@inproceedings{BitanskyCanettiChiesaTromer2013,
 author = {Bitansky, Nir and Canetti, Ran and Chiesa, Alessandro and Tromer, Eran},
 title = {Recursive Composition and Bootstrapping for SNARKS and Proof-carrying Data},
 booktitle = {STOC'13},
 year = {2013},
} 

@article{BonehBoyen2008,
author = {Boneh, Dan and Boyen, Xavier},
journal = {Journal of Cryptology},
number = {2},
title = {{Short signatures without random oracles and the SDH assumption in bilinear groups}},
volume = {21},
year = {2008}
}

@inproceedings{BuldasLaudLipmaa2000,
    author = {Buldas, Ahto and Laud, Peeter and Lipmaa, Helger},
    booktitle = {ACM CCS'00},
    title = {{Accountable Certificate Management using Undeniable Attestations}},
    year = {2000},
}

@article{DahlbergPullsVestin2018,
    author    = {Rasmus Dahlberg and
    Tobias Pulls and
    Jonathan Vestin and
    Toke H{\o}iland{-}J{\o}rgensen and
    Andreas Kassler},
    title     = {Aggregation-Based Gossip for Certificate Transparency},
    journal   = {CoRR},
    volume    = {abs/1806.08817},
    year      = {2018},
    url       = {http://arxiv.org/abs/1806.08817},
    archivePrefix = {arXiv},
    eprint    = {1806.08817},
}

@inproceedings{Frederiksen2018,
    title={Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries},
    booktitle={CRYPTO'18},
    author={Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas},
    year={2018}
}

@inproceedings{GentryWichs2011,
 author = {Gentry, Craig and Wichs, Daniel},
 title = {Separating Succinct Non-interactive Arguments from All Falsifiable Assumptions},
 booktitle = {STOC'11},
 year = {2011},
}

@InProceedings{KiayiasOksuzTang2015,
    author="Kiayias, Aggelos
    and Oksuz, Ozgur
    and Tang, Qiang",
    title="Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications",
    booktitle="Information Security",
    year="2015",
}

@InProceedings{MenezesSarkarSingh2017,
author="Menezes, Alfred
and Sarkar, Palash
and Singh, Shashank",
title="Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography",
booktitle="Mycrypt'16",
year="2017",
}

@InProceedings{Naor2003OnCryptographic,
    author="Naor, Moni",
    title="On Cryptographic Assumptions and Challenges",
    booktitle="CRYPTO'03",
    year="2003",
}

@article{Lamport1982TheByzantine,
    author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall},
    title = {The Byzantine Generals Problem},
    journal = {ACM Trans. Program. Lang. Syst.},
    issue_date = {July 1982},
    volume = {4},
    number = {3},
    year = {1982},
    numpages = {20},
}

@misc{Lynch2018,
    author = {Vincent Lynch},
    title = {{Scaling CT Logs: Temporal Sharding}},
    month = apr,
    year = {2018},
    howpublished = {\url{https://www.digicert.com/blog/scaling-certificate-transparency-logs-temporal-sharding/}},
    note={{Accessed: 2019-02-03}},
}

@inproceedings{aurora,
title={{Aurora: Transparent Succinct Arguments for R1CS}},
author={Eli Ben-Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward},
booktitle = {EUROCRYPT'19},
year={2019},
}

@misc{batch-rsa-acc,
    author = {Dan Boneh and Benedikt Bünz and Ben Fisch},
    title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains},
    howpublished = {Cryptology ePrint Archive, Report 2018/1188},
    year = {2018},
    note = {\url{https://eprint.iacr.org/2018/1188}},
}

@InProceedings{blind-auditable-memb-proofs,
    author="Sander, Tomas
    and Ta-Shma, Amnon
    and Yung, Moti",
    title="Blind, Auditable Membership Proofs",
    booktitle="Financial Cryptography '01",
    year="2001",
}

@inproceedings{blockstack,
    author = {Muneeb Ali and Jude Nelson and Ryan Shea and Michael J. Freedman},
    title = {{Blockstack: A Global Naming and Storage System Secured by Blockchains}},
    booktitle = {USENIX ATC'16},
    year = {2016},
}

