{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:39Z","timestamp":1750309179013,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700763","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"252-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["zkStream: a Framework for Trustworthy Stream Processing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9951-1043","authenticated-orcid":false,"given":"Janwillem","family":"Swalens","sequence":"first","affiliation":[{"name":"Nokia Bell Labs, Antwerp, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-5803","authenticated-orcid":false,"given":"Lode","family":"Hoste","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Antwerp, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3352-6968","authenticated-orcid":false,"given":"Emad Heydari","family":"Beni","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Antwerp, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8743-3612","authenticated-orcid":false,"given":"Lieven","family":"Trappeniers","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Antwerp, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"unstructured":"2019. CVE-2019-11157: Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and\/or information disclosure via local access. https:\/\/cve.mitre.org\/cgibin\/cvename.cgi?name=CVE-2019-11157","key":"e_1_3_2_1_1_1"},{"unstructured":"0xPARC contributors. 2023. ZK Bug Tracker. https:\/\/github.com\/0xPARC\/zk-bug-tracker\/tree\/6955d22","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.13052\/jcsm2245-1439.414"},{"unstructured":"arnaucube. 2023. babyjubjub_rs. https:\/\/github.com\/arnaucube\/babyjubjubrs\/commit\/cd36d496e579dc0ff34f0d2c25cc8f013bf50efe","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/COMST.2017.2720195"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/SP.2015.24"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/MS.2021.3086718"},{"unstructured":"Eli Ben-Sasson Iddo Bentov Yinon Horesh and Michael Riabzev. 2018. Scalable transparent and post-quantum secure computational integrity. Cryptology ePrint Archive Paper 2018\/046. https:\/\/eprint.iacr.org\/2018\/046","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2090236.2090263"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-030-03329-3_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/3-540-45682-1_30"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2517349.2522733"},{"unstructured":"British Gas. 2023. Demand flexibility scheme saves 451MWh of electricity. https:\/\/www.britishgas.co.uk\/the-source\/making-a-difference\/peaksave-demand-flexibility-scheme.html","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1007\/3-540-44503-X_20"},{"key":"e_1_3_2_1_15_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Burkhalter Lukas","year":"2020","unstructured":"Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, and Sylvia Ratnasamy. 2020. TimeCrypt: Encrypted data stream processing at scale with cryptographic access control. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 835--850."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/COMST.2019.2953364"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3319535.3339820"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/3319535.3339820"},{"key":"e_1_3_2_1_19_1","volume-title":"Apache Flink: Stream and Batch Processing in a Single Engine. The Bulletin of the Technical Committee on Data Engineering 38, 4","author":"Carbone Paris","year":"2015","unstructured":"Paris Carbone, Asterios Katsifodimos, Stephan Ewen, Volker Markl, Seif Haridi, and Kostas Tzoumas. 2015. Apache Flink: Stream and Batch Processing in a Single Engine. The Bulletin of the Technical Committee on Data Engineering 38, 4 (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/s12394-010-0046-y"},{"key":"e_1_3_2_1_21_1","volume-title":"SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. In 2020 IEEE Symposium on Security and Privacy (SP). 1416--1432","author":"Cerdeira David","year":"2020","unstructured":"David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. 2020. SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems. In 2020 IEEE Symposium on Security and Privacy (SP). 1416--1432."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3627703.3650088"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/SP.2015.23"},{"unstructured":"Trisha Datta Binyi Chen and Dan Boneh. 2024. VerITAS: Verifying Image Transformations at Scale. Cryptology ePrint Archive Paper 2024\/1066. https:\/\/eprint.iacr.org\/2024\/1066","key":"e_1_3_2_1_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.14722\/ndss.2024.24815"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/3548606.3560630"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"e_1_3_2_1_29_1","volume-title":"Cox","author":"Gilbert Peter","year":"2011","unstructured":"Peter Gilbert, Jaeyeon Jung, Kyungmin Lee, Henry Qin, Daniel Sharkey, Anmol Sheth, and Landon P. Cox. 2011. YouProve: authenticity and fidelity in mobile sensing (SenSys '11). Association for Computing Machinery, 176--189."