{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:25:44Z","timestamp":1768346744304,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hong Kong Theme-based project TRS","award":["T41-603\/20R"],"award-info":[{"award-number":["T41-603\/20R"]}]},{"name":"Microsoft Research Asia Collaborative Research Grant"},{"name":"Hong Kong CRF Project","award":["C6030-18G, C1031-18G, C5026-18G"],"award-info":[{"award-number":["C6030-18G, C1031-18G, C5026-18G"]}]},{"name":"HKUST-Webank joint research lab grants"},{"name":"Hong Kong RGC GRF Project","award":["16213620"],"award-info":[{"award-number":["16213620"]}]},{"name":"Didi-HKUST joint research lab"},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2019B151530001"],"award-info":[{"award-number":["2019B151530001"]}]},{"name":"Hong Kong ITC ITF grants","award":["ITS\/044\/18FX, ITS\/470\/18FX"],"award-info":[{"award-number":["ITS\/044\/18FX, ITS\/470\/18FX"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018AAA0101100"],"award-info":[{"award-number":["2018AAA0101100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong AOE Project","award":["AoE\/E-603\/18"],"award-info":[{"award-number":["AoE\/E-603\/18"]}]},{"name":"HKUST-NAVER\/LINE AI Lab"},{"name":"China NSFC","award":["61729201"],"award-info":[{"award-number":["61729201"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457248","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:39Z","timestamp":1624036959000},"page":"2036-2048","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["DIV"],"prefix":"10.1145","author":[{"given":"Zihuan","family":"XU","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_5"},{"key":"e_1_3_2_2_3_1","volume-title":"International conference on the theory and applications of cryptographic techniques. Springer.","author":"Bari\u0107 Niko","year":"1997","unstructured":"Niko Bari\u0107 and Birgit Pfitzmann . 1997 . Collision-free accumulators and fail-stop signature schemes without trees . In International conference on the theory and applications of cryptographic techniques. Springer. Niko Bari\u0107 and Birgit Pfitzmann. 1997. Collision-free accumulators and fail-stop signature schemes without trees. In International conference on the theory and applications of cryptographic techniques. Springer."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"e_1_3_2_2_5_1","volume-title":"23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14) .","author":"Ben-Sasson Eli","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014. Succinct non-interactive zero knowledge for a von Neumann architecture . In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14) . Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14) ."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-016-0221-0"},{"key":"e_1_3_2_2_7_1","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques. Springer.","author":"Benaloh Josh","year":"1993","unstructured":"Josh Benaloh and Michael De Mare . 1993 . One-way accumulators: A decentralized alternative to digital signatures . In Workshop on the Theory and Application of of Cryptographic Techniques. Springer. Josh Benaloh and Michael De Mare. 1993. One-way accumulators: A decentralized alternative to digital signatures. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_20"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00050"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_2_13_1","volume-title":"Workshop on distributed cryptocurrencies and consensus ledgers","volume":"310","author":"Christian","unstructured":"Christian Cachin et almbox. 2016. Architecture of the hyperledger blockchain fabric . In Workshop on distributed cryptocurrencies and consensus ledgers , Vol. 310 . Christian Cachin et almbox. 2016. Architecture of the hyperledger blockchain fabric. In Workshop on distributed cryptocurrencies and consensus ledgers, Vol. 310."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134025"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.03.004"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_3_2_2_19_1","volume-title":"Probability theory: independence, interchangeability, martingales","author":"Chow Yuan Shih","unstructured":"Yuan Shih Chow and Henry Teicher . 2003. Probability theory: independence, interchangeability, martingales . Springer Science & Business Media . Yuan Shih Chow and Henry Teicher. 2003. Probability theory: independence, interchangeability, martingales .Springer Science & Business Media."},{"key":"e_1_3_2_2_20_1","volume-title":"An algorithm for the machine calculation of complex Fourier series. Mathematics of computation","author":"Cooley James W","year":"1965","unstructured":"James W Cooley and John W Tukey . 1965. An algorithm for the machine calculation of complex Fourier series. Mathematics of computation , Vol. 19 , 90 ( 1965 ). James W Cooley and John W Tukey. 1965. An algorithm for the machine calculation of complex Fourier series. Mathematics of computation , Vol. 19, 90 (1965)."