@misc{bls12-381-switch,
    author = {Sean Bowe},
    title = {{Switch from BN254 to BLS12-381}},
    month = jul,
    year = {2017},
    howpublished = {\url{https://github.com/zcash/zcash/issues/2502}},
    note={{Accessed: 2019-02-03}},
}

@INPROCEEDINGS{bulletproofs,
author={Benedikt Bünz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Gregory Maxwell},
booktitle={IEEE S\&P'18},
title={Bulletproofs: Short Proofs for Confidential Transactions and More},
year={2018},
}

@InProceedings{crt,
    author="Kocher, Paul C.",
    title="On certificate revocation and validation",
    booktitle="Financial Cryptography '98",
    year="1998",
}

@Article{cycles-of-ec,
    author="Ben-Sasson, Eli
    and Chiesa, Alessandro
    and Tromer, Eran
    and Virza, Madars",
    title="Scalable Zero Knowledge Via Cycles of Elliptic Curves",
    journal="Algorithmica",
    year="2017",
    month="Dec",
    day="01",
    volume="79",
    number="4",
}

@INPROCEEDINGS{hyrax,
author={Riad S. Wahby and Ioanna Tzialla and abhi shelat and Justin Thaler and Michael Walfish},
booktitle={IEEE S\&P'18},
title={Doubly-Efficient zkSNARKs Without Trusted Setup},
year={2018},
}

@misc{jubjub,
    author = {Zcash},
    title = {{What is Jubjub}},
    year = {2017},
    howpublished = {\url{https://z.cash/technology/jubjub/}},
    note={{Accessed: 2019-02-03}},
}

@inproceedings{ligero,
 author = {Ames, Scott and Hazay, Carmit and Ishai, Yuval and Venkitasubramaniam, Muthuramakrishnan},
 title = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup},
 booktitle = {ACM CCS'17},
 year = {2017},
} 

@InProceedings{mimc,
author="Albrecht, Martin
and Grassi, Lorenzo
and Rechberger, Christian
and Roy, Arnab
and Tiessen, Tyge",
title="MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity",
booktitle="ASIACRYPT'16",
year="2016",
}

@misc{namecoin,
    title = {Namecoin},
    author = {Namecoin},
    year = {2011},
    howpublished = {\url{https://namecoin.info/}},
    note = {Accessed: 2015-08-23},
}

@book{overmars,
	author = {Overmars, Mark H.},
	title = {Design of Dynamic Data Structures},
	year = {1987},
}

@article{pbft,
    author = {M. Castro and B. Liskov},
    title = {Practical Byzantine Fault Tolerance and Proactive Recovery},
    journal = {TOCS},
    volume = 20,
    number = 4,
    year = 2002,
}

@inproceedings{policert,
    author = {Szalachowski, Pawel and Matsumoto, Stephanos and Perrig, Adrian},
    title = {PoliCert: Secure and Flexible TLS Certificate Management},
    booktitle = {ACM CCS'14},
    year = {2014},
} 

@misc{stark,
    author = {Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev},
    title = {Scalable, transparent, and post-quantum secure computational integrity},
    howpublished = {Cryptology ePrint Archive, Report 2018/046},
    year = {2018},
    note = {\url{https://eprint.iacr.org/2018/046}},
}

@inproceedings{vrf,
 author = {Micali, Silvio and Vadhan, Salil and Rabin, Michael},
 title = {Verifiable Random Functions},
 booktitle = {FOCS'99},
 year = {1999},
} 

@misc{mitmgoogle,
    author = {Heather Adkins},
    year = {2011},
    title = {{An update on attempted man-in-the-middle attacks}},
    howpublished = {\url{http://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html}},
    note = {{Accessed: 2015-08-22}},
}

@misc{cahacks,
    title = {{Security breach in CA networks - Comodo, DigiNotar, GlobalSign}},
    author = {Ravi Mandalia},
    year = {2012},
    howpublished = {\url{http://blog.isc2.org/isc2_blog/2012/04/test.html}},
    note = {{Accessed: 2015-08-22}},
}

