{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T06:40:31Z","timestamp":1773384031257,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/N028104\/1Ever since their introduction zero-knowledge proofs"],"award-info":[{"award-number":["EP\/N028104\/1Ever since their introduction zero-knowledge proofs"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3339817","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2111-2128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":241,"title":["Sonic"],"prefix":"10.1145","author":[{"given":"Mary","family":"Maller","sequence":"first","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Sean","family":"Bowe","sequence":"additional","affiliation":[{"name":"Electric Coin Company, Denver, CO, USA"}]},{"given":"Markulf","family":"Kohlweiss","sequence":"additional","affiliation":[{"name":"University of Edinburgh &amp; IOHK, Edinburgh, United Kingdom"}]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Sonic reference implementation. https:\/\/github.com\/zknuckles\/sonic.  Sonic reference implementation. https:\/\/github.com\/zknuckles\/sonic."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_23"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_7"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_26"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the IEEE Symposium on Security & Privacy","author":"Ben-Sasson E.","year":"2014"},{"key":"e_1_3_2_2_11_1","first-page":"90","volume-title":"Proceedings, Part II","author":"Ben-Sasson E.","year":"2013"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.25"},{"key":"e_1_3_2_2_13_1","volume-title":"Aurora: Transparent succinct arguments for R1CS. IACR Cryptology ePrint Archive","author":"Ben-Sasson E.","year":"2018"},{"key":"e_1_3_2_2_14_1","first-page":"31","volume-title":"TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II","author":"Ben-Sasson E.","year":"2016"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_16"},{"key":"e_1_3_2_2_16_1","first-page":"781","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Ben-Sasson E.","year":"2014"},{"key":"e_1_3_2_2_17_1","first-page":"518","volume-title":"ACNS 2013, Banff, AB, Canada, June 25--28, 2013. Proceedings","author":"Bernhard D.","year":"2013"},{"key":"e_1_3_2_2_18_1","first-page":"315","volume-title":"TCC 2013, Tokyo, Japan, March 3--6, 2013. Proceedings","author":"Bitansky N.","year":"2013"},{"key":"e_1_3_2_2_19_1","first-page":"757","volume-title":"Proceedings, Part I","author":"Boneh D.","year":"2018"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70700-6_12"},{"key":"e_1_3_2_2_24_1","volume-title":"Nearly linear-time zero-knowledge proofs for correct program execution. IACR Cryptology ePrint Archive","author":"Bootle J.","year":"2018"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_11"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455814"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978337"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133997"},{"key":"e_1_3_2_2_31_1","first-page":"100","volume-title":"TCC 2013, Tokyo, Japan, March 3--6, 2013. Proceedings","author":"Chase M.","year":"2013"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.22"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9145-x"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_28"},{"key":"e_1_3_2_2_36_1","first-page":"657","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Frankle J.","year":"2018"},{"key":"e_1_3_2_2_37_1","first-page":"33","volume-title":"Proceedings, Part II","author":"Fuchsbauer G.","year":"2018"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23253"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993651"},{"key":"e_1_3_2_2_42_1","first-page":"1069","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Giacomelli I.","year":"2016"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374396"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_24"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_20"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374438"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1137\/080725398"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_20"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0143-7"},{"key":"e_1_3_2_2_54_1","first-page":"41","volume-title":"Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1--5","author":"Lipmaa H.","year":"2013"},{"key":"e_1_3_2_2_55_1","volume-title":"Valiant's universal circuit: Improvements, implementation, and applications. IACR Cryptology ePrint Archive","author":"Lipmaa H.","year":"2016"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"M. Maller S. Bowe M. Kohlweiss and S. Meiklejohn. Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings. https:\/\/eprint.iacr.org\/2019\/099.  M. Maller S. Bowe M. Kohlweiss and S. Meiklejohn. Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings. https:\/\/eprint.iacr.org\/2019\/099.","DOI":"10.1145\/3319535.3339817"},{"key":"e_1_3_2_2_57_1","volume-title":"Coda: Decentralized cryptocurrency at scale","author":"Meckler I.","year":"2018"},{"key":"e_1_3_2_2_58_1","first-page":"222","volume-title":"TCC 2013, Tokyo, Japan, March 3--6, 2013. Proceedings","author":"Papamanthou C.","year":"2013"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_60_1","first-page":"196","volume-title":"Proceedings of the 8th Annual ACM Symposium on Theory of Computing","author":"Valiant L. G.","year":"1976"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00060"},{"key":"e_1_3_2_2_62_1","volume-title":"Oct.","author":"Wilcox Z.","year":"2016"},{"key":"e_1_3_2_2_63_1","unstructured":"Z. S. Workshop 2018. https:\/\/zkproof.org\/proceedings-snapshots\/zkproof-implementation-20180801.pdf.  Z. S. Workshop 2018. https:\/\/zkproof.org\/proceedings-snapshots\/zkproof-implementation-20180801.pdf."},{"key":"e_1_3_2_2_64_1","first-page":"675","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Wu H.","year":"2018"},{"key":"e_1_3_2_2_65_1","volume-title":"A zero-knowledge version of vsql. IACR Cryptology ePrint Archive","author":"Zhang Y.","year":"2017"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3339817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3339817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:01Z","timestamp":1750202641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3339817"}},"subtitle":["Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":62,"alternative-id":["10.1145\/3319535.3339817","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3339817","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}