{"id":"https://openalex.org/W7133345093","doi":"https://doi.org/10.1007/s10207-026-01209-1","title":"Collaborative CP-NIZKs: modular, composable proofs for distributed secrets","display_name":"Collaborative CP-NIZKs: modular, composable proofs for distributed secrets","publication_year":2026,"publication_date":"2026-03-03","ids":{"openalex":"https://openalex.org/W7133345093","doi":"https://doi.org/10.1007/s10207-026-01209-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01209-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01209-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01209-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01209-1.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041360407","display_name":"Mohammed Alghazwi","orcid":"https://orcid.org/0000-0003-4039-4748"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Mohammed Alghazwi","raw_affiliation_strings":["University of Groningen, Groningen, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Groningen, Groningen, Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075561148","display_name":"Tariq Bontekoe","orcid":"https://orcid.org/0000-0002-5331-4033"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tariq Bontekoe","raw_affiliation_strings":["University of Groningen, Groningen, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Groningen, Groningen, Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017564812","display_name":"Leon Visscher","orcid":null},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Leon Visscher","raw_affiliation_strings":["University of Groningen, Groningen, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Groningen, Groningen, Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003244908","display_name":"Fatih T\u00fcrkmen","orcid":"https://orcid.org/0000-0002-6262-4869"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Fatih Turkmen","raw_affiliation_strings":["University of Groningen, Groningen, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Groningen, Groningen, Netherlands","institution_ids":["https://openalex.org/I169381384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041360407"],"corresponding_institution_ids":["https://openalex.org/I169381384"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78467563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.942300021648407,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.942300021648407,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.013000000268220901,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.008700000122189522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/composability","display_name":"Composability","score":0.8170999884605408},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7742999792098999},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.7067999839782715},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6104000210762024},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5530999898910522},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.46140000224113464},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4528999924659729},{"id":"https://openalex.org/keywords/automated-theorem-proving","display_name":"Automated theorem proving","score":0.397599995136261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8356000185012817},{"id":"https://openalex.org/C2778814252","wikidata":"https://www.wikidata.org/wiki/Q5156715","display_name":"Composability","level":2,"score":0.8170999884605408},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7742999792098999},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.7067999839782715},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6104000210762024},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5530999898910522},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5042999982833862},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.46140000224113464},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4528999924659729},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.397599995136261},{"id":"https://openalex.org/C203265346","wikidata":"https://www.wikidata.org/wiki/Q11387554","display_name":"Proof assistant","level":3,"score":0.3456999957561493},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.3255000114440918},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.32120001316070557},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.30880001187324524},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2978000044822693},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29010000824928284},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-026-01209-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01209-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01209-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01209-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01209-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01209-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.41056451201438904,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7133345093.pdf","grobid_xml":"https://content.openalex.org/works/W7133345093.