@misc{cahacksurvey,
    author = {Andr{\'{e}} Niemann and Jacqueline Brendel},
    title = {{A Survey on CA Compromises}},
    year = {2014},
}

@inproceedings{ht,
    author = {Crosby, Scott A. and Wallach, Dan S.},
    title = {{Efficient Data Structures for Tamper-evident Logging}},
    booktitle = {USENIX Security '09},
    year = {2009},
}

@article{append-only-skiplists,
    author    = {Petros Maniatis and Mary Baker},
    title     = {Authenticated Append-only Skip Lists},
    journal   = {CoRR},
    volume    = {cs.CR/0302010},
    year      = {2003},
    url       = {http://arxiv.org/abs/cs.CR/0302010},
}

@inproceedings{versum,
author = {van den Hooff, Jelle and Kaashoek, M Frans and Zeldovich, Nickolai},
booktitle = {ACM CCS'14},
title = {{VerSum: Verifiable Computations over Large Public Logs}},
year = {2014},
}

@misc{ct,
    author = {Ben Laurie and Adam Langley and Emilia Kasper},
    title = {{RFC: Certificate Transparency}},
    editor =  {IETF},
    year = {2013},
    howpublished = {\url{http://tools.ietf.org/html/rfc6962}},
    note = {{Accessed: 2015-5-13}},
}

@misc{rev-transparency,
    author = {Ben Laurie},
    title = {{Revocation Transparency}},
    year = {2015},
    howpublished={\url{https://www.links.org/files/RevocationTransparency.pdf}},
    note = {{Accessed: 2018-07-31}},
}

@article{ct-with-privacy,
    author = {Eskandarian, Saba and Messeri, Eran and Bonneau, Joseph and Boneh, Dan},
    journal = {PoPETs},
    number = {4},
    title = {{Certificate Transparency with Privacy}},
    volume = {2017},
    year = {2017}
}

@misc{ct-num-certs,
    author = {Google},
    title = {{HTTPS encryption on the web: Certificate transparency}},
    year = {2016},
    howpublished = {\url{https://transparencyreport.google.com/https/certificates}},
    note = {{Accessed: 2018-04-12}},
}

@misc{ct-avg-cert-size,
    author = {Graham Edgecombe},
    title = {{Compressing X.509 certificates}},
    year = {2016},
    howpublished = {\url{https://www.grahamedgecombe.com/blog/2016/12/22/compressing-x509-certificates}},
    note = {{Accessed: 2018-04-12}},
}
@misc{ct-google-chrome,
    author = {Ryan Sleevi},
    title = {{Certificate Transparency in Chrome - Change to Enforcement Date}},
    year = {2017},
    howpublished = {\url{https://groups.google.com/a/chromium.org/forum/\#!msg/ct-policy/sz_3W_xKBNY/6jq2ghJXBAAJ}},
    note = {{Accessed: 2018-04-20}},
}

@INPROCEEDINGS{ct-gossip, 
    author={Laurent Chuat and Pawel Szalachowski and Adrian Perrig and Ben Laurie and Eran Messeri},
    title={{Efficient gossip protocols for verifying the consistency of Certificate logs}},
    booktitle={IEEE CNS'15}, 
    year={2015},
    month={Sept},
}

@inproceedings{secure-logging-schemes-and-ct,
    author = {Dowling, Benjamin and G{\"{u}}nther, Felix and Herath, Udyani and Stebila, Douglas},
    booktitle = {ESORICS'16},
    title = {{Secure Logging Schemes and Certificate Transparency}},
    year = {2016}
}

@inproceedings{transparency-overlays,
    author = {Chase, Melissa and Meiklejohn, Sarah},
    booktitle = {ACM CCS'16},
    title = {{Transparency Overlays and Applications}},
    year = {2016}
}

@misc{trillian,
    author = {Google},
    title = {{Trillian: General Transparency}},
    howpublished = {\url{https://github.com/google/trillian}},
    year = {2016},
    note = {{Accessed: 2018-04-12}},
}

