{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T14:51:42Z","timestamp":1775919102671,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No. 2023YFB440440"],"award-info":[{"award-number":["No. 2023YFB440440"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Technologies R&D Program of Jiangsu","award":["BE2023005-2"],"award-info":[{"award-number":["BE2023005-2"]}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2373205 and 6237414"],"award-info":[{"award-number":["2373205 and 6237414"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707270","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"100-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4633-6058","authenticated-orcid":false,"given":"Tao","family":"Lu","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China, &amp; National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0566-0642","authenticated-orcid":false,"given":"Yuxun","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8212-4618","authenticated-orcid":false,"given":"Zonghui","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2263-5643","authenticated-orcid":false,"given":"Xiaohang","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1674-4701","authenticated-orcid":false,"given":"Wenzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7950-7845","authenticated-orcid":false,"given":"Jiaheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"arkworks. Linear-time sumcheck protocol for multilinear polynomials and related addends. https:\/\/github.com\/arkworks-rs\/sumcheck."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654078"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"e_1_3_2_1_4_1","first-page":"22","article-title":"Ethereum white paper","volume":"1","author":"Vitalik Buterin","year":"2013","unstructured":"Vitalik Buterin et al. Ethereum white paper. GitHub repository, 1:22--23, 2013.","journal-title":"GitHub repository"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3650088"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30617-4_17"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i2.522-544"},{"key":"e_1_3_2_1_8_1","volume-title":"Accessed","year":"2024","unstructured":"CIFAR-10. A collection of images that are commonly used to train machine learning and computer vision algorithms., 2024. Accessed: April 02, 2024."},{"key":"e_1_3_2_1_9_1","volume-title":"Introduction to algorithms","author":"Cormen Thomas H","year":"2022","unstructured":"Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, and Clifford Stein. Introduction to algorithms. MIT press, 2022."},{"key":"e_1_3_2_1_10_1","first-page":"6525","volume-title":"32nd USENIX Security Symposium (USENIX Security","author":"Cu\u00e9llar Santiago","year":"2023","unstructured":"Santiago Cu\u00e9llar, Bill Harris, James Parker, Stuart Pernsteiner, and Eran Tromer. Cheesecloth:{Zero-Knowledge} proofs of real world vulnerabilities. In 32nd USENIX Security Symposium (USENIX Security , pages 6525--6540, 2023."},{"key":"e_1_3_2_1_11_1","unstructured":"Cysic. Hardware accelerating zero-knowledge proofs. https:\/\/cysic.xyz."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484795"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617232.3624852"},{"key":"e_1_3_2_1_14_1","unstructured":"filecoin. bellperson is a crate for building zero-knowledge proofs with gpu acceleration. https:\/\/github.com\/filecoin-project\/bellperson."},{"key":"e_1_3_2_1_15_1","volume-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive","author":"Gabizon Ariel","year":"2019","unstructured":"Ariel Gabizon, Zachary J Williamson, and Oana Ciobotaru. Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge. Cryptology ePrint Archive, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1391469.1391473"},{"key":"e_1_3_2_1_17_1","unstructured":"Giza. Actionable ai for decentralized applications. build reliable scalable and easy to integrate ai solutions for web3. https:\/\/www.gizatech. xyz\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Yael Tauman Kalai, and Guy N Rothblum. Delegating computation: interactive proofs for muggles. Journal of the ACM (JACM), 62(4):1--64","author":"Goldwasser Shafi","year":"2015","unstructured":"Shafi Goldwasser, Yael Tauman Kalai, and Guy N Rothblum. Delegating computation: interactive proofs for muggles. Journal of the ACM (JACM), 62(4):1--64, 2015."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335750"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38545-2_7"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.68"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02404108"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780562"},{"key":"e_1_3_2_1_25_1","unstructured":"Meng Hao Hanxiao Chen Hongwei Li Chenkai Weng Yuan Zhang Haomiao Yang and Tianwei Zhang. Scalable zero-knowledge proofs for non-linear functions in machine learning."},{"key":"e_1_3_2_1_26_1","unstructured":"Mark Harris. Optimizing parallel reduction in cuda. https:\/\/developer.download.nvidia.com\/compute\/cuda\/1.1Beta\/x86_website\/projects\/reduction\/doc\/reduction.pdf."},{"key":"e_1_3_2_1_27_1","unstructured":"ingonyama. Hardware accelerators for zero knowledge cryptography. https:\/\/www.ingonyama.com\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Ingonyama. Icicle is a library for zk acceleration using cuda-enabled gpus. https:\/\/github.com\/ingonyama-zk\/icicle."},{"key":"e_1_3_2_1_29_1","first-page":"57","volume-title":"Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","volume":"3","author":"Ji Zhuoran","year":"2024","unstructured":"Zhuoran Ji, Zhiyuan Zhang, Jiming Xu, and Lei Ju. Accelerating multiscalar multiplication for efficient zero knowledge proofs with multigpu systems. In Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3, pages 57--70, 2024."},{"key":"e_1_3_2_1_30_1","volume-title":"Scaling up trustless dnn inference with zero-knowledge proofs. arXiv preprint arXiv:2210.08674","author":"Kang Daniel","year":"2022","unstructured":"Daniel Kang, Tatsunori Hashimoto, Ion Stoica, and Yi Sun. Scaling up trustless dnn inference with zero-knowledge proofs. arXiv preprint arXiv:2210.08674, 2022."