P. Bischoff. Report: 267 Million Phone Numbers & Facebook User IDs Exposed Online. Comparitech. Accessed: Apr. 27, 2020. [Online]. Available: https://www.comparitech.com/blog/information-security/267-million-phone-numbers-exposed-online/
E. Graham-Harrison and C. Cadwalladr. Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach. [Online]. Available: https://www.theguardian.com/news/2018/mar/17/cambridge-analyticafacebook-influence-us-election
R. Satter. U.S. Court: Mass Surveillance Program Exposed by Snowden was Illegal. Accessed: Sep. 3, 2020. [Online]. Available: https://www.reuters.com/article/us-usa-nsa-spying-idUSKBN25T3CK
M. Chase, T. Perrin, and G. Zaverucha, "The signal private group system and anonymous credentials supporting efficient veriflable encryption," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Oct. 2020, pp. 1445-1459.
N. van Saberhagen, "Cryptonote v2.0," Tech. Rep., 2013.
D. Hopwood, S. Bowe, T. Hornby, and N. Wilcox, "Zcash protocol speci-fication," Zerocoin Electr. Coin, Tech. Rep., 2016.
D. Chaum, "Showing credentials without identification," in Proc. Work-shop Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, 1985, pp. 241-244.
M. Chase, E. Ghosh, S. Setty, and D. Buchner, "Zero-knowledge credentials with deferred revocation checks," Tech. Rep., 2020, p. 13. [Online]. Available: https://raw.githubusercontent.com/decentralizedidentity/ snark-credentials/master/whitepaper.pdf
S. Meiklejohn, C. C. Erway, A. Küpçü, T. Hinkle, and A. Lysyanskaya, "ZKPDL: A language-based system for efficient zero-knowledge proofs and electronic cash," in Proc. USENIX Secur. Symp., vol. 10, 2010, pp. 193-206.
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza, "SNARKs for C: Verifying program executions succinctly and in zero knowledge," in Proc. Annu. Cryptol. Conf. Berlin, Germany: Springer, 2013, pp. 90-108.
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza, "TinyRAM architecture specification, v0. 991," SCIPR Lab, Tech. Rep., 2013, p. 16.
E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza, "Succinct noninteractive zero knowledge for a von Neumann architecture," in Proc. 23rd USENIX Secur. Symp., 2014, pp. 781-796.
H. G. Navarro, "Design and implementation of the Circom 1.0 compiler," Universidad Complutense de Madrid, Madrid, Spain, Tech. Rep., 2020.
L. Goldberg, S. Papini, and M. Riabzev. Cairo-A Turing-Complete Stark-Friendly CPU Architecture. Accessed: Sep. 2, 2021. [Online]. Available: https://eprint.iacr.org/2021/1063
D. Mouris and N. G. Tsoutsos, "Zilch: A framework for deploying transparent zero-knowledge proofs," IEEE Trans. Inf. Forensics Security, vol. 16, pp. 3269-3284, 2021.
S. Harris and A. Seaborne. SPARQL 1.1 Query Lan-guage. Accessed: Jan. 10, 2022. [Online]. Available: https://www.w3.org/TR/sparql11-query/
B. Bunz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell, "Bulletproofs: Short proofs for confidential transactions and more," in Proc. IEEE Symp. Secur. Privacy, May 2018, pp. 315-334.
O. Goldreich, S. Micali, and A. Wigderson, "How to play ANY mental game," in Proc. 19th Annu. ACM Conf. Theory Comput., 1987, pp. 218-229.
S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems," SIAM J. Comput., vol. 18, no. 1, pp. 186-208, Feb. 1989.
O. Goldreich, S. Micali, and A.Wigderson, "Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems," J. ACM, vol. 38, no. 3, pp. 690-728, Jul. 1991.
J. Bonneau, I. Meckler, V. Rao, and E. Shapiro, "Mina: Decentralized cryptocurrency at scale," New York Univ. O(1) Labs, New York, NY, USA, Whitepaper, 2020, pp. 1-47.
E. Ben-Sasson, I. Bentov, Y. Horesh, and M. Riabzev, "Scalable zero knowledge with, no., trusted setup," in Proc. CRYPTO, in Lecture Notes in Computer Science, A. Boldyreva and D. Micciancio, Eds. Cham, Switzerland: Springer, pp. 701-732.
