{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:42:56Z","timestamp":1774456976213,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["TWC-1518899,2144625"],"award-info":[{"award-number":["TWC-1518899,2144625"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014236","name":"Center for Long-Term Cybersecurity, University of California Berkeley","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014236","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA","award":["N66001-15-C-4066"],"award-info":[{"award-number":["N66001-15-C-4066"]}]},{"name":"the Center for Responsible, Decentralized Intelligence at Berkeley"},{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560652","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3003-3017","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":130,"title":["zkBridge"],"prefix":"10.1145","author":[{"given":"Tiancheng","family":"Xie","sequence":"first","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Jiaheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Zerui","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"Yupeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Yongzheng","family":"Jia","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Filecoin: A Decentralized Storage Network. (2014). https: \/\/filecoin.io\/filecoin.pdf  2014. Filecoin: A Decentralized Storage Network. (2014). https: \/\/filecoin.io\/filecoin.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/sawtooth.hyperledger.org\/","author":"Sawtooth Hyperledger","year":"2017","unstructured":"2017. Hyperledger Sawtooth . ( 2017 ). https:\/\/sawtooth.hyperledger.org\/ 2017. Hyperledger Sawtooth. (2017). https:\/\/sawtooth.hyperledger.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Poly Network. https:\/\/poly.network\/. (2020).  2020. Poly Network. https:\/\/poly.network\/. (2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Rainbow Bridge. https:\/\/near.org\/bridge\/. (2020).  2020. Rainbow Bridge. https:\/\/near.org\/bridge\/. (2020)."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Wormhole Solana. https:\/\/solana.com\/wormhole. (2020).  2020. Wormhole Solana. https:\/\/solana.com\/wormhole. (2020)."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. At least $611 million stolen in massive cross-chain hack. (2021).  2021. At least $611 million stolen in massive cross-chain hack. (2021)."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Nomad Protocol. https:\/\/docs.nomad.xyz\/the-nomad-protocol\/overview. (2021).  2021. Nomad Protocol. https:\/\/docs.nomad.xyz\/the-nomad-protocol\/overview. (2021)."},{"key":"e_1_3_2_1_8_1","unstructured":"2022. Average Price of Electricity. https:\/\/www.eia.gov\/electricity\/monthly\/ epm_table_grapher.php?t=epmt_5_6_a. (2022).  2022. Average Price of Electricity. https:\/\/www.eia.gov\/electricity\/monthly\/ epm_table_grapher.php?t=epmt_5_6_a. (2022)."},{"key":"e_1_3_2_1_9_1","unstructured":"2022. Axelar. https:\/\/axelar.network\/. (2022).  2022. Axelar. https:\/\/axelar.network\/. (2022)."},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Blockchain Bridge Wormhole Suffers Possible Exploit Worth Over $326M. (2022). https:\/\/www.coindesk.com\/tech\/2022\/02\/02\/blockchain-bridgewormhole-suffers-possible-exploit-worth-over-250m\/  2022. Blockchain Bridge Wormhole Suffers Possible Exploit Worth Over $326M. (2022). https:\/\/www.coindesk.com\/tech\/2022\/02\/02\/blockchain-bridgewormhole-suffers-possible-exploit-worth-over-250m\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Cosmos. https:\/\/cosmos.network\/. (2022).  2022. Cosmos. https:\/\/cosmos.network\/. (2022)."},{"key":"e_1_3_2_1_12_1","unstructured":"2022. Cryptocurrency prices charts and market capitalizations. (2022). https:\/\/coinmarketcap.com\/  2022. Cryptocurrency prices charts and market capitalizations. (2022). https:\/\/coinmarketcap.com\/"},{"key":"e_1_3_2_1_13_1","unstructured":"2022. ed25519-circom. https:\/\/github.com\/Electron-Labs\/ed25519-circom. (2022).  2022. ed25519-circom. https:\/\/github.com\/Electron-Labs\/ed25519-circom. (2022)."