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_32_1","volume-title":"Accessed","author":"Labs Protocol","year":"2024","unstructured":"Protocol Labs. The state of zero-knowledge proofs: From research to serious business., 2023. Accessed: April 19, 2024."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3348760"},{"key":"e_1_3_2_1_34_1","volume-title":"Pianist: Scalable zkrollups via fully distributed zero-knowledge proofs. Cryptology ePrint Archive","author":"Liu Tianyi","year":"2023","unstructured":"Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, and Yupeng Zhang. Pianist: Scalable zkrollups via fully distributed zero-knowledge proofs. Cryptology ePrint Archive, 2023."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"key":"e_1_3_2_1_36_1","volume-title":"Cuzk: Accelerating zeroknowledge proof with a faster parallel multi-scalar multiplication algorithm on gpus. Cryptology ePrint Archive","author":"Lu Tao","year":"2022","unstructured":"Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, and Wenzhi Chen. Cuzk: Accelerating zeroknowledge proof with a faster parallel multi-scalar multiplication algorithm on gpus. Cryptology ePrint Archive, 2022."},{"key":"e_1_3_2_1_37_1","volume-title":"Algebraic methods for interactive proof systems. Journal of the ACM (JACM), 39(4):859--868","author":"Lund Carsten","year":"1992","unstructured":"Carsten Lund, Lance Fortnow, Howard Karloff, and Noam Nisan. Algebraic methods for interactive proof systems. Journal of the ACM (JACM), 39(4):859--868, 1992."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575711"},{"key":"e_1_3_2_1_39_1","first-page":"369","volume-title":"Conference on the theory and application of cryptographic techniques","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle. Adigital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques, pages 369--378. Springer, 1987."},{"key":"e_1_3_2_1_40_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008."},{"key":"e_1_3_2_1_41_1","first-page":"1","volume-title":"On the secure hash algorithm family. Cryptography in context","author":"Penard Wouter","year":"2008","unstructured":"Wouter Penard and Tim vanWerkhoven. On the secure hash algorithm family. Cryptography in context, pages 1--18, 2008."},{"key":"e_1_3_2_1_42_1","unstructured":"Polyhedra. Empowering interoperability and computation via zk. bringing interoperability and scalability to web3 with cutting-edge zero-knowledge proof systems. https:\/\/www.polyhedra.network\/."},{"key":"e_1_3_2_1_43_1","volume-title":"A fast, flexible experimentation and efficient production through a user-friendly front-end, distributed training, and ecosystem of tools and libraries","year":"2024","unstructured":"Pytorch. A fast, flexible experimentation and efficient production through a user-friendly front-end, distributed training, and ecosystem of tools and libraries., 2024."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626202.3637577"},{"key":"e_1_3_2_1_45_1","volume-title":"Btrfs: The linux b-tree filesystem. ACM Transactions on Storage (TOS), 9(3):1--32","author":"Rodeh Ohad","year":"2013","unstructured":"Ohad Rodeh, Josef Bacik, and Chris Mason. Btrfs: The linux b-tree filesystem. ACM Transactions on Storage (TOS), 9(3):1--32, 2013."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_47_1","unstructured":"scipr lab. This library implements zksnark schemes which are a cryptographic method for proving\/verifying in zero knowledge the integrity of computations. https:\/\/github.com\/scipr-lab\/libsnark."},{"key":"e_1_3_2_1_48_1","unstructured":"Scroll. Scroll seamlessly extends ethereum's capabilities through zero knowledge tech and evm compatibility. the l2 network built by ethereum devs for ethereum devs. https:\/\/scroll.io\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"e_1_3_2_1_50_1","volume-title":"Unlocking the lookup singularity with lasso. Cryptology ePrint Archive","author":"Setty Srinath","year":"2023","unstructured":"Srinath Setty, Justin Thaler, and Riad Wahby. Unlocking the lookup singularity with lasso. Cryptology ePrint Archive, 2023."},{"key":"e_1_3_2_1_51_1","unstructured":"Simon. Gpu accelerated high-speed merkle tree computation for bitcoin. https:\/\/github.com\/shilch\/fastmerkle."},{"key":"e_1_3_2_1_52_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213945"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225165"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.48"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00060"},{"key":"e_1_3_2_1_57_1","first-page":"501","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Weng Chenkai","year":"2021","unstructured":"Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang. Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning. In 30th USENIX Security Symposium (USENIX Security 21), pages 501--518, 2021."},{"key":"e_1_3_2_1_58_1","first-page":"675","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Wu Howard","year":"2018","unstructured":"Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, and Ion Stoica. {DIZK}: A distributed zero knowledge proof system. In 27th USENIX Security Symposium (USENIX Security 18), pages 675--692, 2018."},{"key":"e_1_3_2_1_59_1","first-page":"733","volume-title":"Proceedings, Part III 39","author":"Xie Tiacheng","year":"2019","unstructured":"Tiacheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, and Dawn Song. Libra: Succinct zero-knowledge proofs with optimal prover computation. In Advances in Cryptology--CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2019, Proceedings, Part III 39, pages 733--764. Springer, 2019."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560652"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15985-5_11"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484767"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00052"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00040"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT59805.2023.00009"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:47:51Z","timestamp":1755787671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":65,"alternative-id":["10.1145\/3669940.3707270","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707270","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}