iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3658644.3690282
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T15:10:36Z","timestamp":1734016236181,"version":"3.30.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690282","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T17:19:20Z","timestamp":1733764760000},"page":"929-940","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Hekaton:<\/scp>\n Horizontally-Scalable zkSNARKs Via Proof Aggregation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9784-125X","authenticated-orcid":false,"given":"Michael","family":"Rosenberg","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8598-3643","authenticated-orcid":false,"given":"Tushar","family":"Mopuri","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1974-7708","authenticated-orcid":false,"given":"Hossein","family":"Hafezi","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-2368","authenticated-orcid":false,"given":"Ian","family":"Miers","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6600-9719","authenticated-orcid":false,"given":"Pratyush","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9196-7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.i3.1-45"},{"volume-title":"IWSEC '23","author":"Ambrona Miguel","key":"e_1_3_2_1_3_1","unstructured":"Miguel Ambrona, Marc Beunardeau, Anne-Laure Schmitt, and Rapha\u00ebl R. Toledo. 2023. Aplonk: aggregated plonk from multi-polynomial commitment schemes. In IWSEC '23."},{"volume-title":"arkworks zkSNARK ecosystem","year":"2022","author":"Arkworks","key":"e_1_3_2_1_4_1","unstructured":"[SW] Arkworks contributors, arkworks zkSNARK ecosystem 2022. url: https:\/\/arkworks.rs."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58751-1_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422481"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_16"},{"volume-title":"USENIX Security '14","year":"2014","author":"Ben-Sasson Eli","key":"e_1_3_2_1_10_1","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security '14."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1991.185352"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_20"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Sean Bowe Alessandro Chiesa Matthew Green Ian Miers Pratyush Mishra and Howard Wu. 2020. ZEXE: enabling decentralized private computation. In S&P '20.","DOI":"10.1109\/SP40000.2020.00050"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Benedikt B\u00fcnz Jonathan Bootle Dan Boneh Andrew Poelstra Pieter Wuille and Greg Maxwell. 2018. Bulletproofs: short proofs for confidential transactions and more. In S&P '18.","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_24"},{"volume-title":"TCC '20","year":"2020","author":"B\u00fcnz Benedikt","key":"e_1_3_2_1_17_1","unstructured":"Benedikt B\u00fcnz, Alessandro Chiesa, Pratyush Mishra, and Nicholas Spooner. 2020. Proof-carrying data from accumulation schemes. In TCC '20."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339820"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363202"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"volume-title":"ICS '10","year":"2010","author":"Chiesa Alessandro","key":"e_1_3_2_1_22_1","unstructured":"Alessandro Chiesa and Eran Tromer. 2010. Proof-carrying data and hearsay arguments from signature cards. In ICS '10."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_13"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Craig Costello C\u00e9dric Fournet Jon Howell Markulf Kohlweiss Benjamin Kreuter Michael Naehrig Bryan Parno and Samee Zahur. 2015. Geppetto: versatile verifiable computation. In S&P '15.","DOI":"10.1109\/SP.2015.23"},{"key":"e_1_3_2_1_25_1","unstructured":"Apple Security Engineering and Architecture. 2023. ''Advancing imessage security: imessage contact key verification.'' https:\/\/security.apple.com\/blog\/imessage-contact-key-verification\/. (2023)."},{"volume-title":"Williamson","year":"2020","author":"Gabizon Ariel","key":"e_1_3_2_1_26_1","unstructured":"Ariel Gabizon and Zachary J. Williamson. 2020. ''Plookup: A simplified polynomial protocol for lookup tables.'' Cryptology ePrint Archive Report 2020\/315. (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_10"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"volume-title":"USENIX Security '21","year":"2021","author":"Grassi Lorenzo","key":"e_1_3_2_1_30_1","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A new hash function for zero-knowledge proof systems. In USENIX Security '21."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"volume-title":"USENIX Security '20","year":"2020","author":"Kosba Ahmed E.","key":"e_1_3_2_1_32_1","unstructured":"Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, and Dawn Song. 2020. MIRAGE: succinct arguments for randomized algorithms with applications to universal zk-snarks. In USENIX Security '20."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15985-5_13"},{"key":"e_1_3_2_1_34_1","unstructured":"Sean Lawlor and Kevin Lewi. 2023. ''Deploying key transparency at whatsapp.'' https:\/\/engineering.fb.com\/2023\/04\/13\/security\/whatsapp-key-transparency\/. (2023)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-52282-4_44"},{"volume-title":"rep. CS-TR-212--89","author":"Lipton Richard J.","key":"e_1_3_2_1_36_1","unstructured":"Richard J. Lipton. 1989. Fingerprinting Sets. Tech. rep. CS-TR-212--89. Princeton University."},{"key":"e_1_3_2_1_37_1","unstructured":"Tianyi Liu Tiancheng Xie Jiaheng Zhang Dawn Song and Yupeng Zhang. 2024. Pianist: scalable zkrollups via fully distributed zero-knowledge proofs. In S&P '24."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"volume-title":"Freedman","year":"2015","author":"Melara Marcela S.","key":"e_1_3_2_1_39_1","unstructured":"Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. CONIKS: Bringing Key Transparency to End Users. In USENIX Security '15."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68403-6_10"},{"volume-title":"Paper 2024\/1208.","year":"2024","author":"Rosenberg Michael","key":"e_1_3_2_1_41_1","unstructured":"Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, and Pratyush Mishra. 2024. ''Hekaton: horizontally-scalable zksnarks via proof aggregation.'' Cryptology ePrint Archive, Paper 2024\/1208. (2024)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616621"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560605"},{"volume-title":"USENIX Security '18","year":"2018","author":"Wu Howard","key":"e_1_3_2_1_46_1","unstructured":"Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. DIZK: A distributed zero knowledge proof system. In USENIX Security '18."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560652"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560646"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2018. vRAM: faster verifiable RAM with program-independent preprocessing. In S&P '18.","DOI":"10.1109\/SP.2018.00013"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T14:29:53Z","timestamp":1734013793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":47,"alternative-id":["10.1145\/3658644.3690282","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690282","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}