Barthoulot A, Blazy O and Canard S. Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. Progress in Cryptology - AFRICACRYPT 2024. (94-119).
Fiore D, Kolonelos D and Perthuis P. Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces. Advances in Cryptology – ASIACRYPT 2023. (166-200).
Bacho R, Collins D, Liu-Zhang C and Loss J. Network-Agnostic Security Comes (Almost) for Free in DKG and MPC. Advances in Cryptology – CRYPTO 2023. (71-106).
Alupotha J, Boyen X and McKague M. Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?. Computer Security – ESORICS 2022. (67-88).
Chu H, Fiore D, Kolonelos D and Schröder D. Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. Security and Cryptography for Networks. (639-662).
Ren Y, Liu X, Wu Q, Wang L, Zhang W and Cimato S.
(2022). Cryptographic Accumulator and Its Application. Security and Communication Networks. 2022. Online publication date: 1-Jan-2022.
Helminger L, Kales D, Ramacher S and Walch R. Multi-party Revocation in Sovrin: Performance through Distributed Trust. Topics in Cryptology – CT-RSA 2021. (527-551).
Bailey B and Sankagiri S. Merkle Trees Optimized for Stateless Clients in Bitcoin. Financial Cryptography and Data Security. FC 2021 International Workshops. (451-466).
Ren Y, Qi J, Liu Y, Wang J and Kim G.
(2021). Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator. ACM Transactions on Internet Technology. 21:1. (1-19). Online publication date: 28-Feb-2021.
Campanelli M, Fiore D, Greco N, Kolonelos D and Nizzardo L. Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. Advances in Cryptology – ASIACRYPT 2020. (3-35).
Schul-Ganz G and Segev G. Accumulators in (and Beyond) Generic Groups: Non-trivial Batch Verification Requires Interaction. Theory of Cryptography. (77-107).
Ozdemir A, Wahby R, Whitehat B and Boneh D. Scaling verifiable computation using efficient set accumulators. Proceedings of the 29th USENIX Conference on Security Symposium. (2075-2092).
Boneh D, Bünz B and Fisch B. Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. Advances in Cryptology – CRYPTO 2019. (561-586).
Ghosh E, Ohrimenko O, Papadopoulos D, Tamassia R and Triandopoulos N. Zero-Knowledge Accumulators and Set Algebra. Proceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 10032. (67-100).
Chase M and Meiklejohn S. Transparency Overlays and Applications. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. (168-179).
Libert B, Ling S, Nguyen K and Wang H. Zero-Knowledge Arguments for Lattice-Based Accumulators. Proceedings, Part II, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9666. (1-31).
Armknecht F, Bohli J, Karame G and Youssef F. Transparent Data Deduplication in the Cloud. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (886-900).