},{"key":"e_1_3_2_2_21_1","volume-title":"Supporting Non-membership Proofs with Bilinear-map Accumulators. IACR Cryptol. ePrint Arch","author":"Damg\u00e5rd Ivan","year":"2008","unstructured":"Ivan Damg\u00e5rd and Nikos Triandopoulos . 2008. Supporting Non-membership Proofs with Bilinear-map Accumulators. IACR Cryptol. ePrint Arch . , Vol. 2008 ( 2008 ). Ivan Damg\u00e5rd and Nikos Triandopoulos. 2008. Supporting Non-membership Proofs with Bilinear-map Accumulators. IACR Cryptol. ePrint Arch. , Vol. 2008 (2008)."},{"key":"e_1_3_2_2_22_1","article-title":"Untangling blockchain: A data processing view of blockchain systems","volume":"30","author":"Anh Dinh Tien Tuan","year":"2018","unstructured":"Tien Tuan Anh Dinh , Rui Liu , Meihui Zhang , Gang Chen , Beng Chin Ooi , and Ji Wang . 2018 . Untangling blockchain: A data processing view of blockchain systems . IEEE Transactions on Knowledge and Data Engineering , Vol. 30 , 7 (2018). Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, and Ji Wang. 2018. Untangling blockchain: A data processing view of blockchain systems. IEEE Transactions on Knowledge and Data Engineering , Vol. 30, 7 (2018).","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_3_2_2_24_1","volume-title":"Emin G\u00fcn Sirer, and Robbert Van Renesse.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016 . Bitcoin-ng : A scalable blockchain protocol. In 13th $$USENIX$$ symposium on networked systems design and implementation ($$NSDI$$ 16) . Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In 13th $$USENIX$$ symposium on networked systems design and implementation ($$NSDI$$ 16) ."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_27_1","series-title":"SIAM Journal on computing","volume-title":"The knowledge complexity of interactive proof systems","author":"Goldwasser Shafi","year":"1989","unstructured":"Shafi Goldwasser , Silvio Micali , and Charles Rackoff . 1989. The knowledge complexity of interactive proof systems . SIAM Journal on computing , Vol. 18 , 1 ( 1989 ). Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The knowledge complexity of interactive proof systems. SIAM Journal on computing , Vol. 18, 1 (1989)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_29_1","volume-title":"Information theory and statistical mechanics. Physical review","author":"Jaynes Edwin T","year":"1957","unstructured":"Edwin T Jaynes . 1957. Information theory and statistical mechanics. Physical review , Vol. 106 , 4 ( 1957 ). Edwin T Jaynes. 1957. Information theory and statistical mechanics. Physical review , Vol. 106, 4 (1957)."},{"key":"e_1_3_2_2_30_1","unstructured":"Matter Labs. 2020 a. Bellman circuit library. https:\/\/github.com\/matter-labs\/bellman. .  Matter Labs. 2020 a. Bellman circuit library. https:\/\/github.com\/matter-labs\/bellman. ."},{"key":"e_1_3_2_2_31_1","unstructured":"Matter Labs. 2020 b. zkSync v0.4.2. https:\/\/github.com\/matter-labs\/zksync\/releases\/tag\/v0.4.2 .  Matter Labs. 2020 b. zkSync v0.4.2. https:\/\/github.com\/matter-labs\/zksync\/releases\/tag\/v0.4.2 ."},{"key":"e_1_3_2_2_32_1","unstructured":"matter labs. 2020. zkSync. https:\/\/zksync.io .  matter labs. 2020. zkSync. https:\/\/zksync.io ."},{"key":"e_1_3_2_2_33_1","volume-title":"May","volume":"10","author":"Meckler Izaak","year":"2018","unstructured":"Izaak Meckler and Evan Shapiro . 2018 . Coda: Decentralized cryptocurrency at scale. O (1) Labs whitepaper . May , Vol. 10 (2018). Izaak Meckler and Evan Shapiro. 2018. Coda: Decentralized cryptocurrency at scale. O (1) Labs whitepaper. May , Vol. 10 (2018)."},{"key":"e_1_3_2_2_34_1","volume-title":"Conference on the theory and application of cryptographic techniques .","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the theory and application of cryptographic techniques . Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques ."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365746"},{"key":"e_1_3_2_2_36_1","volume-title":"40th annual symposium on foundations of computer science (cat. No. 99CB37039)","author":"Micali Silvio","unstructured":"Silvio Micali , Michael Rabin , and Salil Vadhan . 1999. Verifiable random functions . In 40th annual symposium on foundations of computer science (cat. No. 99CB37039) . IEEE. Silvio Micali, Michael Rabin, and Salil Vadhan. 1999. Verifiable random functions. In 40th annual symposium on foundations of computer science (cat. No. 99CB37039). IEEE."},{"key":"e_1_3_2_2_37_1","volume-title":"Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis","author":"Mitzenmacher Michael","unstructured":"Michael Mitzenmacher and Eli Upfal . 2017. Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis . Cambridge university press . Michael Mitzenmacher and Eli Upfal. 2017. Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis .Cambridge university press."