{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:46:17Z","timestamp":1776725177208,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["HR001120C0087"],"award-info":[{"award-number":["HR001120C0087"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485379","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2968-2985","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":128,"title":["zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy"],"prefix":"10.1145","author":[{"given":"Tianyi","family":"Liu","sequence":"first","affiliation":[{"name":"Texas A&amp;M University &amp; Shanghai Key Laboratory of Privacy-Preserving Computation, College Station, TX, USA"}]},{"given":"Xiang","family":"Xie","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Privacy-Preserving Computation, Shanghai, China"}]},{"given":"Yupeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. Amazon Machine Learning Services. https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-overview\/machine-learning.html."},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. Implementation of vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs. https:\/\/github.com\/snp-labs\/VCNN."},{"key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. Implementation of ZEN: Efficient Zero-Knowledge Proof for Neural Networks. https:\/\/github.com\/UCSB-TDS\/ZEN."},{"key":"e_1_3_2_2_4_1","unstructured":"[n.d.]. mcl. https:\/\/github.com\/herumi\/mcl\/."},{"key":"e_1_3_2_2_5_1","unstructured":"2021. TensorFlow. https:\/\/www.tensorflow.org\/."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_2_7_1","unstructured":"Carsten Baum Alex J. Malozemoff Marc Rosen and Peter Scholl. 2020. Mac 'n' Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions. Cryptology ePrint Archive Report 2020\/1410. https:\/\/eprint.iacr.org\/2020\/1410."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_23"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--17653--2_4"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_2"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. [n.d.]. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In Proceedings of the USENIX Security Symposium, 2014."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417893"},{"key":"e_1_3_2_2_14_1","volume-title":"Bulletproofs: Short Proofs for Confidential Transactions and More. In Proceedings of the Symposium on Security and Privacy (SP)","volume":"00","author":"B\u00fcnz B.","year":"2018","unstructured":"B. B\u00fcnz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell. [n.d.]. Bulletproofs: Short Proofs for Confidential Transactions and More. In Proceedings of the Symposium on Security and Privacy (SP), 2018, Vol. 00. 319--338."},{"key":"e_1_3_2_2_15_1","unstructured":"Sean Bowe. [n.d.]. BLS12--381: New zk-SNARK Elliptic Curve Construction."},{"key":"e_1_3_2_2_16_1","volume-title":"CCS","author":"Campanelli Matteo","year":"2019","unstructured":"Matteo Campanelli, Dario Fiore, and Ana\u00efs Querol. [n.d.]. LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs.. In CCS 2019."},{"key":"e_1_3_2_2_17_1","volume-title":"A Zero Knowledge Sumcheck and its Applications. CoRR abs\/1704.02086","author":"Chiesa Alessandro","year":"2017","unstructured":"Alessandro Chiesa, Michael A. Forbes, and Nicholas Spooner. 2017. A Zero Knowledge Sumcheck and its Applications. CoRR abs\/1704.02086 (2017). arXiv:1704.02086 http:\/\/arxiv.org\/abs\/1704.02086"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"e_1_3_2_2_19_1","volume-title":"Introduction to Algorithms","author":"Cormen Thomas H.","unstructured":"Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms, Third Edition (3rd ed.). The MIT Press.","edition":"3"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12)","author":"Cormode Graham","unstructured":"Graham Cormode, Michael Mitzenmacher, and Justin Thaler. [n.d.]. Practical Verified Computation with Streaming Interactive Proofs. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_2_22_1","unstructured":"Samuel Dittmer Yuval Ishai and Rafail Ostrovsky. 2020. Line-Point Zero Knowledge and Its Applications. Cryptology ePrint Archive Report 2020\/1446. https:\/\/eprint.iacr.org\/2020\/1446."},{"key":"e_1_3_2_2_23_1","volume-title":"ZEN: Efficient Zero-Knowledge Proofs for Neural Networks. Cryptology ePrint Archive, Report 2021\/087. https:\/\/eprint.iacr.org\/2021\/087.","author":"Feng Boyuan","year":"2021","unstructured":"Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, and Shumo Chu. 2021. ZEN: Efficient Zero-Knowledge Proofs for Neural Networks. Cryptology ePrint Archive, Report 2021\/087. https:\/\/eprint.iacr.org\/2021\/087."},{"key":"e_1_3_2_2_24_1","volume-title":"Crypto","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir. [n.d.]. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Crypto 1986."},{"key":"e_1_3_2_2_25_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Ghodsi Zahra","year":"2017","unstructured":"Zahra Ghodsi, Tianyu Gu, and Siddharth Garg. 2017. SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA. 4672--4681."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699436"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Benoit Jacob Skirmantas Kligys Bo Chen Menglong Zhu Matthew Tang Andrew Howard Hartwig Adam and Dmitry Kalenichenko. 2017. Quantization andTraining of Neural Networks for Efficient Integer-Arithmetic-Only Inference. arXiv:1712.05877 [cs.LG]","DOI":"10.1109\/CVPR.2018.00286"},{"key":"e_1_3_2_2_29_1","volume-title":"ESORICS 2018, Barcelona, Spain, September 3--7, 2018, Proceedings, Part I (Lecture Notes in Computer Science","volume":"171","author":"Keuffer Julien","year":"2018","unstructured":"Julien Keuffer, Refik Molva, and Herv\u00e9 Chabanne. 