{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:17:21Z","timestamp":1775067441604,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Quan Cheng Laboratory","award":["No. QCLZD202302"],"award-info":[{"award-number":["No. QCLZD202302"]}]},{"name":"Shandong Provincial Natural Science Foundation","award":["No. ZR2024QF237 and No. ZR2024MF099"],"award-info":[{"award-number":["No. ZR2024QF237 and No. ZR2024MF099"]}]},{"name":"Natural Science Foundation of China","award":["No. 62432005, No. 62402282, and No. 62372272"],"award-info":[{"award-number":["No. 62432005, No. 62402282, and No. 62372272"]}]},{"name":"Department of Science & Technology of Shandong Province","award":["No. SYS202201"],"award-info":[{"award-number":["No. SYS202201"]}]},{"name":"Taishan Scholars Program","award":["No. tsqn202211281"],"award-info":[{"award-number":["No. tsqn202211281"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707241","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Accelerating Number Theoretic Transform with Multi-GPU Systems for Efficient Zero Knowledge Proof"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9767-2767","authenticated-orcid":false,"given":"Zhuoran","family":"Ji","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4175-760X","authenticated-orcid":false,"given":"Jianyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5579-7912","authenticated-orcid":false,"given":"Peimin","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8974-4001","authenticated-orcid":false,"given":"Xiangkai","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6186-5399","authenticated-orcid":false,"given":"Lei","family":"Ju","sequence":"additional","affiliation":[{"name":"Quan Cheng Laboratory, Jinan, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9791"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Cryptography and Information Security in the Balkans. Springer, 155--168","author":"Akleylek Sedat","year":"2015","unstructured":"Sedat Akleylek, \u00d6zgur Da\u011fdelen, and Zaliha Y\u00fcce Tok. 2015. On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA. In International Conference on Cryptography and Information Security in the Balkans. Springer, 155--168."},{"key":"e_1_3_2_1_3_1","volume-title":"Efficient Representation of Numerical Optimization Problems for SNARKs. In 31st USENIX Security Symposium.","author":"Angel Sebastian","year":"2022","unstructured":"Sebastian Angel, Andrew J Blumberg, Eleftherios Ioannidis, and Jess Woods. 2022. Efficient Representation of Numerical Optimization Problems for SNARKs. In 31st USENIX Security Symposium."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINS50155.2020.9315064"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405506"},{"key":"e_1_3_2_1_6_1","volume-title":"An algorithm for the machine calculation of complex Fourier series. Mathematics of computation","author":"Cooley James W","year":"1965","unstructured":"James W Cooley and John W Tukey. 1965. An algorithm for the machine calculation of complex Fourier series. Mathematics of computation, Vol. 19, 90 (1965), 297--301."},{"key":"e_1_3_2_1_7_1","unstructured":"ZCash Crop. 2024. Zcash is cash for the new age. https:\/\/z.cash."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT52795.2021.00032"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_11_1","volume-title":"Zen: An optimizing compiler for verifiable, zero-knowledge neural network inferences. Cryptology ePrint Archive","author":"Feng Boyuan","year":"2021","unstructured":"Boyuan Feng, Lianke Qin, Zhenfei Zhang, Yufei Ding, and Shumo Chu. 2021. Zen: An optimizing compiler for verifiable, zero-knowledge neural network inferences. Cryptology ePrint Archive (2021)."},{"key":"e_1_3_2_1_12_1","unstructured":"Filecoin. 2024. bellperson: Gpu parallel acceleration for zk-snark. https:\/\/github.com\/filecoin-project\/bellperson."},{"key":"e_1_3_2_1_13_1","unstructured":"Mina Foundation. 2024. GPU Groth16 prover (3x faster than CPU). https:\/\/github.com\/MinaProtocol\/gpu-groth16-prover-3x."},{"key":"e_1_3_2_1_14_1","volume-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon, Zachary J Williamson, and Oana Ciobotaru. 2019. Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive (2019)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3097277"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"e_1_3_2_1_17_1","volume-title":"43th annual ACM symposium on Theory of computing. 99--108.","author":"Gentry Craig","unstructured":"Craig Gentry and Daniel Wichs. 2011. Separating succinct non-interactive arguments from all falsifiable assumptions. In 43th annual ACM symposium on Theory of computing. 99--108."},{"key":"e_1_3_2_1_18_1","series-title":"SIAM J. COMPUT","volume-title":"On the composition of zero-knowledge proof systems","author":"Goldreich Oded","year":"1996","unstructured":"Oded Goldreich and Hugo Krawczyk. 1996. On the composition of zero-knowledge proof systems. SIAM J. COMPUT, Vol. 25 (1996)."