{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:17:36Z","timestamp":1773479856401,"version":"3.50.1"},"reference-count":109,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100015595","name":"Ethereum Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634469","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"712-728","source":"Crossref","is-referenced-by-count":5,"title":["SoK: Compression in Rollups"],"prefix":"10.1109","author":[{"given":"Roshan","family":"Palakkal","sequence":"first","affiliation":[{"name":"Quantstamp, Inc"}]},{"given":"Jan","family":"Gorzny","sequence":"additional","affiliation":[{"name":"Zircuit"}]},{"given":"Martin","family":"Derka","sequence":"additional","affiliation":[{"name":"Zircuit"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref2","volume-title":"Smart contracts: Building blocks for digital markets.","author":"Szabo","year":"1996"},{"key":"ref3","article-title":"ERC-20 token standard","author":"Vogelsteller","year":"2015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006113"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_12"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icbc56567.2023.10174993"},{"key":"ref7","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref8","first-page":"4043","article-title":"Blitz: Secure multi-hop payments without two-phase commits","volume-title":"In Michael Bailey and Rachel Greenstadt, editors, 30th USENIX Security Symposium, USENIX Security 2021","author":"Aumayr"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134096"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23330"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00111"},{"key":"ref12","article-title":"Plasma: Scalable autonomous smart contracts","author":"Poon","year":"2017"},{"key":"ref13","first-page":"2018\/642","article-title":"Commit-chains: Secure, scalable offchain payments","author":"Khalil","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref14","first-page":"2021\/1589","article-title":"SoK: Validating bridges as a scaling solution for blockchains","author":"McCorry","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"ref15","volume-title":"Sidechains vs Plasma vs sharding","author":"Buterin","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_15"},{"key":"ref17","article-title":"EIP-4844: Shard blob transactions","author":"Buterin","year":"2022"},{"key":"ref18","article-title":"Proto-danksharding faq","author":"Buterin","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3565383.3566107"},{"key":"ref20","first-page":"1353","article-title":"Arbitrum: Scalable, private smart contracts","volume-title":"In William Enck and Adrienne Porter Felt, editors, 27th USENIX Security Symposium, USENIX Security 2018","author":"Kalodner"},{"key":"ref21","article-title":"Optimism"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref23","volume-title":"Scroll"},{"key":"ref24","article-title":"Introducing zkSync: the missing link to mass adoption of ethereum","author":"Gluchowski","year":"2021"},{"key":"ref25","volume-title":"RollupCodes","year":"2024"},{"key":"ref26","article-title":"Ethereum data structures","volume":"abs\/2108.05513","author":"Jezek","year":"2021","journal-title":"CoRR"},{"key":"ref27","volume-title":"Modified Merkle Patricia trie \u2014 how Ethereum saves a state","author":"Kim"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8265-9_1492"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/96559.214080"},{"key":"ref30","article-title":"An incomplete guide to rollups","author":"Buterin","year":"2021"},{"key":"ref31","volume-title":"Public inputs"},{"key":"ref32","first-page":"2015\/389","volume-title":"Keccak. Cryptology ePrint Archive","author":"Bertoni","year":"2015"},{"key":"ref33","volume-title":"zkSync Era"},{"key":"ref34","volume-title":"Clarification on how calldata persists on the blockchain and how optimistic rollups use it."},{"key":"ref35","article-title":"Different types of layer 2s","author":"Buterin","year":"2023"},{"key":"ref36","volume-title":"Volition on Starknet: Your data, your choice","year":"2023"},{"key":"ref37","volume-title":"Optimism completes \u2018Bedrock\u2019 hard fork, in pursuit of superchain","author":"Nijkerk","year":"2023"},{"key":"ref38","volume-title":"L2beat."},{"key":"ref39","volume-title":"web3.utils","year":"2020"},{"key":"ref40","volume-title":"Apex."},{"key":"ref41","volume-title":"Arbitrum Nova"},{"key":"ref42","volume-title":"Arbitrum One"},{"key":"ref43","article-title":"Aztec Network yellow paper","author":"Gabizon","year":"2021"},{"key":"ref44","article-title":"Private DeFi with the Aztec Connect bridge","author":"Wu","year":"2021"},{"key":"ref45","article-title":"Introducing Base","author":"Robinson","year":"2023"},{"key":"ref46","volume-title":"Turing hybrid compute."},{"key":"ref47","article-title":"Engineering roadmap AMA recap","year":"2022"},{"key":"ref48","volume-title":"CANVAS connect."