@inproceedings{coniks,
    author = {Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman},
    title = {{Bringing Deployable Key Transparency to End Users}},
    booktitle = {USENIX Security '15},
    year = {2015},
    month = Aug,
}

@misc{vkd,
    author = {Melissa Chase and Apoorvaa Deshpande and Esha Ghosh},
    title = {Privacy Preserving Verifiable Key Directories},
    howpublished = {Cryptology ePrint Archive, Report 2018/607},
    year = {2018},
    note = {\url{https://eprint.iacr.org/2018/607}},
}

@inproceedings{insynd,
    author = {Peeters, Roel and Pulls, Tobias},
    booktitle = {ESORICS'16},
    title = {{Insynd: Improved Privacy-Preserving Transparency Logging}},
    year = {2016}
}

@inproceedings{lwm,
author="Dahlberg, Rasmus
and Pulls, Tobias",
title="Verifiable Light-Weight Monitoring for Certificate Transparency Logs",
booktitle="NordSec 2018: Secure IT Systems",
year="2018",
}

@misc{libff,
    author = {{SCIPR Lab}},
    title = {libff},
    howpublished = {\url{https://github.com/scipr-lab/libff}},
    year = {2016},
    note = {{Accessed: 2018-07-28}},
}

@misc{libfqfft,
    author = {{SCIPR Lab}},
    title = {libfqfft},
    howpublished = {\url{https://github.com/scipr-lab/libfqfft}},
    year = {2016},
    note = {{Accessed: 2018-07-28}},
}

@article{overmars-van-leeuwen,
title = "Worst-case optimal insertion and deletion methods for decomposable searching problems",
journal = "Information Processing Letters",
volume = "12",
number = "4",
year = "1981",
author = "Mark H. Overmars and Jan van Leeuwen",
}

@InProceedings{bn-curve,
author="Barreto, Paulo S. L. M.
and Naehrig, Michael",
title="Pairing-Friendly Elliptic Curves of Prime Order",
booktitle="Selected Areas in Cryptography",
year="2006",
}

@misc{libntl,
    author = {Victor Shoup},
    title = {libntl},
    howpublished= {\url{https://www.shoup.net/ntl/}},
    year = {2016},
    note = {{Accessed: 2018-07-28}},
}

@inproceedings{balloon,
    author="Pulls, Tobias
    and Peeters, Roel",
    title={{Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure}},
    bookTitle="ESORICS'15",
    year="2015",
}

@misc{general-transparency,
    author = {Eijdenberg, Adam and Laurie, Ben and Cutter, Al},
    title = {{Verifiable Data Structures}},
    year = {2016},
    howpublished = {\url{https://github.com/google/trillian/blob/master/docs/papers/VerifiableDataStructures.pdf}},
    note = {{Accessed: 2018-04-12}}
}

@inproceedings{ect,
    author = {Mark D. Ryan},
    title = {{Enhanced certificate transparency and end-to-end encrypted mail}},
    booktitle = {NDSS'14},
    month  =  Feb,
    year = {2014},
}

@inproceedings{aki,
    author = {Kim, Tiffany Hyun-Jin and Huang, Lin-Shung and Perring, Adrian and Jackson, Collin and Gligor, Virgil},
    title = {{Accountable Key Infrastructure (AKI): A Proposal for a Public-key Validation Infrastructure}},
    booktitle = {WWW'13},
    year = {2013},
} 

@inproceedings{arpki,
    author = {Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pawel},
    title = {{ARPKI: Attack Resilient Public-Key Infrastructure}},
    booktitle = {ACM CCS'14},
    year = {2014},
} 

@article{dtki,
    author = {Yu, Jiangshan and Cheval, Vincent and Ryan, Mark},
    title = {{DTKI: A New Formalized PKI with Verifiable Trusted Parties}},
    journal = {The Computer Journal},
    volume = {59},
    number = {11},
    year = {2016},
}

@inproceedings{pads,
    author="Anagnostopoulos, Aris
    and Goodrich, Michael T.
    and Tamassia, Roberto",
    title="Persistent Authenticated Dictionaries and Their Applications",
    bookTitle="Information Security",
    year="2001",
}

