{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:39:21Z","timestamp":1767321561601,"version":"3.48.0"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_12","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:04Z","timestamp":1767321304000},"page":"315-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Air-FRI: Acceleration of\u00a0the\u00a0FRI Protocol on\u00a0the\u00a0GPU for\u00a0ZkSNARK Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7360-0336","authenticated-orcid":false,"given":"Tanmayi","family":"Jandhyala","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2684-9259","authenticated-orcid":false,"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"12_CR1","unstructured":"Akins, B., Ng, J., Verdi, R.S.: The use of blockchain for public services. J. Public Econ. (2013)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2087\u20132104 (2017)","DOI":"10.1145\/3133956.3134104"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Aslam, S., To\u0161i\u0107, A., Mrissa, M.: Secure and privacy-aware blockchain design: requirements, challenges and solutions. J. Cybersecur. Priv. 1(1), 164\u2013194 (2021). https:\/\/doi.org\/10.3390\/jcp1010009","DOI":"10.3390\/jcp1010009"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Babai, L.: Trading group theory for randomness. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing (STOC), pp. 421\u2013429 (1985)","DOI":"10.1145\/22145.22192"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Badakhshan, M., Luo, G., Jandhyala, T., Gong, G.: URSA minor: the implementation framework for polaris. In: International Workshop on the Arithmetic of Finite Fields (WAIFI), Ottawa, Canada (2024, accepted for publication)","DOI":"10.1007\/978-3-031-81824-0_16"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/0-387-34805-0_19","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"M Bellare","year":"1990","unstructured":"Bellare, M., Goldwasser, S.: New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 194\u2013211. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_19"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Fast reed-solomon interactive oracle proofs of proximity. In: Chatzigiannakis, I., Kaklamanis, C., Marx, D., Sannella, D. (eds.) 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018, 9\u201313 July 2018, Prague, Czech Republic. LIPIcs, vol.\u00a0107, pp. 14:1\u201314:17. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2018). https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2018.14","DOI":"10.4230\/LIPIcs.ICALP.2018.14"},{"key":"12_CR8","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. In: Advances in Cryptology \u2013 CRYPTO 2018, pp. 201\u2013234 (2018)"},{"key":"12_CR9","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Paper 2018\/046 (2018). https:\/\/eprint.iacr.org\/2018\/046"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474 (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-17653-2_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"E Ben-Sasson","year":"2019","unstructured":"Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.P.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 103\u2013128. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_4"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-662-53644-5_2","volume-title":"Theory of Cryptography","author":"E Ben-Sasson","year":"2016","unstructured":"Ben-Sasson, E., Chiesa, A., Spooner, N.: Interactive oracle proofs. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9986, pp. 31\u201360. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53644-5_2"},{"key":"12_CR13","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Succinct non-interactive zero knowledge for a von neumann architecture. In: Proceedings of the 23rd USENIX Conference on Security Symposium, SEC 2014, pp. 781\u2013796. USENIX Association (2014)"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, p. 15 29. Association for Computing Machinery (2014). https:\/\/doi.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Tikhomirov, S.: Deanonymization and linkability of cryptocurrency transactions based on network analysis. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 172\u2013184. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 326\u2013349. Association for Computing Machinery (2012). https:\/\/doi.org\/10.1145\/2090236.2090263","DOI":"10.1145\/2090236.2090263"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 103\u2013112. Association for Computing Machinery, New York (1988). https:\/\/doi.org\/10.1145\/62212.62222","DOI":"10.1145\/62212.62222"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Boneh, D., Drake, J., Fisch, B., Gabizon, A.: Halo infinite: recursive zk-snarks from any additive polynomial commitment scheme. Cryptology ePrint Archive (2020)","DOI":"10.1007\/978-3-030-84242-0_23"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Chen, J., Li, B., Zhang, Y., Peng, L., Peir, J.K.: Statistical GPU power analysis using tree-based methods. In: 2011 International Green Computing Conference and Workshops, pp.\u00a01\u20136 (2011). https:\/\/doi.org\/10.1109\/IGCC.2011.6008582","DOI":"10.1109\/IGCC.2011.6008582"},{"key":"12_CR20","unstructured":"Chen, M.S., et al.: Preon: zk-snark based signature scheme (2023)"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/978-3-030-45721-1_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"A Chiesa","year":"2020","unstructured":"Chiesa, A., Ojha, D., Spooner, N.: Fractal: post-quantum and transparent recursive proofs from holography. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12105, pp. 769\u2013793. