%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEE2018 IEEE Symposium on Security and Privacy (SP);2018; ; ;10.1109/SP.2018.00060cryptographic protocolszero knowledgesuccinct argumentscomputationally sound proofsDoubly-Efficient zkSNARKs Without Trusted SetupRiad S. WahbyIoanna TziallaAbhi ShelatJustin ThalerMichael Walfish
2018 IEEE Symposium on Security and Privacy (SP)926 May 201810.1109/SP.2018.00060943
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>
endobj
4 0 obj
<>
endobj
5 0 obj
<>
endobj
6 0 obj
<>stream
hTM s҃{XBrnV'AhFC|}MktzKqr3k3܀:TzTDwplwPU8Ds
jz/ [`u,N@B]͇jDOxM
ȊUֱ׀d{Ĺgk%e<1qR8gHI%|;L` =Pm
endstream
endobj
7 0 obj
<>stream
h\RmLS}f`{]Lt2fNMTJaRJ)P(-bUA˫EP !:Pg̙etY2eYe7ܓsn.̈APv:CYl.H*Gz#Q.q7?nNӲi9@*f?.AQCMR'="y.ydK^)REy{LY4):T0M1LNY^.ONY! Wè9Z
D==}
#(!$1*Cb
t"Fc7%2b9R M;斦bIv845+e4vq5eEg?E5 }(Gu~Pքj_&/XELM*+7MYlc`Uvf4,0 lpÂx(wحZQq07?`jvRm͵bֆc_/wӔmlU ScogISZ\edlSp`WhPeKFS ϸV`K|8_9q~ûD
l\B fr lk:8Is`&K}c
ɿ.\0N46 `!Sdj]]Q!
uG+5/yt
&aR5.`< 5x1Y:y5!CT\k?<Y?D~6 1oƯ-饅ٻOEJq<}bK)lDum-Wnz0sY[.lZ|,w.Xq,@0$p!d7`g$%s(n&Y"IHϚLlΌ
w̾ks3تGT*9Jx :a6eN/{EDZ{x22~zO]wڼrvDM,YN3 ɏCw6 1ۥ+m[nT~l*Y>M(6k2UjEno8OKiBW؞VG[;.aẗ́^
0 |
endstream
endobj
8 0 obj
<>
endobj
9 0 obj
<>
endobj
10 0 obj
<>
endobj
11 0 obj
<>stream
hTPj0+t/h)n,-g6svnH ==ޓwFUup3)+A-@[T5