@inproceedings{two-party-ad,
    author="Papamanthou, Charalampos
    and Tamassia, Roberto",
    title="Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures",
    bookTitle="Information and Communications Security",
    year="2007",
}

@INPROCEEDINGS{catena, 
    author={Alin Tomescu and Srinivas Devadas},
    booktitle={IEEE S\&P'17}, 
    title={Catena: Efficient Non-equivocation via Bitcoin}, 
    year={2017},
    month={May},
}

@inproceedings{cosi, 
    author={E. Syta and I. Tamas and D. Visher and D. I. Wolinsky and P. Jovanovic and L. Gasser and N. Gailly and I. Khoffi and B. Ford}, 
    booktitle={IEEE S\&P'16}, 
    title={{Keeping Authorities ``Honest or Bust'' with Decentralized Witness Cosigning}}, 
    year={2016},
    month={May},
}

@inproceedings{at,
    author = {Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew},
    title = {Hey, NSA: Stay Away from My Market! Future Proofing App Markets Against Powerful Attackers},
    booktitle = {ACM CCS'14},
    year = {2014},
}

@inproceedings {chainiac,
    author = {Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Justin Cappos and Bryan Ford},
    title = {{CHAINIAC}: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds},
    booktitle = {{USENIX} Security '17},
    year = {2017},
}

@InProceedings{contour,
author="Al-Bassam, Mustafa
and Meiklejohn, Sarah",
title="Contour: A Practical System for Binary Transparency",
booktitle="Data Privacy Management, Cryptocurrencies and Blockchain Technology",
year="2018",
}

@article{software-dist-transparency,
    author    = {Benjamin Hof and Georg Carle},
    title     = {Software Distribution Transparency and Auditability},
    journal   = {CoRR},
    volume    = {abs/1711.07278},
    year      = {2017},
    url       = {http://arxiv.org/abs/1711.07278},
    archivePrefix = {arXiv},
    eprint    = {1711.07278},
    timestamp = {Sun, 03 Dec 2017 12:38:15 +0100},
}

@inproceedings{frientegrity,
    author = {Feldman, Ariel J. and Blankstein, Aaron and Freedman, Michael J. and Felten, Edward W.},
    title = {{Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider}},
    booktitle = {{USENIX} Security '12},
    year = {2012},
}

@inproceedings{sporc,
author = {Feldman, Ariel J. and Zeller, William P. and Freedman, Michael J. and Felten, Edward W.},
booktitle = {OSDI'10},
title = {{SPORC: Group Collaboration Using Untrusted Cloud Resources}},
year = {2010}
}

@inproceedings{verena,
    title={Verena: End-to-End Integrity Protection for Web Applications},
    author={Nikolaos Karapanos and Alexandros Filios and Raluca Ada Popa and Srdjan Capkun},
    booktitle={IEEE S\&P'16},
    year={2016},
}

@inproceedings{mylar,
    author = {Popa, Raluca Ada and Stark, Emily and Helfer, Jonas and Valdez, Steven and Zeldovich, Nickolai and Kaashoek, M. Frans and Balakrishnan, Hari},
    title = {{Building Web Applications on Top of Encrypted Data Using Mylar}},
    booktitle = {NSDI'14},
    year = {2014},
}

@inproceedings{mov-attack,
    author = {Menezes, Alfred and Vanstone, Scott and Okamoto, Tatsuaki},
    title = {Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field},
    booktitle = {STOC'91},
    year = {1991},
}

@inproceedings{pairing,
    author="Joux, Antoine",
    title="A One Round Protocol for Tripartite Diffie--Hellman",
    bookTitle="Algorithmic Number Theory",
    year="2000",
}

@patent{merkle,
    author={Ralph C. Merkle},
    title={{Method of providing digital signatures}},
    year={1982},
    month=jan # "~5",
    nationality="United States",
    number=4309569,
}