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W35289019","https://openalex.org/W1502745717","https://openalex.org/W1524288918","https://openalex.org/W1532874975","https://openalex.org/W1538440442","https://openalex.org/W1561641428","https://openalex.org/W1563556756","https://openalex.org/W1589034595","https://openalex.org/W1885156594","https://openalex.org/W1970606468","https://openalex.org/W1970823784","https://openalex.org/W1997708663","https://openalex.org/W2022205872","https://openalex.org/W2049982182","https://openalex.org/W2112963602","https://openalex.org/W2120154759","https://openalex.org/W2129462878","https://openalex.org/W2137739383","https://openalex.org/W2252150191","https://openalex.org/W2402235285","https://openalex.org/W2471959228","https://openalex.org/W2475985589","https://openalex.org/W2489890856","https://openalex.org/W2496543269","https://openalex.org/W2536319456","https://openalex.org/W2584551118","https://openalex.org/W2765206040","https://openalex.org/W2800679800","https://openalex.org/W2882986534","https://openalex.org/W2883585522","https://openalex.org/W2883748642","https://openalex.org/W2898776076","https://openalex.org/W2929975740","https://openalex.org/W2979437559","https://openalex.org/W2982474429","https://openalex.org/W2989230924","https://openalex.org/W2993523858","https://openalex.org/W3013005985","https://openalex.org/W3023964980","https://openalex.org/W3100486899","https://openalex.org/W3157066646","https://openalex.org/W3210540511","https://openalex.org/W4221050001","https://openalex.org/W4256107193","https://openalex.org/W4308361266","https://openalex.org/W4386841379"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Non-interactive":[1],"zero-knowledge":[2],"(NIZK)":[3],"proofs":[4,70,151,173],"of":[5,19,37,40,58,83,92,120,134,174,203,229,264],"knowledge":[6,57,175],"have":[7,72],"proven":[8],"to":[9,33,75,98,131,180,246],"be":[10],"highly":[11],"relevant":[12],"for":[13,44,105,109,114,167,188,216],"securely":[14],"realizing":[15],"a":[16,31,41,45,59,201,252],"wide":[17],"array":[18],"applications":[20,136],"that":[21,62,209],"rely":[22],"on":[23],"both":[24],"privacy":[25],"and":[26,112,149,152,176,194,196],"correctness":[27,39],".":[28,48],"They":[29],"enable":[30,181],"prover":[32,145],"convince":[34],"any":[35],"party":[36],"the":[38,81,89,118,122,129,138,163,265],"public":[42],"statement":[43],"secret":[46,60],"witness":[47,61],"However,":[49],"most":[50],"NIZKs":[51,102],"do":[52],"not":[53],"natively":[54],"support":[55],"proving":[56],"is":[63],"distributed":[64],"over":[65],"multiple":[66],"provers.":[67],"Previously,":[68],"collaborative":[69,139,148,168],"[54]":[71],"been":[73],"proposed":[74],"overcome":[76],"this":[77,86],"limitation.":[78],"We":[79,161,184,219],"investigate":[80],"notion":[82],"composability":[84,210],"in":[85,137,200,224],"setting,":[87],"following":[88],"Commit-and-Prove":[90],"design":[91],"LegoSNARK":[93],"[19].":[94],"Composability":[95],"allows":[96],"users":[97],"combine":[99],"different,":[100],"specialized":[101],"(e.g.,":[103],"one":[104,108,113,228],"arithmetic":[106],"circuits,":[107,111],"boolean":[110],"range":[115],"proofs)":[116],"with":[117],"aim":[119],"reducing":[121],"proof":[123],"generation":[124],"time.":[125],"Moreover,":[126],"it":[127],"opens":[128],"door":[130],"efficient":[132],"realizations":[133],"many":[135],"setting":[140],"such":[141],"as":[142],"mutually":[143],"exclusive":[144],"groups,":[146],"combining":[147],"single-party":[150],"efficiently":[153],"implementing":[154],"publicly":[155],"auditable":[156],"secure":[157],"multiparty":[158],"computing":[159],"(PA-MPC).":[160],"present":[162],"first,":[164],"general":[165],"definition":[166],"commitand-":[169],"prove":[170],"NIZK":[171],"(CP-NIZK)":[172],"construct":[177],"MPC":[178],"protocols":[179,187],"their":[182,198],"realization.":[183],"implement":[185],"our":[186,222],"two":[189,225],"commonly":[190],"used":[191],"NIZKs,":[192],"Groth16":[193],"Bulletproofs,":[195],"evaluate":[197],"practicality":[199],"variety":[202],"computational":[204],"settings.":[205],"Our":[206],"findings":[207],"indicate":[208],"adds":[211],"only":[212,251],"minor":[213],"overhead,":[214],"especially":[215],"large":[217],"circuits.":[218],"also":[220],"evaluated":[221],"construction":[223],"application":[226],"settings,":[227],"which":[230],"shows":[231],"18\u2013":[232],"$$55\\times":[233],"$$":[234],"<mml:math":[235,256],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[236,257],"<mml:mrow>":[237,258],"<mml:mn>55</mml:mn>":[238],"<mml:mo>\u00d7</mml:mo>":[239],"</mml:mrow>":[240,261],"</mml:math>":[241,262],"runtime":[242],"reduction":[243],"when":[244],"compared":[245],"prior":[247],"works":[248],"while":[249],"requiring":[250],"fraction":[253],"(":[254],"$$0.2\\%$$":[255],"<mml:mn>0.2</mml:mn>":[259],"<mml:mo>%</mml:mo>":[260],")":[263],"communication.":[266]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2026-03-04T00:00:00"}