M. Hoffmann, M. Klooy, and A. Rupp, "Efficient zero-knowledge arguments in the discrete log setting, revisited," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Nov. 2019, pp. 2093-2110.
N. Li and J. C. Mitchell, "DATALOG with constraints: A foundation for trust management languages," in Practical Aspects of Declarative Languages (Lecture Notes in Computer Science), V. Dahl and P. Wadler, Eds. Berlin, Germany: Springer, vol. 2562, 2002, pp. 58-73.
E. Pasarella and J. Lobo, "A datalog framework for modeling relationshipbased access control policies," in Proc. 22nd ACM Symp. Access Control Models Technol., Jun. 2017, pp. 91-102.
A. Masoumzadeh and J. Joshi, "OSNAC: An ontology-based access control model for social networking systems," in Proc. IEEE 2nd Int. Conf. Soc. Comput., Aug. 2010, pp. 751-759.
P. W. L. Fong and I. Siahaan, "Relationship-based access control policies and their policy languages," in Proc. 16th ACM Symp. Access Control Models Technol., 2011, pp. 51-60.
S. Buchegger, D. Schiöberg, L.-H. Vu, and A. Datta, "PeerSoN: P2P social networking: Early experiences and insights," in Proc. 2nd ACM EuroSys Workshop Social Netw. Syst., 2009, pp. 46-52.
R. De Smet, A. Dooms, A. Braeken, and J. Pierson, "Glycos: The basis for a peer-to-peer, private online social network," in Privacy and Identity Management Fairness, Accountability, and Transparency in the Age of Big Data (IFIP Advances in Information and Communication Technology), E. Kosta, J. Pierson, D. Slamanig, S. Fischer-Hübner, and S. Krenn, Eds. Cham, Switzerland: Springer, vol. 547, 2019, pp. 123-136.
K. Graffi and N. Masinde, "LibreSocial: A peer-to-peer framework for online social networks," in Proc. Int. Conf. Cloud Edge Comput., Big Data Blockchain, 2020, vol. 33, no. 8, Art. no. e6150.
S. Z. R. Rizvi, P.W. L. Fong, J. Crampton, and J. Sellwood, "Relationshipbased access control for an open-source medical records system," in Proc. 20th ACM Symp. Access Control Models Technol., Jun. 2015, pp. 113-124, doi: 10.1145/2752952.2752962.
L. Lesavre, P. Varin, P. Mell, M. Davidson, and J. Shook, "A taxonomic approach to understanding emerging blockchain identity management systems," 2019, arXiv:1908.00929.
BBSC Signatures 2020. Accessed: May 14, 2021. [Online]. Available: https://w3c-ccg.github.io/ldp-bbs2020/
L. Zhou, V. Varadharajan, and M. Hitchens, "Achieving secure role-based access control on encrypted data in cloud storage," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1947-1960, Dec. 2013.
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Proc. Annu. Int. Cryptol. Conf. Berlin, Germany: Springer, 2004, pp. 41-55.
M. Lodder and T. Looker. Jun. 15, 2020. BBSC Signature Scheme. [Online]. Available: https://mattrglobal.github.io/bbs-signatures-spec/
L. Grassi, D. Khovratovich, C. Rechberger, A. Roy, and M. Schofnegger, "Poseidon: A new hash function for zero-knowledge proof systems," presented at the 30th USENIX Secur. Symp., 2021.
G. G. Hillebrand, P. C. Kanellakis, H. G. Mairson, and M. Y. Vardi, "Undecidable boundedness problems for datalog programs," J. Log. Program., vol. 25, no. 2, pp. 163-190, 1995.
J. Groth, "On the size of pairing-based non-interactive arguments," in Proc. EUROCRYPT, in Lecture Notes in Computer Science, M. Fischlin and J.-S. Coron, Eds. Berlin, Germany: Springer, pp. 305-326.
E. Ben-Sasson, A. Chiesa, M. Riabzev, N. Spooner, M. Virza, and N. P. Ward, "Aurora: Transparent succinct arguments for R1CS," in Proc. EUROCRYPT, Y. Ishai and V. Rijmen, Eds. Cham, Switzerland: Springer, 2019, pp. 103-128.