2018. Efficient Proof Composition for Verifiable Computation. In Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3--7, 2018, Proceedings, Part I (Lecture Notes in Computer Science, Vol. 11098). Springer, 152--171."},{"key":"e_1_3_2_2_30_1","volume-title":"MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 2129--2146.","author":"Kosba Ahmed E.","year":"2020","unstructured":"Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, and Dawn Song. 2020. MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs. 2129--2146."},{"key":"e_1_3_2_2_31_1","unstructured":"Alex Krizhevsky. 2012. Learning Multiple Layers of Features from Tiny Images. University of Toronto (05 2012)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_33_1","unstructured":"Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. http:\/\/yann.lecun.com\/exdb\/mnist\/. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_2_34_1","unstructured":"Seunghwa Lee Hankyung Ko Jihye Kim and Hyunok Oh. 2020. vCNN: Verifiable Convolutional Neural Network based on zk-SNARKs. Cryptology ePrint Archive Report 2020\/584. https:\/\/eprint.iacr.org\/2020\/584."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/146585.146605"},{"key":"e_1_3_2_2_36_1","volume-title":"Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. Cryptology ePrint Archive, Report 2019\/099. https:\/\/eprint.iacr.org\/2019\/099.","author":"Maller Mary","year":"2019","unstructured":"Mary Maller, Sean Bowe, Markulf Kohlweiss, and Sarah Meiklejohn. 2019. Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. Cryptology ePrint Archive, Report 2019\/099. https:\/\/eprint.iacr.org\/2019\/099."},{"key":"e_1_3_2_2_37_1","volume-title":"Pinocchio: Nearly practical verifiable computation. In S&P","author":"Parno Bryan","year":"2013","unstructured":"Bryan Parno, Jon Howell, Craig Gentry, and Mariana Raykova. 2013. Pinocchio: Nearly practical verifiable computation. In S&P 2013. 238--252."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09519-5_72"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"e_1_3_2_2_40_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:1409.1556 [cs.CV]"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_5"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.51"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133984"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00060"},{"key":"e_1_3_2_2_45_1","volume-title":"Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. Cryptology ePrint Archive, Report 2020\/925. https:\/\/eprint.iacr.org\/2020\/925.","author":"Weng Chenkai","year":"2020","unstructured":"Chenkai Weng, Kang Yang, Jonathan Katz, and Xiao Wang. 2020. Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. Cryptology ePrint Archive, Report 2020\/925. https:\/\/eprint.iacr.org\/2020\/925."},{"key":"e_1_3_2_2_46_1","volume-title":"Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. Cryptology ePrint Archive, Report 2021\/730. https:\/\/ia.cr\/2021\/730.","author":"Weng Chenkai","year":"2021","unstructured":"Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang. 2021. Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. Cryptology ePrint Archive, Report 2021\/730. https:\/\/ia.cr\/2021\/730."},{"key":"e_1_3_2_2_47_1","volume-title":"DIZK: A Distributed Zero Knowledge Proof System. In 27th USENIX Security Symposium, USENIX Security 2018","author":"Wu Howard","year":"2018","unstructured":"Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. DIZK: A Distributed Zero Knowledge Proof System. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018. USENIX Association, 675--692."},{"key":"e_1_3_2_2_48_1","volume-title":"Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology (CRYPTO).","author":"Xie Tiacheng","year":"2019","unstructured":"Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. 2019. Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology (CRYPTO)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Kang Yang Pratik Sarkar Chenkai Weng and Xiao Wang. 2021. QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. Cryptology ePrint Archive Report 2021\/076. https:\/\/eprint.iacr.org\/2021\/076.","DOI":"10.1145\/3460120.3484556"},{"key":"e_1_3_2_2_50_1","volume-title":"Zero Knowledge Proofs for Decision Tree Predictions and Accuracy. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Zhang Jiaheng","year":"2020","unstructured":"Jiaheng Zhang, Zhiyong Fang, Yupeng Zhang, and Dawn Song. 2020. Zero Knowledge Proofs for Decision Tree Predictions and Accuracy. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9--13, 2020. ACM, 2039--2053."},{"key":"e_1_3_2_2_51_1","unstructured":"Jiaheng Zhang Weijie Wang Yinuo Zhang and Yupeng Zhang. 2020. Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time. Cryptology ePrint Archive Report 2020\/1247. https:\/\/eprint.iacr.org\/2020\/1247."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00052"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"e_1_3_2_2_54_1","unstructured":"Yupeng Zhang Daniel Genkin Jonathan Katz Dimitrios Papadopoulos and Charalampos Papamanthou. 2017. A Zero-Knowledge Version of vSQL. Cryptology ePrint."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00013"},{"key":"e_1_3_2_2_56_1","unstructured":"Lingchen Zhao Qian Wang Cong Wang Qi Li Chao Shen Xiaodong Lin Shengshan Hu and Minxin Du. 2019. VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. arXiv:1909.06961 [cs.CR]"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09519-5_73"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485379","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:40Z","timestamp":1763498980000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":57,"alternative-id":["10.1145\/3460120.3485379","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485379","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}