},{"key":"ref49","volume-title":"DeGate"},{"key":"ref50","volume-title":"dYdX: A standard for decentralized margin trading and derivatives","author":"Juliano","year":"2018"},{"key":"ref51","volume-title":"Fuel"},{"key":"ref53","volume-title":"Layer2.Finance."},{"key":"ref54","volume-title":"Loopring"},{"key":"ref55","volume-title":"Metis"},{"key":"ref56","volume-title":"Myria"},{"key":"ref58","volume-title":"Deep dive into Polygon Hermez 2.0, 2022."},{"key":"ref59","volume-title":"Sorare"},{"key":"ref60","volume-title":"StarkEx"},{"key":"ref61","volume-title":"StarkNet"},{"key":"ref62","volume-title":"ZKSpace"},{"key":"ref63","volume-title":"zkSync Lite"},{"key":"ref64","doi-asserted-by":"crossref","article-title":"Brotli compressed data format","author":"Alakuijala","DOI":"10.17487\/RFC7932"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3231935"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8878"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"ref70","volume-title":"An order-2 context model for data compression with reduced time and space requirements","author":"Lelewer","year":"1990"},{"key":"ref71","volume-title":"deflate"},{"key":"ref72","article-title":"Asymmetric numeral systems as close to capacity low state entropy coders","volume":"abs\/1311.2540","author":"Duda","year":"2013","journal-title":"CoRR"},{"key":"ref73","article-title":"Coded-Character Sets: History and Development","author":"Mackenzie","year":"1980"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/18.705558"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.2002.1213"},{"key":"ref76","article-title":"Run Length Encoding Patents","year":"1996"},{"key":"ref77","first-page":"124","article-title":"A block-sorting lossless data compression algorithm","volume-title":"SRC Research Report","author":"Burrows","year":"1994"},{"key":"ref78","volume-title":"bzip.2"},{"issue":"4","key":"ref79","first-page":"16","article-title":"Data compression by means of a \u201cbook stack","volume":"16","author":"Ryabko","year":"1980","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref80","article-title":"Recursive-length prefix (RLP) serialization","year":"2023"},{"key":"ref81","article-title":"Zero-heavy encoding #409","year":"2022"},{"key":"ref82","volume-title":"L2 chain derivation specification","year":"2023"},{"key":"ref83","article-title":"The road to sub-dollar transactions, part 2: Compression edition","year":"2022"},{"key":"ref84","article-title":"Here\u2019s how bedrock will bring significantly lower fees to optimism mainnet","year":"2023"},{"key":"ref85","volume-title":"Loopring 3"},{"key":"ref86","volume-title":"Batch spot trade"},{"key":"ref88","volume-title":"Compression in Nitro","year":"2022"},{"key":"ref89","volume-title":"zkSync rollup protocol"},{"key":"ref90","volume-title":"gm zkEVM"},{"key":"ref91","volume-title":"Memolabs"},{"key":"ref92","volume-title":"The tech journey: Lower gas costs & storage layer on Metis","year":"2022"},{"key":"ref93","article-title":"Introducing AnyTrust chains: Cheaper, faster L2 chains with minimal trust assumptions","year":"2022"},{"key":"ref94","article-title":"A quick benchmark: Gzip vs. bzip.2 vs. lzma","author":"Collin","year":"2012"},{"key":"ref95","volume-title":"zkEVM FAQ"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"ref97","first-page":"2020\/315","article-title":"plookup: A simplified polynomial protocol for lookup tables","author":"Gabizon","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref98","volume-title":"The history of Ethereum","year":"2023"},{"key":"ref99","article-title":"EIP-2028: Transaction data gas cost reduction","author":"Akhunov","year":"2019"},{"key":"ref100","volume-title":"l1pricing.go."},{"key":"ref101","volume-title":"Multidimensional EIP 1559.","author":"Buterin"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2017.8117850"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3138805"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.5220\/0005454202560263"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6185"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328742"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD.2018.8605487"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8662032"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW52791.2021.00035"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2009.5118266"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.04.024"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/509907.510020"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/321879.321883"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dublin, Ireland","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634469.pdf?arnumber=10634469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:49:10Z","timestamp":1725338950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":109,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634469","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}