{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:06:53Z","timestamp":1770224813425,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1563722,2001096,2016240"],"award-info":[{"award-number":["1563722,2001096,2016240"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C0087,HR00112020025"],"award-info":[{"award-number":["HR001120C0087,HR00112020025"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"US-Israel BSF","award":["2015782"],"award-info":[{"award-number":["2015782"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484800","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"178-191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Constant-Overhead Zero-Knowledge for RAM Programs"],"prefix":"10.1145","author":[{"given":"Nicholas","family":"Franzese","sequence":"first","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Jonathan","family":"Katz","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Steve","family":"Lu","sequence":"additional","affiliation":[{"name":"Stealth Software Technologies, Inc., Los Angeles, CA, USA"}]},{"given":"Rafail","family":"Ostrovsky","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Chenkai","family":"Weng","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_2_1","volume-title":"Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions (LNCS elseLNCSfi)","author":"Baum Carsten","unstructured":"Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, and Peter Scholl. 2021. Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions (LNCS elseLNCSfi). Springer, 92--122."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_2_4_1","volume-title":"USENIX Security Symposium","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In USENIX Security Symposium 2014. USENIX Association, 781--796."},{"key":"e_1_3_2_2_5_1","volume-title":"Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads. In ifnumshortbib=017th fielseTheory of Cryptography Conference--TCCfi 2020 (LNCS elseLNCSfi)","author":"Block Alexander R.","unstructured":"Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, and Pratik Soni. 2020. Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads. In ifnumshortbib=017th fielseTheory of Cryptography Conference--TCCfi 2020 (LNCS elseLNCSfi). Springer, 168--197."},{"key":"e_1_3_2_2_6_1","volume-title":"Time- and Space-Efficient Arguments from Groups of Unknown Order (LNCS elseLNCSfi)","author":"Block Alexander R.","unstructured":"Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, and Pratik Soni. 2021. Time- and Space-Efficient Arguments from Groups of Unknown Order (LNCS elseLNCSfi). Springer, 123--152."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_17"},{"key":"e_1_3_2_2_9_1","volume-title":"Bulletproofs: Short Proofs for Confidential Transactions and More. In IEEE Symp. on Security & Privacy","author":"B\u00fcnz Benedikt","year":"2018","unstructured":"Benedikt B\u00fcnz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short Proofs for Confidential Transactions and More. In IEEE Symp. on Security & Privacy 2018. IEEE, 315--334."},{"key":"e_1_3_2_2_10_1","volume-title":"2nd Conference on Information-Theoretic Cryptography (ITC 2021) (Leibniz International Proceedings in Informatics (LIPIcs)). Schloss Dagstuhl -- Leibniz-Zentrum f\u00fcr Informatik","author":"Dittmer Samuel","unstructured":"Samuel Dittmer, Yuval Ishai, and Rafail Ostrovsky. 2021. Line-Point Zero Knowledge and Its Applications. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021) (Leibniz International Proceedings in Informatics (LIPIcs)). Schloss Dagstuhl -- Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany."},{"key":"e_1_3_2_2_11_1","volume-title":"Secure Stable Matching at Scale. In elseACM Conf. on Computer and Communications Security (CCS)fi","author":"Doerner Jack","year":"2016","unstructured":"Jack Doerner, David Evans, and abhi shelat. 2016. Secure Stable Matching at Scale. In elseACM Conf. on Computer and Communications Security (CCS)fi 2016. ACM Press, 1602--1613."},{"key":"e_1_3_2_2_12_1","volume-title":"Jesper Buus Nielsen, and Claudio Orlandi","author":"Frederiksen Tore Kasper","year":"2015","unstructured":"Tore Kasper Frederiksen, Jesper Buus Nielsen, and Claudio Orlandi. 2015. Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. In Eurocrypt elseAdvances in Cryptology--Eurocryptfi 2015, Part II (LNCS elseLNCSfi, Vol. 9057). Springer, 191--219."