},{"key":"e_1_3_2_1_14_1","unstructured":"2022. ed25519-circom. https:\/\/github.com\/Electron-Labs\/ed25519-circom. (2022).  2022. ed25519-circom. https:\/\/github.com\/Electron-Labs\/ed25519-circom. (2022)."},{"key":"e_1_3_2_1_15_1","unstructured":"2022. ETH-NEAR Rainbow Bridge -- NEAR Protocol. (2022). https:\/\/near.org\/blog\/eth-near-rainbow-bridge\/  2022. ETH-NEAR Rainbow Bridge -- NEAR Protocol. (2022). https:\/\/near.org\/blog\/eth-near-rainbow-bridge\/"},{"key":"e_1_3_2_1_16_1","unstructured":"2022. gnark. https:\/\/docs.gnark.consensys.net\/en\/latest\/. (2022).  2022. gnark. https:\/\/docs.gnark.consensys.net\/en\/latest\/. (2022)."},{"key":"e_1_3_2_1_17_1","unstructured":"2022. Hetzner. https:\/\/www.hetzner.com\/. (2022).  2022. Hetzner. https:\/\/www.hetzner.com\/. (2022)."},{"key":"e_1_3_2_1_18_1","unstructured":"2022. LayerZero. https:\/\/layerzero.network\/. (2022).  2022. LayerZero. https:\/\/layerzero.network\/. (2022)."},{"key":"e_1_3_2_1_19_1","unstructured":"2022. libSNARK. https:\/\/github.com\/scipr-lab\/libsnark. (2022).  2022. libSNARK. https:\/\/github.com\/scipr-lab\/libsnark. (2022)."},{"key":"e_1_3_2_1_20_1","unstructured":"2022. Multi-chain future likely as Ethereum's DeFi dominance declines | Bloomberg Professional Services. (2022). https:\/\/www.bloomberg.com\/ professional\/blog\/multi-chain-future-likely-as-ethereums-defi-dominancedeclines\/  2022. Multi-chain future likely as Ethereum's DeFi dominance declines | Bloomberg Professional Services. (2022). https:\/\/www.bloomberg.com\/ professional\/blog\/multi-chain-future-likely-as-ethereums-defi-dominancedeclines\/"},{"key":"e_1_3_2_1_21_1","unstructured":"2022. A multichain approach is the future of the blockchain industry. (2022). https:\/\/cointelegraph.com\/news\/a-multichain-approach-is-the-future-of-theblockchain-industry  2022. A multichain approach is the future of the blockchain industry. (2022). https:\/\/cointelegraph.com\/news\/a-multichain-approach-is-the-future-of-theblockchain-industry"},{"key":"e_1_3_2_1_22_1","unstructured":"2022. Nomad crypto bridge loses $200 million in ?chaotic\" hack. https:\/\/www.theverge.com\/2022\/8\/2\/23288785\/nomad-bridge-200-millionchaotic-hack-smart-contract-cryptocurrency. (2022).  2022. Nomad crypto bridge loses $200 million in ?chaotic\" hack. https:\/\/www.theverge.com\/2022\/8\/2\/23288785\/nomad-bridge-200-millionchaotic-hack-smart-contract-cryptocurrency. (2022)."},{"key":"e_1_3_2_1_23_1","unstructured":"2022. Polygon Hermez. https:\/\/polygon.technology\/solutions\/polygon-hermez\/. (2022).  2022. Polygon Hermez. https:\/\/polygon.technology\/solutions\/polygon-hermez\/. (2022)."},{"key":"e_1_3_2_1_24_1","unstructured":"2022. Polygon Miden. https:\/\/polygon.technology\/solutions\/polygon-miden\/. (2022).  2022. Polygon Miden. https:\/\/polygon.technology\/solutions\/polygon-miden\/. (2022)."},{"key":"e_1_3_2_1_25_1","unstructured":"2022. Polygon Zero. https:\/\/polygon.technology\/solutions\/polygon-zero\/. (2022).  2022. Polygon Zero. https:\/\/polygon.technology\/solutions\/polygon-zero\/. (2022)."},{"key":"e_1_3_2_1_26_1","unstructured":"2022. Risc Zero. https:\/\/www.risczero.com\/. (2022).  2022. Risc Zero. https:\/\/www.risczero.com\/. (2022)."},{"key":"e_1_3_2_1_27_1","unstructured":"2022. Ronin Attack Shows Cross-Chain Crypto Is a ?Bridge' Too Far. (2022). https:\/\/www.coindesk.com\/layer2\/2022\/04\/05\/ronin-attack-shows-crosschain-crypto-is-a-bridge-too-far\/  2022. Ronin Attack Shows Cross-Chain Crypto Is a ?Bridge' Too Far. (2022). https:\/\/www.coindesk.com\/layer2\/2022\/04\/05\/ronin-attack-shows-crosschain-crypto-is-a-bridge-too-far\/"},{"key":"e_1_3_2_1_28_1","unstructured":"2022. Starkware. https:\/\/starkware.co\/. (2022).  2022. Starkware. https:\/\/starkware.co\/. (2022)."