References
[1]
Scott Ames, Carmit Hazay, Yuval Ishai, and Muthura-
makrishnan Venkitasubramaniam. Ligero: Lightweight
sublinear arguments without a trusted setup. In Proceed-
ings of the 2017 acm sigsac conference on computer
and communications security, pages 2087–2104, 2017.
[2]
Diego F Aranha, Emil Madsen Bennedsen, Matteo Cam-
panelli, Chaya Ganesh, Claudio Orlandi, and Akira
Takahashi. Eclipse: enhanced compiling method for
pedersen-committed zksnark engines. In Public-Key
Cryptography–PKC 2022: 25th IACR International Con-
ference on Practice and Theory of Public-Key Cryptog-
raphy, Virtual Event, March 8–11, 2022, Proceedings,
Part I, pages 584–614. Springer, 2022.
[3]
Carsten Baum, Lennart Braun, Alexander Munch-
Hansen, Benoit Razet, and Peter Scholl. Appenzeller to
brie: efficient zero-knowledge proofs for mixed-mode
arithmetic and
Z
2
k
. In Proceedings of the 2021 ACM
SIGSAC Conference on Computer and Communications
Security, pages 192–211, 2021.
[4]
Carsten Baum, Lennart Braun, Alexander Munch-
Hansen, and Peter Scholl. Moz
Z
2
k
arella: efficient vector-
ole and zero-knowledge proofs over
Z
2
k
. In Advances in
Cryptology–CRYPTO 2022: 42nd Annual International
Cryptology Conference, CRYPTO 2022, Santa Barbara,
CA, USA, August 15–18, 2022, Proceedings, Part IV,
pages 329–358. Springer, 2022.
[5]
Carsten Baum, Alex J Malozemoff, Marc B Rosen, and
Peter Scholl. Mac’n’cheese: Zero-knowledge proofs for
boolean and arithmetic circuits with nested disjunctions.
In Advances in Cryptology–CRYPTO 2021: 41st Annual
International Cryptology Conference, CRYPTO 2021,
Virtual Event, August 16–20, 2021, Proceedings, Part
IV 41, pages 92–122. Springer, 2021.
[6]
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin,
Eran Tromer, and Madars Virza. SNARKs for C: Veri-
fying program executions succinctly and in zero knowl-
edge. In Ran Canetti and Juan A. Garay, editors,
CRYPTO 2013, Part II, volume 8043 of LNCS, pages
90–108. Springer, Heidelberg, August 2013.
[7]
Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin,
Eran Tromer, and Madars Virza. Snarks for c: Verifying
program executions succinctly and in zero knowledge.
In Advances in Cryptology–CRYPTO 2013: 33rd An-
nual Cryptology Conference, Santa Barbara, CA, USA,
August 18-22, 2013. Proceedings, Part II, pages 90–108.
Springer, 2013.
[8]
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and
Madars Virza. Succinct non-interactive zero knowledge
for a von neumann architecture. In 23rd USENIX Secu-
rity Symposium (USENIX Security 14), pages 781–796,
2014.
[9]
Václav E Beneš. Permutation groups, complexes, and re-
arrangeable connecting networks. Bell System Technical
Journal, 43(4):1619–1640, 1964.
[10]
Alexander R Block, Justin Holmgren, Alon Rosen,
Ron D Rothblum, and Pratik Soni. Public-coin zero-
knowledge arguments with (almost) minimal time and
space overheads. In Theory of Cryptography: 18th In-
ternational Conference, TCC 2020, Durham, NC, USA,
November 16–19, 2020, Proceedings, Part II, pages 168–
197. Springer, 2020.
[11]
Alexander R Block, Justin Holmgren, Alon Rosen,
Ron D Rothblum, and Pratik Soni. Time-and space-
efficient arguments from groups of unknown order. In
Advances in Cryptology–CRYPTO 2021: 41st Annual
International Cryptology Conference, CRYPTO 2021,
Virtual Event, August 16–20, 2021, Proceedings, Part
IV 41, pages 123–152. Springer, 2021.
[12]
Manuel Blum, Will Evans, Peter Gemmell, Sampath
Kannan, and Moni Naor. Checking the correctness of
memories. Algorithmica, 12:225–244, 1994.
[13]
Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune
Jakobsen, and Mary Maller. Arya: Nearly linear-time
zero-knowledge proofs for correct program execution.
In Advances in Cryptology–ASIACRYPT 2018: 24th
International Conference on the Theory and Applica-
tion of Cryptology and Information Security, Brisbane,
QLD, Australia, December 2–6, 2018, Proceedings, Part
I, pages 595–626. Springer, 2018.
[14]
Benjamin Braun, Ariel J Feldman, Zuocheng Ren, Sri-
nath Setty, Andrew J Blumberg, and Michael Walfish.
Verifying computations with state. In Proceedings of the
twenty-fourth ACM Symposium on Operating Systems
Principles, pages 341–357, 2013.
[15]
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew
Poelstra, Pieter Wuille, and Greg Maxwell. Bulletproofs:
Short proofs for confidential transactions and more. In
2018 IEEE Symposium on Security and Privacy, pages
315–334. IEEE Computer Society Press, May 2018.
[16]
Ran Canetti. Universally composable security: A new
paradigm for cryptographic protocols. In Proceedings
42nd IEEE Symposium on Foundations of Computer
Science, pages 136–145. IEEE, 2001.
[17]
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, and Amit
Sahai. Universally composable two-party and multi-
party secure computation. In Proceedings of the Thiry-