@article{ad,
    author = {Crosby, Scott A. and Wallach, Dan S.},
    title = {{Authenticated Dictionaries: Real-World Costs and Trade-Offs}},
    journal = {ACM Transactions on Information and System Security},
    issue_date = {September 2011},
    volume = {14},
    number = {2},
    month = sep,
    year = {2011},
    articleno = {17},
}

@inproceedings{apad-oprea,
    author="Oprea, Alina
    and Bowers, Kevin D.",
    title={{Authentic Time-Stamps for Archival Storage}},
    bookTitle="ESORICS'09",
    year="2009",
}

@inproceedings{certificate-rev-upd,
    author = {Naor, Moni and Nissim, Kobbi},
    title = {{Certificate Revocation and Certificate Update}},
    booktitle = {USENIX Security '98},
    year = {1998},
}

@inproceedings{polycommit,
    author="Kate, Aniket
    and Zaverucha, Gregory M.
    and Goldberg, Ian",
    title="Constant-Size Commitments to Polynomials and Their Applications",
    bookTitle="ASIACRYPT'10",
    year="2010",
}

@inproceedings{acc-rsa,
author = {Benaloh, Josh and de Mare, Michael},
booktitle = {EUROCRYPT'93},
title = {{One-Way Accumulators: A Decentralized Alternative to Digital Signatures}},
year = {1994}
}

@inproceedings{acc-bilinear,
    author="Nguyen, Lan",
    title={{Accumulators from Bilinear Pairings and Applications}},
    bookTitle="CT-RSA'05",
    year="2005",
}

@misc{acc-bilinear-nonmemb,
    author = {Ivan Damg{\aa}rd and Nikos Triandopoulos},
    title = {{Supporting Non-membership Proofs with Bilinear-map  Accumulators}},
    howpublished = {Cryptology ePrint Archive, Report 2008/538},
    year = {2008},
    note = {\url{http://eprint.iacr.org/2008/538}},
}

@inproceedings{dizk,
author = {Howard Wu and Wenting Zheng and Alessandro Chiesa and Raluca Ada Popa and Ion Stoica},
title = {{DIZK}: A Distributed Zero Knowledge Proof System},
booktitle = {{USENIX} Security '18},
year = {2018},
}

@misc{ethiks,
    author = {Joseph Bonneau},
    title = {{EthIKS: Using Ethereum to audit a CONIKS key transparency log}},
    howpublished = {BITCOIN'16},
    year = {2016},
}

@inproceedings{qsbdh,
	author="Goyal, Vipul",
	title="Reducing Trust in the PKG in Identity Based Cryptosystems",
	bookTitle="CRYPTO'07",
	year="2007",
}

@inproceedings{kea-falsified,
	author="Bellare, Mihir
	and Palacio, Adriana",
	title="The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols",
	bookTitle="CRYPTO'04",
	year="2004",
}

@inproceedings{sundrosdi,
    author = {Li, Jinyuan and Krohn, Maxwell and Mazi\`{e}res, David and Shasha, Dennis},
    title = {{Secure Untrusted Data Repository (SUNDR)}},
    booktitle = {OSDI'04},
    year = {2004},
}

@inproceedings{beyondonethird,
    author = {Li, Jinyuan and Mazi{\'e}res, David},
    title = {Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems},
    booktitle = {NSDI'07},
    year = {2007},
}

@misc{bitcoin,
    author={Nakamoto, Satoshi},
    title={{Bitcoin: A Peer-to-Peer Electronic Cash System}},
    howpublished={\url{https://bitcoin.org/bitcoin.pdf}},
    year={2008},
    note = {{Accessed: 2017-03-08}},
}

@misc{ethereum,
    author = {Gavin Wood},
    year = {2015},
    title = {{Ethereum: A Secure Decentralised Generalised Transaction Ledger}},
    howpublished = {\url{http://gavwood.com/paper.pdf}},
    note = {{Accessed: 2016-05-15}},
}

@misc{zcash,
    author = {Hopwood, Daira and Bowe, Sean and Hornby, Taylor and Wilcox, Nathan},
    title = {{Zcash Protocol Specification}},
    howpublished = {\url{https://github.com/zcash/zips/blob/master/protocol/protocol.pdf}},
    year = {2015},
    note = {{Accessed: 2017-11-17}},
}