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/22145.22178"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium","volume":"2021","author":"Grassi Lorenzo","year":"2021","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.. In USENIX Security Symposium, Vol. 2021."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_33_1","volume-title":"Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. In Advances in Cryptology - CRYPTO","author":"Groth Jens","year":"2017","unstructured":"Jens Groth and Mary Maller. 2017. Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. In Advances in Cryptology - CRYPTO 2017, Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing, 581--612."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2611286.2611332"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/3093742.3093927"},{"unstructured":"Karthik Inbasekar Yuval Shekel and Michael Asa. 2024. ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware. Cryptology ePrint Archive Paper 2024\/973. https:\/\/eprint.iacr.org\/2024\/973","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/ACCESS.2019.2946884"},{"key":"e_1_3_2_1_38_1","volume-title":"Bert Lagaisse, and Wouter Joosen.","author":"Jannes Kristof","year":"2023","unstructured":"Kristof Jannes, Emad Heydari Beni, Bert Lagaisse, and Wouter Joosen. 2023. BeauForT: Robust Byzantine Fault Tolerance for Client-centric Mobile Web Applications. IEEE Transactions on Parallel and Distributed Systems (2023)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/2611286.2611333"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/3620666.3651364"},{"unstructured":"Daniel Kang Tatsunori Hashimoto Ion Stoica and Yi Sun. 2022. ZK-IMG: Attested Images via Zero-Knowledge Proofs to Fight Disinformation. arXiv:2211.04775 [cs.CR] https:\/\/arxiv.org\/abs\/2211.04775","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","volume-title":"Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. In Advances in Cryptology - CRYPTO","author":"Kothapalli Abhiram","year":"2022","unstructured":"Abhiram Kothapalli, Srinath Setty, and Ioanna Tzialla. 2022. Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. In Advances in Cryptology - CRYPTO 2022, Yevgeniy Dodis and Thomas Shrimpton (Eds.). Springer Nature Switzerland, 359--388."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1007\/978-3-662-49384-7_16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1109\/COMST.2019.2899354"},{"key":"e_1_3_2_1_45_1","volume-title":"Households in Great Britain to be paid to use less electricity: how does it work? The Guardian","author":"Lawson Alex","year":"2023","unstructured":"Alex Lawson. 2023. Households in Great Britain to be paid to use less electricity: how does it work? The Guardian (2023). https:\/\/www.theguardian.com\/money\/2023\/jan\/23\/households-great-britain-paid-use-less-electricity-cut-bills-national-grid"},{"key":"e_1_3_2_1_46_1","volume-title":"SGX-PySpark: Secure Distributed Data Analytics. In The World Wide Web Conference (WWW '19)","author":"Quoc Do Le","year":"2019","unstructured":"Do Le Quoc, Franz Gregor, Jatinder Singh, and Christof Fetzer. 2019. SGX-PySpark: Secure Distributed Data Analytics. In The World Wide Web Conference (WWW '19). Association for Computing Machinery, 3564--3563."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1109\/TDSC.2021.3105111"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1109\/MIC.2017.3481351"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1145\/2307636.2307670"},{"unstructured":"Junrui Liu Ian Kretz Hanzhi Liu Bryan Tan Jonathan Wang Yi Sun Luke Pearson Anders Miltner I\u015f\u0131l Dillig and Yu Feng. 2023. Certifying Zero-Knowledge Circuits with Refinement Types. Cryptology ePrint Archive Paper 2023\/547. https:\/\/eprint.iacr.org\/2023\/547","key":"e_1_3_2_1_50_1"},{"key":"e_1_3_2_1_51_1","volume-title":"Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs. Cryptology ePrint Archive, Paper 2023\/1271. https:\/\/eprint.iacr.org\/2023\/1271","author":"Liu Tianyi","year":"2023","unstructured":"Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, and Yupeng Zhang. 2023. Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs. Cryptology ePrint Archive, Paper 2023\/1271. https:\/\/eprint.iacr.org\/2023\/1271"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3575693.3575711"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/2611286.2611329"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1145\/2611286.2611328"},{"unstructured":"James Manyika Michael Chui Peter Bisson Jonathan Woetzel Richard Dobbs Jacques Bughin and Dan Aharon. 