},{"key":"e_1_3_2_1_19_1","series-title":"SIAM J. COMPUT","volume-title":"The Knowledge Complexity of Interactive Proof Systems","author":"Goldwasser Shafi","year":"1989","unstructured":"Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The Knowledge Complexity of Interactive Proof Systems. SIAM J. COMPUT, Vol. 18 (1989)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/BDICN55575.2022.00074"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_32"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_23_1","volume-title":"Ahmet Can Mert, and Sujoy Sinha Roy","author":"Hirner Florian","year":"2023","unstructured":"Florian Hirner, Ahmet Can Mert, and Sujoy Sinha Roy. 2023. PROTEUS: A Tool to generate pipelined Number Theoretic Transform Architectures for FHE and ZKP applications. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_24_1","unstructured":"Icicle. 2024. a GPU Library for Zero-Knowledge Acceleration. https:\/\/github.com\/ingonyama-zk\/icicle."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620666.3651364"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00033"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572409"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03392-x"},{"key":"e_1_3_2_1_29_1","unstructured":"Supranational LLC. 2024. Zero-knowledge template library. https:\/\/github.com\/supranational\/sppark."},{"key":"e_1_3_2_1_30_1","volume-title":"Cuzk: Accelerating zero-knowledge proof with a faster parallel multi-scalar multiplication algorithm on gpus. Cryptology ePrint Archive","author":"Lu Tao","year":"2022","unstructured":"Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, and Wenzhi Chen. 2022. Cuzk: Accelerating zero-knowledge proof with a faster parallel multi-scalar multiplication algorithm on gpus. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_31_1","volume-title":"GZKP: A GPU Accelerated Zero-Knowledge Proof System. In 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","volume":"2","author":"Ma Weiliang","year":"2023","unstructured":"Weiliang Ma, Qian Xiong, Xuanhua Shi, Xiaosong Ma, Hai Jin, Haozhao Kuang, Mingyu Gao, Ye Zhang, Haichen Shen, and Weifang Hu. 2023. GZKP: A GPU Accelerated Zero-Knowledge Proof System. In 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.10.009"},{"key":"e_1_3_2_1_33_1","volume-title":"CGBN: CUDA Accelerated Multiple Precision Arithmetic using Cooperative Groups. https:\/\/github.com\/NVlabs\/CGBN.","author":"NVIDIA.","year":"2021","unstructured":"NVIDIA. 2021. CGBN: CUDA Accelerated Multiple Precision Arithmetic using Cooperative Groups. https:\/\/github.com\/NVlabs\/CGBN."},{"key":"e_1_3_2_1_34_1","unstructured":"Nvidia. 2024. Device Memory L2 Access Management. https:\/\/docs.nvidia.com\/cuda\/cuda-c-programming-guide\/index.html#device-memory-l2-access-management."},{"key":"e_1_3_2_1_35_1","volume-title":"Two Algorithms for Fast GPU Implementation of NTT. Cryptology ePrint Archive","author":"\u00d6zcan Ali \u015eah","year":"2023","unstructured":"Ali \u015eah \u00d6zcan and Erkay Sava\u015f. 2023. Two Algorithms for Fast GPU Implementation of NTT. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03980-5"},{"key":"e_1_3_2_1_37_1","volume-title":"Fu Yong Quah, and Rahul Yesantharao","author":"Ray Andy","year":"2024","unstructured":"Andy Ray, Ben Devlin, Fu Yong Quah, and Rahul Yesantharao. 2024. High performance, open source cryptographic solutions for large scale number theoretic transforms and multi-scalar multiplications in Hardcaml. https:\/\/github.com\/fyquah\/hardcaml_zprize."},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference for Information Technology and Communications. Springer.","author":"Ro\u015fia Nicolae","year":"2015","unstructured":"Nicolae Ro\u015fia, Virgil Cervicescu, and Mihai Togan. 2015. Efficient montgomery multiplication on GPUs. In International Conference for Information Technology and Communications. Springer."},{"key":"e_1_3_2_1_39_1","unstructured":"ZK-Garage Team. 2024. A pure Rust PLONK implementation using arkworks as a backend. https:\/\/github.com\/ZK-Garage\/plonk."},{"key":"e_1_3_2_1_40_1","volume-title":"27th USENIX Security Symposium. 675--692","author":"Wu Howard","year":"2018","unstructured":"Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. 2018. {DIZK}: A distributed zero knowledge proof system. In 27th USENIX Security Symposium. 675--692."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00040"},{"key":"e_1_3_2_1_42_1","volume-title":"Hardware acceleration of number theoretic transform for zk-SNARK. Engineering Reports","author":"Zhao Haixu","year":"2022","unstructured":"Haixu Zhao, Dong Ding, Feng Wang, Pengcheng Hua, Ning Wang, Qin Wu, and Zhilei Chai. 2022. Hardware acceleration of number theoretic transform for zk-SNARK. Engineering Reports (2022), e12639."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.211"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:50:11Z","timestamp":1755787811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":43,"alternative-id":["10.1145\/3669940.3707241","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707241","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}