},{"key":"e_1_3_2_1_29_1","volume-title":"Vbuterin comments on [AMA] We are the EF's Research Team (Pt. 7","year":"2022","unstructured":"2022. Vbuterin comments on [AMA] We are the EF's Research Team (Pt. 7 : 07 January , 2022 ). (2022). https:\/\/old.reddit.com\/r\/ethereum\/comments\/rwojtk\/ ama_we_are_the_efs_research_team_pt_7_07_january\/hrngyk8\/ 2022. Vbuterin comments on [AMA] We are the EF's Research Team (Pt. 7: 07 January, 2022). (2022). https:\/\/old.reddit.com\/r\/ethereum\/comments\/rwojtk\/ ama_we_are_the_efs_research_team_pt_7_07_january\/hrngyk8\/"},{"key":"e_1_3_2_1_30_1","unstructured":"2022. YouTube includes NFTs in new creator tools. (2022). https:\/\/www.nbcnews. com\/pop-culture\/viral\/youtube-includes-nfts-new-creator-tools-rcna15813  2022. YouTube includes NFTs in new creator tools. (2022). https:\/\/www.nbcnews. com\/pop-culture\/viral\/youtube-includes-nfts-new-creator-tools-rcna15813"},{"key":"e_1_3_2_1_31_1","unstructured":"2022. ZkSync. https:\/\/zksync.io\/. (2022).  2022. ZkSync. https:\/\/zksync.io\/. (2022)."},{"key":"e_1_3_2_1_32_1","unstructured":"2022-04--24. Beeple sold an NFT for $69 million - The Verge. (2022-04--24). https:\/\/www.theverge.com\/2021\/3\/11\/22325054\/beeple-christies-nft-sale-costeverydays-69-million  2022-04--24. Beeple sold an NFT for $69 million - The Verge. (2022-04--24). https:\/\/www.theverge.com\/2021\/3\/11\/22325054\/beeple-christies-nft-sale-costeverydays-69-million"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10879-7_31"},{"key":"e_1_3_2_1_36_1","volume-title":"transparent, and post-quantum secure computational integrity. Cryptology ePrint","author":"Ben-Sasson Eli","year":"2018","unstructured":"Eli Ben-Sasson , Iddo Bentov , Yinon Horesh , and Michael Riabzev . 2018. Scalable , transparent, and post-quantum secure computational integrity. Cryptology ePrint ( 2018 ). Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint (2018)."},{"key":"e_1_3_2_1_37_1","volume-title":"EUROCRYPT","author":"Ben-Sasson Eli","year":"2019","unstructured":"Eli Ben-Sasson , Alessandro Chiesa , Michael Riabzev , Nicholas Spooner , Madars Virza , and Nicholas P. Ward . 2019. Aurora: Transparent Succinct Arguments for R1CS . In EUROCRYPT 2019 . 103--128. Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward. 2019. Aurora: Transparent Succinct Arguments for R1CS. In EUROCRYPT 2019. 103--128."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"e_1_3_2_1_39_1","volume-title":"Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch.","author":"Bentov Iddo","year":"2016","unstructured":"Iddo Bentov , Rafael Pass , and Elaine Shi . 2016 . Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch. 2016, 919 (2016). Iddo Bentov, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch. 2016, 919 (2016)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_42_1","volume-title":"SoK: Blockchain Light Clients. Cryptology ePrint Archive","author":"Chatzigiannis Panagiotis","year":"2021","unstructured":"Panagiotis Chatzigiannis , Foteini Baldimtsi , and Konstantinos Chalkias . 2021. SoK: Blockchain Light Clients. Cryptology ePrint Archive ( 2021 ). Panagiotis Chatzigiannis, Foteini Baldimtsi, and Konstantinos Chalkias. 2021. SoK: Blockchain Light Clients. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_1_43_1","volume-title":"A Zero Knowledge Sumcheck and its Applications. CoRR abs\/1704.02086","author":"Chiesa Alessandro","year":"2017","unstructured":"Alessandro Chiesa , Michael A. Forbes , and Nicholas Spooner . 2017. A Zero Knowledge Sumcheck and its Applications. CoRR abs\/1704.02086 ( 2017 ). arXiv:1704.02086 http:\/\/arxiv.org\/abs\/1704.02086 Alessandro Chiesa, Michael A. Forbes, and Nicholas Spooner. 2017. A Zero Knowledge Sumcheck and its Applications. CoRR abs\/1704.02086 (2017). arXiv:1704.02086 http:\/\/arxiv.org\/abs\/1704.02086"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_27"},{"key":"e_1_3_2_1_46_1","volume-title":"Justin Thaler. Practical Verified Computation with Streaming Interactive Proofs. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12)","author":"Cormode Graham","unstructured":"Graham Cormode , Michael Mitzenmacher , and Justin Thaler. Practical Verified Computation with Streaming Interactive Proofs. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12) . Graham Cormode, Michael Mitzenmacher, and Justin Thaler. Practical Verified Computation with Streaming Interactive Proofs. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12)."},{"key":"e_1_3_2_1_47_1","volume-title":"Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. Cryptology ePrint Archive","author":"David Bernardo","year":"2017","unstructured":"Bernardo David , Peter Ga , Aggelos Kiayias , and Alexander Russell . 2017. Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. Cryptology ePrint Archive ( 2017 ). Bernardo David, Peter Ga, Aggelos Kiayias, and Alexander Russell. 2017. Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. Cryptology ePrint Archive (2017)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_29"},{"key":"e_1_3_2_1_49_1","volume-title":"Crypto","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir . How to Prove Yourself: Practical Solutions to Identification and Signature Problems . In Crypto 1986 . Amos Fiat and Adi Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In Crypto 1986."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_5"},{"key":"e_1_3_2_1_51_1","volume-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon , Zachary J Williamson , and Oana Ciobotaru . 2019 . Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive (2019). Ariel Gabizon, Zachary J Williamson, and Oana Ciobotaru. 2019. Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive (2019)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699436"},{"key":"e_1_3_2_1_54_1","volume-title":"On the Size of Pairing-Based Non-interactive Arguments. In EUROCRYPT","author":"Groth Jens","year":"2016","unstructured":"Jens Groth . 2016 . On the Size of Pairing-Based Non-interactive Arguments. In EUROCRYPT 2016. 305--326. Jens Groth. 2016. On the Size of Pairing-Based Non-interactive Arguments. In EUROCRYPT 2016. 305--326."},{"key":"e_1_3_2_1_55_1","volume-title":"Big investors are finally serious about crypto. but experienced talent is still scarce. (Mar","author":"Hamlin Jessica","year":"2022","unstructured":"Jessica Hamlin . 2022. Big investors are finally serious about crypto. but experienced talent is still scarce. (Mar 2022 ). https:\/\/www.institutionalinvestor.com\/ article\/b1x0gr2y3dzzp3\/Big-Investors-Are-Finally-Serious-About-Crypto-ButExperienced-Talent-Is-Still-Scarce Jessica Hamlin. 2022. Big investors are finally serious about crypto. but experienced talent is still scarce. (Mar 2022). https:\/\/www.institutionalinvestor.com\/ article\/b1x0gr2y3dzzp3\/Big-Investors-Are-Finally-Serious-About-Crypto-ButExperienced-Talent-Is-Still-Scarce"},{"key":"e_1_3_2_1_56_1","volume-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual international cryptology conference","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias , Alexander Russell , Bernardo David , and Roman Oliynykov . 2017 . Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual international cryptology conference . Springer , 357--388. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual international cryptology conference. Springer, 357--388."},{"key":"e_1_3_2_1_57_1","volume-title":"Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11","author":"Kwon Jae","year":"2014","unstructured":"Jae Kwon . 2014 . Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11 (2014). Jae Kwon. 2014. Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11 (2014)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/146585.146605"},{"key":"e_1_3_2_1_59_1","volume-title":"Conference on the theory and application of cryptographic techniques.","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the theory and application of cryptographic techniques. Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques."},{"key":"e_1_3_2_1_60_1","series-title":"SIAM J. Comput. (2000)","volume-title":"Computationally Sound Proofs","author":"Micali Silvio","unstructured":"Silvio Micali . 2000. Computationally Sound Proofs . SIAM J. Comput. (2000) . Silvio Micali. 2000. Computationally Sound Proofs. SIAM J. Comput. (2000)."