2015. The Internet of Things: Mapping the value beyond the hype. (2015).","key":"e_1_3_2_1_55_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1016\/j.enpol.2011.11.049"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1109\/JIOT.2019.2935189"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1145\/2578855.2535851"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1109\/SP.2016.23"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1109\/COMST.2019.2910750"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1007\/978-3-642-38348-9_22"},{"key":"e_1_3_2_1_62_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Park Heejin","year":"2019","unstructured":"Heejin Park, Shuang Zhai, Long Lu, and Felix Xiaozhu Lin. 2019. StreamBox-TZ: Secure stream analytics at the edge with TrustZone. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 537--554."},{"key":"e_1_3_2_1_63_1","first-page":"2","article-title":"Pinocchio","volume":"59","author":"Parno Bryan","year":"2016","unstructured":"Bryan Parno, Jon Howell, Craig Gentry, and Mariana Raykova. 2016. Pinocchio: Nearly Practical Verifiable Computation. Commun. ACM 59, 2 (jan 2016), 103--112.","journal-title":"Nearly Practical Verifiable Computation. Commun. ACM"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1145\/3664295"},{"unstructured":"Alex Pruden. 2022. Announcing the Inaugural ZPrize Competition Results. https:\/\/www.zprize.io\/blog\/announcing-zprize-results","key":"e_1_3_2_1_65_1"},{"doi-asserted-by":"crossref","unstructured":"Gholamreza Ramezan and Ehsan Meamari. 2024. zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms. arXiv:2402.08322 [cs.CR]","key":"e_1_3_2_1_66_1","DOI":"10.1109\/ICBC59979.2024.10634342"},{"unstructured":"Karen Rose Scott Eldridge and Lyman Chapin. 2015. The Internet of Things (IoT): An Overview. (2015). https:\/\/www.internetsociety.org\/resources\/doc\/2015\/iotoverview\/","key":"e_1_3_2_1_67_1"},{"key":"e_1_3_2_1_68_1","volume-title":"Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation. Cryptology ePrint Archive, Paper 2024\/1208. https:\/\/eprint.iacr.org\/2024\/1208","author":"Rosenberg Michael","year":"2024","unstructured":"Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, and Pratyush Mishra. 2024. Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation. Cryptology ePrint Archive, Paper 2024\/1208. https:\/\/eprint.iacr.org\/2024\/1208"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_69_1","DOI":"10.1145\/3689949"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_70_1","DOI":"10.1007\/s41060-016-0027-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/1734583.1734593"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_72_1","DOI":"10.1007\/978-3-662-47854-7_34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_73_1","DOI":"10.1145\/2382196.2382297"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1109\/SP.2015.10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_75_1","DOI":"10.1145\/2987550.2987574"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_76_1","DOI":"10.1145\/2611286.2611327"},{"unstructured":"Supranational. 2023. blst. https:\/\/github.com\/supranational\/blst\/tree\/3b28d0f","key":"e_1_3_2_1_77_1"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings 11","author":"Tamassia Roberto","year":"2003","unstructured":"Roberto Tamassia. 2003. Authenticated data structures. In Algorithms-ESA 2003: 11th Annual European Symposium, Budapest, Hungary, September 16--19, 2003. Proceedings 11. Springer, 2--5."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_79_1","DOI":"10.1145\/2509136.2509554"},{"key":"e_1_3_2_1_81_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium. USENIX Association."},{"unstructured":"Stephan Van Schaik Andrew Kwong Daniel Genkin and Yuval Yarom. 2020. SGAxe: How SGX fails in practice. (2020). https:\/\/sgaxe.com\/files\/SGAxe.pdf","key":"e_1_3_2_1_82_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_83_1","DOI":"10.1145\/2641562"},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings, Part II 26","author":"Wei Jianghong","year":"2021","unstructured":"Jianghong Wei, Guohua Tian, Jun Shen, Xiaofeng Chen, and Willy Susilo. 2021. Optimal verifiable data streaming protocol with data auditing. In Computer Security-ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4--8, 2021, Proceedings, Part II 26. Springer, 296--312."},{"key":"e_1_3_2_1_85_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wu Howard","year":"2018","unstructured":"Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. {DIZK}: A distributed zero knowledge proof system. In 27th USENIX Security Symposium (USENIX Security 18). 675--692."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_86_1","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_87_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, 283--298."},{"unstructured":"ZoKrates contributors. 2023. ZoKrates. https:\/\/github.com\/Zokrates\/ZoKrates\/tree\/c537a80","key":"e_1_3_2_1_88_1"}],"event":{"sponsor":["IFIP","Usenix"],"acronym":"Middleware '24","name":"Middleware '24: 25th International Middleware Conference","location":"Hong Kong Hong Kong"},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":87,"alternative-id":["10.1145\/3652892.3700763","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700763","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}