},{"key":"e_1_3_2_2_13_1","volume-title":"Eurocrypt elseAdvances in Cryptology--Eurocryptfi 2013 (LNCS elseLNCSfi)","author":"Gennaro Rosario","unstructured":"Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova. 2013. Quadratic Span Programs and Succinct NIZKs without PCPs. In Eurocrypt elseAdvances in Cryptology--Eurocryptfi 2013 (LNCS elseLNCSfi). Springer, 626--645."},{"key":"e_1_3_2_2_14_1","volume-title":"Secure two-party computation in sublinear (amortized) time. In elseACM Conf. on Computer and Communications Security (CCS)fi","author":"Gordon S. Dov","year":"2012","unstructured":"S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, and Yevgeniy Vahlis. 2012. Secure two-party computation in sublinear (amortized) time. In elseACM Conf. on Computer and Communications Security (CCS)fi 2012. ACM Press, 513--524."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_16_1","volume-title":"2020 a. A 2.1 KHz Zero-Knowledge Processor with BubbleRAM. In elseACM Conf. on Computer and Communications Security (CCS)fi","author":"Heath David","year":"2020","unstructured":"David Heath and Vladimir Kolesnikov. 2020 a. A 2.1 KHz Zero-Knowledge Processor with BubbleRAM. In elseACM Conf. on Computer and Communications Security (CCS)fi 2020. ACM Press, 2055--2074."},{"key":"e_1_3_2_2_17_1","volume-title":"Eurocrypt elseAdvances in Cryptology--Eurocryptfi","author":"Heath David","year":"2020","unstructured":"David Heath and Vladimir Kolesnikov. 2020 b. Stacked Garbling for Disjunctive Zero-Knowledge Proofs. In Eurocrypt elseAdvances in Cryptology--Eurocryptfi 2020, Part III (LNCS elseLNCSfi, Vol. 12107). Springer, 569--598."},{"key":"e_1_3_2_2_18_1","volume-title":"Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. In IEEE Symp. on Security & Privacy. IEEE.","author":"Heath David","year":"2021","unstructured":"David Heath, Yibin Yang, David Devecsery, Vladimir Kolesnikov, and Marco Guarnieri. 2021. Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs. In IEEE Symp. on Security & Privacy. IEEE."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_8"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516662"},{"key":"e_1_3_2_2_21_1","volume-title":"Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. In elseACM Conf. on Computer and Communications Security (CCS)fi","author":"Katz Jonathan","year":"2018","unstructured":"Jonathan Katz, Vladimir Kolesnikov, and Xiao Wang. 2018. Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. In elseACM Conf. on Computer and Communications Security (CCS)fi 2018. ACM Press, 525--537."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_18"},{"key":"e_1_3_2_2_23_1","volume-title":"Spartan: Efficient and General-Purpose zkSNARKs Without Trusted Setup. In Crypto elseAdvances in Cryptology--Cryptofi","author":"Setty Srinath","year":"2020","unstructured":"Srinath Setty. 2020. Spartan: Efficient and General-Purpose zkSNARKs Without Trusted Setup. In Crypto elseAdvances in Cryptology--Cryptofi 2020, Part III (LNCS elseLNCSfi). Springer, 704--737."},{"key":"e_1_3_2_2_24_1","volume-title":"Efficient RAM and control flow in verifiable outsourced computation","author":"Wahby Riad S.","unstructured":"Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, and Michael Walfish. 2015. Efficient RAM and control flow in verifiable outsourced computation. In NDSS. The Internet Society."},{"key":"e_1_3_2_2_25_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016b. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit ."},{"key":"e_1_3_2_2_26_1","volume-title":"Secure Computation of MIPS Machine Code. In ESORICS 2016 (LNCS). Springer, 99--117","author":"Wang Xiao Shaun","year":"2016","unstructured":"Xiao Shaun Wang, S. Dov Gordon, Allen McIntosh, and Jonathan Katz. 2016a. Secure Computation of MIPS Machine Code. In ESORICS 2016 (LNCS). Springer, 99--117."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00056"},{"key":"e_1_3_2_2_28_1","volume-title":"Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Crypto","author":"Xie Tiancheng","year":"2019","unstructured":"Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. 2019. Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Crypto 2019, Part III (LNCS, Vol. 11694). Springer, 733--764."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484556"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484800","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:46:46Z","timestamp":1763498806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":29,"alternative-id":["10.1145\/3460120.3484800","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484800","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}