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_27"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Delestrac, P., et al.: Analyzing GPU energy consumption in data movement and storage. In: 2024 IEEE 35th International Conference on Application-specific Systems, Architectures and Processors (ASAP), pp. 143\u2013151. IEEE Computer Society (2024). https:\/\/doi.org\/10.1109\/ASAP61560.2024.00038","DOI":"10.1109\/ASAP61560.2024.00038"},{"key":"12_CR23","first-page":"186","volume-title":"Advances in Cryptology \u2013 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) Advances in Cryptology \u2013 CRYPTO\u2019 86, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Fu, S., Gong, G.: Polaris: transparent succinct zero-knowledge arguments for R1CS with efficient verifier. Proc. Priv. Enhancing Technol. (2022)","DOI":"10.2478\/popets-2022-0027"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity. In: Proceedings of the 27th Annual Symposium on Foundations of Computer Science (FOCS), pp. 174\u2013187 (1986)","DOI":"10.1109\/SFCS.1986.47"},{"issue":"1","key":"12_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00195207","volume":"7","author":"O Goldreich","year":"1994","unstructured":"Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof systems. J. Cryptol. 7(1), 1\u201332 (1994). https:\/\/doi.org\/10.1007\/BF00195207","journal-title":"J. Cryptol."},{"issue":"1","key":"12_CR27","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186\u2013208 (1989). https:\/\/doi.org\/10.1137\/0218012","journal-title":"SIAM J. Comput."},{"key":"12_CR28","unstructured":"Gong, G.: Fri. Unpublished note. Department of Electrical and Computer Engineering. University of Waterloo, Waterloo, ON, Canada (2023)"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Gong, G.: Uni\/multi variate polynomial embeddings for zkSNARKs. Cryptogr. Commun. 1\u201332 (2024)","DOI":"10.1007\/s12095-024-00723-0"},{"key":"12_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-17373-8_19","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"J Groth","year":"2010","unstructured":"Groth, J.: Short pairing-based non-interactive zero-knowledge arguments. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 321\u2013340. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_19"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"12_CR32","unstructured":"Hopwood, D., Bowe, S., Hornby, T., Wilcox, N., et\u00a0al.: Zcash protocol specification. GitHub: San Francisco, CA, USA 4(220), 32 (2016)"},{"key":"12_CR33","unstructured":"Keccak Team: Keccak specifications summary (2024). https:\/\/keccak.team\/keccak_specs_summary.html. Accessed 11 Nov 2024"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 839\u2013858 (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"12_CR35","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-662-45472-5_30","volume-title":"Financial Cryptography and Data Security","author":"P Koshy","year":"2014","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) Financial Cryptography and Data Security, pp. 469\u2013485. Springer, Heidelberg (2014)"},{"key":"12_CR36","unstructured":"Levinin, A.: libiop-fp2: A C++ library for IOP-based zkSNARKs over elliptic curves (2023). https:\/\/github.com\/levanin\/libiop-fp2. Accessed 13 Oct 2024"},{"key":"12_CR37","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. Elsevier (1977)"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Micali, S.: CS proofs (extended abstract). In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS), pp. 436\u2013453 (1994)","DOI":"10.1109\/SFCS.1994.365746"},{"key":"12_CR39","unstructured":"Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin 4(2), 15 (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"12_CR40","unstructured":"NVIDIA Corporation: NVIDIA A40 datasheet (2020). https:\/\/images.nvidia.com\/content\/Solutions\/data-center\/a40\/nvidia-a40-datasheet.pdf. Accessed 23 Oct 2024"},{"key":"12_CR41","unstructured":"NVIDIA Corporation: Cuda profiler user\u2019s guide (2024). https:\/\/docs.nvidia.com\/cuda\/profiler-users-guide\/. Accessed 12 Nov 2024"},{"key":"12_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-69255-1_9","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"A-E Panait","year":"2021","unstructured":"Panait, A.-E., Olimid, R.F.: On using zk-SNARKs and zk-STARKs in blockchain-based identity management. In: Maimut, D., Oprina, A.-G., Sauveron, D. (eds.) SecITC 2020. LNCS, vol. 12596, pp. 130\u2013145. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-69255-1_9"},{"issue":"3\u20134","key":"12_CR43","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1057\/jbr.2015.19","volume":"16","author":"GW Peters","year":"2015","unstructured":"Peters, G.W., Panayi, E.: Understanding modern banking ledgers through blockchain technologies: future of transaction processing and smart contracts on the internet of money. J. Bank. Regul. 16(3\u20134), 217\u2013233 (2015). https:\/\/doi.org\/10.1057\/jbr.2015.19","journal-title":"J. Bank. Regul."},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Annual International Cryptology Conference, pp. 433\u2013444. Springer (1991)","DOI":"10.1007\/3-540-46766-1_35"},{"key":"12_CR45","unstructured":"SCIPR Lab, contributors: libiop: A C++ library for IOP-based zksnarks (2017\u20132024). https:\/\/github.com\/scipr-lab\/libiop. Accessed 13 Oct 2024"},{"key":"12_CR46","unstructured":"Setty, S.: Spartan: efficient and general-purpose zkSNARKs without trusted setup. Cryptology ePrint Archive, Paper 2019\/550 (2019). https:\/\/eprint.iacr.org\/2019\/550"},{"key":"12_CR47","unstructured":"The RustaCUDA Developers: Rustacuda: A safe wrapper for the CUDA driver API (2024). https:\/\/docs.rs\/rustacuda\/latest\/rustacuda\/. Accessed 10 Nov 2024"},{"issue":"3","key":"12_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316481","volume":"52","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. (CSUR) 52(3), 1\u201334 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:07Z","timestamp":1767321307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}