@InProceedings{zcash-mpc1,
    author="Bowe, Sean
    and Gabizon, Ariel
    and Green, Matthew D.",
    title="A Multi-party Protocol for Constructing the Public Parameters of the Pinocchio zk-SNARK",
    booktitle="Financial Cryptography '18",
    year="2018",
}

@misc{zcash-mpc2,
    author = {Sean Bowe and Ariel Gabizon and Ian Miers},
    title = {{Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model}},
    howpublished = {Cryptology ePrint Archive, Report 2017/1050},
    year = {2017},
    note = {\url{https://eprint.iacr.org/2017/1050}},
}

@inproceedings{distributed-acc,
    author="Reyzin, Leonid and Yakoubov, Sophia",
    title="Efficient Asynchronous Accumulators for Distributed PKI",
    bookTitle="Security and Cryptography for Networks",
    year="2016",
}

@incollection{moderncomputeralgebra-ch8,
    address = {New York, NY, USA},
    author = {von zur Gathen, Joachim and Gerhard, Jurgen},
    booktitle = {Modern Computer Algebra},
    chapter = {8},
    edition = {3rd},
    pages = {221--254},
    publisher = {Cambridge University Press},
    title = {{Fast Multiplication}},
    year = {2013}
}
@incollection{moderncomputeralgebra-ch10,
    address = {New York, NY, USA},
    author = {von zur Gathen, Joachim and Gerhard, Jurgen},
    booktitle = {Modern Computer Algebra},
    chapter = {10},
    edition = {3rd},
    pages = {295--310},
    publisher = {Cambridge University Press},
    title = {{Fast polynomial evaluation and interpolation}},
    year = {2013}
}

@incollection{moderncomputeralgebra-ch11,
    address = {New York, NY, USA},
    author = {von zur Gathen, Joachim and Gerhard, Jurgen},
    booktitle = {Modern Computer Algebra},
    chapter = {11},
    edition = {3rd},
    pages = {313--333},
    publisher = {Cambridge University Press},
    title = {{Fast Euclidean Algorithm}},
    year = {2013}
}

@article{preparata-fft-ff,
    author = {Preparata, Franco P. and Sarwate, Dilip V.},
    journal = {Mathematics of Computation},
    number = {139},
    title = {{Computational Fourier Transforms Complexity of Over Finite Fields}},
    volume = {31},
    year = {1977}
}

@inproceedings{zks,
    author = {Micali, Silvio and Rabin, Michael and Kilian, Joe},
    booktitle = {FOCS'03},
    title = {{Zero-Knowledge Sets}},
    year = {2003}
}

@inproceedings{neg1,
 author = {Bitansky, Nir and Canetti, Ran and Paneth, Omer and Rosen, Alon},
 title = {On the Existence of Extractable One-way Functions},
 booktitle = {STOC'14},
 year = {2014},
} 

@inproceedings{neg2,
  author    = {Elette Boyle and
               Rafael Pass},
  title     = {Limits of Extractability Assumptions with Distributional Auxiliary Input},
  booktitle = {ASIACRYPT'15},
  year      = {2015},
}

@inproceedings{groth10,
  author    = {Jens Groth},
  title     = {Short Pairing-Based Non-interactive Zero-Knowledge Arguments},
  booktitle = {ASIACRYPT'10},
  year      = {2010},
}

@inproceedings{groth16,
author = {Groth, Jens},
booktitle = {EUROCRYPT'16},
title = {{On the Size of Pairing-Based Non-interactive Arguments}},
year = {2016}
}

@inproceedings{qsp,
author = {Gennaro, Rosario and Gentry, Craig and Parno, Bryan and Raykova, Mariana},
booktitle = {EUROCRYPT'13},
title = {{Quadratic Span Programs and Succinct NIZKs without PCPs}},
year = {2013}
}

@article{cs-proofs,
author = {Micali, Silvio},
journal = {SIAM Journal on Computing},
number = {4},
title = {{Computationally Sound Proofs}},
volume = {30},
year = {2000}
}
