{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:48Z","timestamp":1774367388527,"version":"3.50.1"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/isca52012.2021.00040","type":"proceedings-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T20:58:26Z","timestamp":1628110706000},"page":"416-428","source":"Crossref","is-referenced-by-count":63,"title":["PipeZK: Accelerating Zero-Knowledge Proof with a Pipelined Architecture"],"prefix":"10.1109","author":[{"given":"Ye","family":"Zhang","sequence":"first","affiliation":[{"name":"Peking University"}]},{"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Xian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Jiangbin","family":"Dong","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University"}]},{"given":"Xingzhong","family":"Mao","sequence":"additional","affiliation":[{"name":"Institute for Interdisciplinary Information Core Technology,Xi&#x2019;an"}]},{"given":"Fan","family":"Long","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"International Digital Economy Academy at Guangdong-Hong Kong-Macau Greater Bay Area"}]},{"given":"Dong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Mingyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Guangyu","family":"Sun","sequence":"additional","affiliation":[{"name":"Peking University"}]}],"member":"263","reference":[{"key":"ref39","first-page":"4","article-title":"Coda: Decentralized cryptocurrency at scale","volume":"10","author":"meckler","year":"2018","journal-title":"O (1) Labs whitepaper"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_245"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0913"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/cta.2295"},{"key":"ref35","author":"hopwood","year":"2016","journal-title":"Zcash Protocol Specification"},{"key":"ref34","first-page":"766","article-title":"A new approach to pipeline fft processor","author":"he","year":"1996","journal-title":"Proceedings of International Conference on Parallel Processing"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref2","article-title":"bellman: a crate for building zk-snark circuits","year":"0"},{"key":"ref1","article-title":"barrywhitehat. roll up: Scale ethereum with snarks","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/CHCOMPUTMTH"},{"key":"ref24","author":"fisch","year":"2018","journal-title":"Scaling proof-of-replication for filecoin mining"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.22"},{"key":"ref26","first-page":"265","article-title":"Verifiable sealed-bid auction on the ethereum blockchain","author":"galal","year":"2018","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref25","first-page":"953","article-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge","volume":"2019","author":"gabizon","year":"2019"},{"key":"ref50","first-page":"675","article-title":"DIZK: A distributed zero knowledge proof system","author":"wu","year":"0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417278"},{"key":"ref54","first-page":"82","article-title":"How to vote privately using bitcoin","author":"zhao","year":"2015","journal-title":"International Conference on Information and Communications Security"},{"key":"ref53","first-page":"1146","article-title":"A zero-knowledge version of vsql","volume":"2017","author":"zhang","year":"2017"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"ref10","article-title":"Qed-it","year":"0"},{"key":"ref11","article-title":"The snark challenge: A global competition to speed up the snark prover","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref12","article-title":"Zcash company","year":"0"},{"key":"ref13","first-page":"1","article-title":"Ieee standard specifications for public-key cryptography","year":"2000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2294649"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0042-2"},{"key":"ref16","first-page":"551","article-title":"Computational integrity with a public random string from quasilinear pcps","author":"ben-sasson","year":"2017","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"ref4","article-title":"Filecoin company","year":"0"},{"key":"ref3","article-title":"bellperson: Gpu parallel acceleration for zk-snark","year":"0"},{"key":"ref6","article-title":"Gpu groth16 prover","year":"0"},{"key":"ref5","article-title":"Fpga snark prover targeting the bn128 curve","year":"0"},{"key":"ref8","article-title":"jsnark: A java library for building snarks","year":"0"},{"key":"ref7","article-title":"J.p. morgan quorum","year":"0"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/2331684.2331693","article-title":"Sch&#x00F6;nhage-strassen algorithm with mapreduce for multiplying terabit integers","author":"sze","year":"2012","journal-title":"Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation"},{"key":"ref9","article-title":"libsnark: a c++ library for zksnark proofs","year":"0"},{"key":"ref46","first-page":"387","article-title":"Fpga-based high-performance parallel architecture for homomorphic computing on encrypted data","author":"roy","year":"2019","journal-title":"2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref48","first-page":"704","article-title":"Spartan: Efficient and general-purpose zksnarks without trusted setup","author":"setty","year":"2020","journal-title":"Annual International Cryptology Conference"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_29"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1976.21"}],"event":{"name":"2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)","location":"Valencia, Spain","start":{"date-parts":[[2021,6,14]]},"end":{"date-parts":[[2021,6,18]]}},"container-title":["2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9499716\/9499722\/09499783.pdf?arnumber=9499783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T22:43:57Z","timestamp":1699310637000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9499783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/isca52012.2021.00040","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}