},{"key":"e_1_3_2_2_38_1","volume-title":"Cees Van Wijk, and Aleksei Koren","author":"Morais Eduardo","year":"2019","unstructured":"Eduardo Morais , Tommy Koens , Cees Van Wijk, and Aleksei Koren . 2019 . A survey on zero knowledge range proofs and applications. SN Applied Sciences , Vol. 1 , 8 (2019). Eduardo Morais, Tommy Koens, Cees Van Wijk, and Aleksei Koren. 2019. A survey on zero knowledge range proofs and applications. SN Applied Sciences , Vol. 1, 8 (2019)."},{"key":"e_1_3_2_2_39_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_2_40_1","volume-title":"Cryptographers' track at the RSA conference","author":"Nguyen Lan","unstructured":"Lan Nguyen . 2005. Accumulators from bilinear pairings and applications . In Cryptographers' track at the RSA conference . Springer . Lan Nguyen. 2005. Accumulators from bilinear pairings and applications. In Cryptographers' track at the RSA conference. Springer."},{"key":"e_1_3_2_2_41_1","volume-title":"29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20) .","author":"Ozdemir Alex","unstructured":"Alex Ozdemir , Riad Wahby , Barry Whitehat , and Dan Boneh . 2020. Scaling verifiable computation using efficient set accumulators . In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20) . Alex Ozdemir, Riad Wahby, Barry Whitehat, and Dan Boneh. 2020. Scaling verifiable computation using efficient set accumulators. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20) ."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_43_1","volume-title":"Annual international cryptology conference","author":"Pedersen Torben Pryds","unstructured":"Torben Pryds Pedersen . 1991. Non-interactive and information-theoretic secure verifiable secret sharing . In Annual international cryptology conference . Springer . Torben Pryds Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Annual international cryptology conference. Springer."},{"key":"e_1_3_2_2_44_1","unstructured":"Bowe S. 2017. BLS12--381: New zk-SNARK elliptic curve construction. https:\/\/z.cash\/blog\/new-snark-curve\/. .  Bowe S. 2017. BLS12--381: New zk-SNARK elliptic curve construction. https:\/\/z.cash\/blog\/new-snark-curve\/. ."},{"key":"e_1_3_2_2_45_1","volume-title":"Exploring the attack surface of blockchain: A systematic overview. arXiv preprint arXiv:1904.03487","author":"Saad Muhammad","year":"2019","unstructured":"Muhammad Saad , Jeffrey Spaulding , Laurent Njilla , Charles Kamhoua , Sachin Shetty , DaeHun Nyang , and Aziz Mohaisen . 2019. Exploring the attack surface of blockchain: A systematic overview. arXiv preprint arXiv:1904.03487 ( 2019 ). Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, and Aziz Mohaisen. 2019. Exploring the attack surface of blockchain: A systematic overview. arXiv preprint arXiv:1904.03487 (2019)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465359"},{"key":"e_1_3_2_2_48_1","volume-title":"Blockchain: Blueprint for a new economy .\" O'Reilly Media","author":"Swan Melanie","year":"2015","unstructured":"Melanie Swan . 2015 . Blockchain: Blueprint for a new economy .\" O'Reilly Media , Inc .\". Melanie Swan. 2015. Blockchain: Blueprint for a new economy .\" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_2_49_1","volume-title":"May","author":"Todd Peter","year":"2016","unstructured":"Peter Todd . [n.d.]. Making UTXO Set Growth Irrelevant With Low-Latency Delayed TXO Commitments , May 2016 . Peter Todd. [n.d.]. Making UTXO Set Growth Irrelevant With Low-Latency Delayed TXO Commitments, May 2016."},{"key":"e_1_3_2_2_50_1","volume-title":"Fast and simple constant-time hashing to the BLS12--381 elliptic curve. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Wahby Riad S","year":"2019","unstructured":"Riad S Wahby and Dan Boneh . 2019. Fast and simple constant-time hashing to the BLS12--381 elliptic curve. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2019 ). Riad S Wahby and Dan Boneh. 2019. Fast and simple constant-time hashing to the BLS12--381 elliptic curve. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019)."},{"key":"e_1_3_2_2_51_1","volume-title":"The design of approximation algorithms","author":"Williamson David P","unstructured":"David P Williamson and David B Shmoys . 2011. The design of approximation algorithms . Cambridge university press . David P Williamson and David B Shmoys. 2011. The design of approximation algorithms .Cambridge university press."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300083"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.35"}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:06Z","timestamp":1750195686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457248"}},"subtitle":["Resolving the Dynamic Issues of Zero-knowledge Set Membership Proof in the Blockchain"],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":52,"alternative-id":["10.1145\/3448016.3457248","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457248","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}