},{"key":"e_1_3_2_1_61_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_11"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"e_1_3_2_1_65_1","volume-title":"Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. IACR Cryptol. ePrint Arch.","author":"Srinivasan Shravan","year":"2021","unstructured":"Shravan Srinivasan , Alexander Chepurnoy , Charalampos Papamanthou , Alin Tomescu , and Yupeng Zhang . 2021 . Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. IACR Cryptol. ePrint Arch. (2021), 599. Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, and Yupeng Zhang. 2021. Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. IACR Cryptol. ePrint Arch. (2021), 599."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_5"},{"key":"e_1_3_2_1_67_1","unstructured":"Justin Thaler. 2015. A Note on the GKR Protocol. (2015). Available at http:\/\/people.cs.georgetown.edu\/jthaler\/GKRNote.pdf.  Justin Thaler. 2015. A Note on the GKR Protocol. (2015). Available at http:\/\/people.cs.georgetown.edu\/jthaler\/GKRNote.pdf."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.51"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00060"},{"key":"e_1_3_2_1_70_1","volume-title":"Institutional money is pouring into the crypto market and its only going to grow. (Aug","author":"Wintermeyer Lawrence","year":"2021","unstructured":"Lawrence Wintermeyer . 2021. Institutional money is pouring into the crypto market and its only going to grow. (Aug 2021 ). https:\/\/www.forbes.com\/sites\/ lawrencewintermeyer\/2021\/08\/12\/institutional-money-is-pouring-into-thecrypto-market-and-its-only-going-to-grow\/'sh=2660a69d1459 Lawrence Wintermeyer. 2021. Institutional money is pouring into the crypto market and its only going to grow. (Aug 2021). https:\/\/www.forbes.com\/sites\/ lawrencewintermeyer\/2021\/08\/12\/institutional-money-is-pouring-into-thecrypto-market-and-its-only-going-to-grow\/'sh=2660a69d1459"},{"key":"e_1_3_2_1_71_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 (2014), 1--32. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_72_1","volume-title":"Raluca Ada Popa, and Ion Stoica","author":"Wu Howard","year":"2018","unstructured":"Howard Wu , Wenting Zheng , Alessandro Chiesa , Raluca Ada Popa, and Ion Stoica . 2018 . DIZK : A Distributed Zero-Knowledge Proof System . (2018). Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. DIZK: A Distributed Zero-Knowledge Proof System. (2018)."},{"key":"e_1_3_2_1_73_1","volume-title":"Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology (CRYPTO).","author":"Xie Tiacheng","year":"2019","unstructured":"Tiacheng Xie , Jiaheng Zhang , Yupeng Zhang , Charalampos Papamanthou , and Dawn Song . 2019 . Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology (CRYPTO). Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. 2019. Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation. In Advances in Cryptology (CRYPTO)."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484767"},{"key":"e_1_3_2_1_75_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zhang Jiaheng","year":"2022","unstructured":"Jiaheng Zhang , Tiancheng Xie , Thang Hoang , Elaine Shi , and Yupeng Zhang . 2022 . Polynomial Commitment with a {One-to-Many} Prover and Applications . In 31st USENIX Security Symposium (USENIX Security 22) . 2965--2982 Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, and Yupeng Zhang. 2022. Polynomial Commitment with a {One-to-Many} Prover and Applications. In 31st USENIX Security Symposium (USENIX Security 22). 2965--2982"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00052"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00013"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560652","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560652"}},"subtitle":["Trustless Cross-chain Bridges Made Practical"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":78,"alternative-id":["10.1145\/3548606.3560652","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560652","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}