1. Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-Preserving Data Mining. In SIGMOD 2000 (Dallas, Texas, USA) (Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data). ACM, 439--450.
2. Thomas Attema, Ronald Cramer, and Lisa Kohl. 2021. A compressed Σ-protocol theory for lattices. In CRYPTO 2021 (Lecture Notes in Computer Science, Vol. 12826), Tal Malkin and Chris Peikert (Eds.). Springer, 549--579.
3. Fiat-Shamir Transformation of Multi-round Interactive Proofs
4. Sean Bowe, Jack Grigg, and Daira Hopwood. 2019. Halo: Recursive proof composition without a trusted setup. Cryptology ePrint Archive (2019), 1021. https://eprint.iacr.org/2019/1021
5. Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In S&P 2018 (Proceedings of 2018 IEEE symposium on security and privacy). IEEE, 315--334.