. Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. USENIX Association, 1353-1370."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Julia Kastner Julian Loss and Jiayu Xu. 2022. On Pairing-Free Blind Signature Schemes in the Algebraic Group Model. In PKC.","DOI":"10.1007\/978-3-030-97131-1_16"},{"key":"e_1_3_2_1_31_1","first-page":"177","article-title":"Constant-Size Commitments to Polynomials and Their Applications","volume":"2010","author":"Kate Aniket","year":"2010","unstructured":"Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg. 2010. Constant-Size Commitments to Polynomials and Their Applications. In Advances in Cryptology - ASIACRYPT 2010. 177-194.","journal-title":"Advances in Cryptology - ASIACRYPT"},{"key":"e_1_3_2_1_32_1","first-page":"98","article-title":"Snarky Ceremonies","volume":"2021","author":"Kohlweiss Markulf","year":"2021","unstructured":"Markulf Kohlweiss, Mary Maller, Janno Siim, and Mikhail Volkhov. 2021. Snarky Ceremonies. In Advances in Cryptology - ASIACRYPT 2021. 98-127.","journal-title":"Advances in Cryptology - ASIACRYPT"},{"key":"e_1_3_2_1_33_1","unstructured":"John Kuszmaul. [n.d.]. Verkle Trees. https:\/\/math.mit.edu\/research\/highschool\/primes\/materials\/2018\/Kuszmaul.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339817"},{"key":"e_1_3_2_1_35_1","unstructured":"Kamilla Nazirkhanova Joachim Neu and David Tse. 2021. Information Dispersal with Provable Retrievability for Rollups. Cryptology ePrint Archive Paper 2021\/1544. https:\/\/eprint.iacr.org\/2021\/1544"},{"key":"e_1_3_2_1_36_1","volume-title":"Le","author":"Ng Lucien K. L.","year":"2025","unstructured":"Lucien K. L. Ng, Pedro Moreno-Sanchez, Mohsen Minaei, Panagiotis Chatzigiannis, Adithya Bhat, and Duc V. Le. 2025. Lite-PoT: Practical Powers-of-Tau Setup Ceremony. arXiv:2503.04549 [cs.CR] https:\/\/arxiv.org\/abs\/2503.04549"},{"key":"e_1_3_2_1_37_1","first-page":"275","article-title":"Accumulators from Bilinear Pairings and Applications","author":"Nguyen Lan","year":"2005","unstructured":"Lan Nguyen. 2005. Accumulators from Bilinear Pairings and Applications. In CTRSA. 275-292.","journal-title":"CTRSA."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54776-8_5"},{"key":"e_1_3_2_1_39_1","first-page":"228","article-title":"The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks","volume":"2007","author":"Ristenpart Thomas","year":"2007","unstructured":"Thomas Ristenpart and Scott Yilek. 2007. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. In Advances in Cryptology - EUROCRYPT 2007. 228-245.","journal-title":"Advances in Cryptology - EUROCRYPT"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_22"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/322217.322225"},{"key":"e_1_3_2_1_42_1","unstructured":"Truffle Suite. 2024. Ganache - Personal blockchain for Ethereum development. https:\/\/github.com\/trufflesuite\/ganache GitHub repository."},{"key":"e_1_3_2_1_43_1","volume-title":"SoK: Trusted setups for powers-of-tau strings. Cryptology ePrint Archive","author":"Wang Faxing","year":"2025","unstructured":"Faxing Wang, Shaanan Cohney, and Joseph Bonneau. 2025b. SoK: Trusted setups for powers-of-tau strings. Cryptology ePrint Archive (2025)."},{"volume-title":"USENIX Security Symposium. 2371-2388","author":"Wang Jiafan","key":"e_1_3_2_1_44_1","unstructured":"Jiafan Wang and Sherman S. M. Chow. 2022. Omnes pro uno: Practical Multi-Writer Encrypted Database. In USENIX Security Symposium. 2371-2388."},{"key":"e_1_3_2_1_45_1","volume-title":"Chow","author":"Wang Xiuhua","year":"2021","unstructured":"Xiuhua Wang and Sherman S. M. Chow. 2021. Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. In SP. 748-761."},{"key":"e_1_3_2_1_46_1","volume-title":"Duc V. Le, and Christian Cachin.","author":"Wang Zhipeng","year":"2025","unstructured":"Zhipeng Wang, Orestis Alpos, Alireza Kavousi, Harry W. H. Wong, Sze Yiu Chau, Duc V. Le, and Christian Cachin. 2025a. DSKE: Digital Signatures with\u00a0Key Extraction. In Topics in Cryptology - CT-RSA 2025, Arpita Patra (Ed.). 149-173."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560652"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15982-4_3"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22972-5_11"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09519-5_73"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:23:09Z","timestamp":1766442189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":50,"alternative-id":["10.1145\/3719027.3765182","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765182","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}