{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:00Z","timestamp":1750309440968,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3721473.3722142","type":"proceedings-article","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T21:48:18Z","timestamp":1743630498000},"page":"15-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Proof-Carrying CRDTs allow Succinct Non-Interactive Byzantine Update Validation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8434-8122","authenticated-orcid":false,"given":"Nick","family":"Marx","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5739-8852","authenticated-orcid":false,"given":"Florian","family":"Jacob","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-3180","authenticated-orcid":false,"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3695249"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","unstructured":"Paulo S\u00e9rgio Almeida. 2024. A Framework for Consistency Models in Distributed Systems. arXiv:2411.16355 10.48550\/arXiv.2411.16355","DOI":"10.48550\/arXiv.2411.16355"},{"key":"e_1_3_2_2_4_1","volume-title":"Alcino Cunha, and Carla Ferreira.","author":"Baquero Carlos","year":"2017","unstructured":"Carlos Baquero, Paulo S\u00e9rgio Almeida, Alcino Cunha, and Carla Ferreira. 2017. Composition in State-Based Replicated Data Types. Bulletin of the European Association for Theoretical Computer Science 123 (Oct. 2017), 21. https:\/\/run.unl.pt\/handle\/10362\/93093"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2596631.2596632"},{"key":"e_1_3_2_2_6_1","unstructured":"Benjamin Sepanski Sorawee Porncharoenwase Alp Bassa and Daniel Dominguez. 2024. Audit Report: o1js. https:\/\/github.com\/o1-labs\/o1js\/blob\/a09c5167c4df64f879684e5af14c59cf7a6fce11\/audits\/VAR_o1js_240318_o1js_V3.pdf"},{"key":"e_1_3_2_2_7_1","volume-title":"Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments. In Advances in Cryptology - CRYPTO","author":"Boneh Dan","year":"2021","unstructured":"Dan Boneh, Justin Drake, Ben Fisch, and Ariel Gabizon. 2021. Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments. In Advances in Cryptology - CRYPTO 2021, Tal Malkin and Chris Peikert (Eds.). Vol. 12825. Springer International Publishing, Cham, 649--680. https:\/\/link.springer.com\/10.1007\/978-3-030-84242-0_23"},{"key":"e_1_3_2_2_8_1","volume-title":"Mina: Decentralized Cryptocurrency at Scale. (March","author":"Bonneau Joseph","year":"2020","unstructured":"Joseph Bonneau, Izaak Meckler, Vanishree Rao, and Evan Shapiro. 2020. Mina: Decentralized Cryptocurrency at Scale. (March 2020). https:\/\/minaprotocol.com\/wp-content\/uploads\/technicalWhitepaper.pdf"},{"key":"e_1_3_2_2_9_1","unstructured":"Sean Bowe Jack Grigg and Daira Hopwood. 2019. Recursive Proof Composition without a Trusted Setup. (2019). https:\/\/eprint.iacr.org\/2019\/1021"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.238015"},{"key":"e_1_3_2_2_11_1","unstructured":"Stefanos Chaliasos Jens Ernstberger David Theodore David Wong Mohammad Jahanara and Benjamin Livshits. 2024. SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs. https:\/\/arxiv.org\/abs\/2402.15293"},{"key":"e_1_3_2_2_12_1","unstructured":"Alessandro Chiesa and Eran Tromer. 2010. Proof-Carrying Data and Hearsay Arguments from Signature Cards. (2010). https:\/\/conference.iiis.tsinghua.edu.cn\/ICS2010\/content\/paper\/Paper_25.pdf"},{"key":"e_1_3_2_2_13_1","volume-title":"Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. https:\/\/eprint.iacr.org\/2019\/458","author":"Grassi Lorenzo","year":"2019","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2019. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. https:\/\/eprint.iacr.org\/2019\/458"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"e_1_3_2_2_15_1","unstructured":"Matthew Hodgson. 2023. Matrix 2.0. https:\/\/archive.fosdem.org\/2023\/schedule\/event\/matrix20\/"},{"key":"e_1_3_2_2_16_1","unstructured":"Florian Jacob Saskia Bayreuther and Hannes Hartenstein. 2022. On CRDTs in Byzantine Environments. https:\/\/dl.gi.de\/items\/c04ab16e-a0c6-477b-8773-048966727979"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058576"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3642976.3653034"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203518"},{"key":"e_1_3_2_2_20_1","unstructured":"Martin Kleppmann. 2015. A Critique of the CAP Theorem. https:\/\/arxiv.org\/abs\/1509.05393"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517209.3524042"},{"key":"e_1_3_2_2_22_1","series-title":"Lecture Notes in Computer Science","volume-title":"Stabilization, Safety, and Security of Distributed","author":"Shapiro Marc","unstructured":"Marc Shapiro, Marek Zawirsk, Carlos Baquero, and Nuno Pregui\u00e7a. 2011. Conflict-Free Replicated Data Types. In Stabilization, Safety, and Security of Distributed. Lecture Notes in Computer Science, Vol. 6976. Springer Berlin Heidelberg, Berlin, Heidelberg. https:\/\/link.springer.com\/10.1007\/978-3-642-24550-3"},{"key":"e_1_3_2_2_23_1","unstructured":"Nick Marx. 2025. Proof-carrying CRDTs: Source Code. https:\/\/github.com\/kit-dsn\/proof-carrying-crdts\/tree\/papoc25"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795284959"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"e_1_3_2_2_26_1","unstructured":"O(1) Labs. 2024. o1-labs\/o1js. https:\/\/github.com\/o1-labs\/o1js"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","unstructured":"Nuno Pregui\u00e7a Carlos Baquero and Marc Shapiro. 2018. Conflict-free Replicated Data Types (CRDTs). 10.1007\/978-3-319-63962-8_185-1","DOI":"10.1007\/978-3-319-63962-8_185-1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02277859"},{"key":"e_1_3_2_2_29_1","volume-title":"A comprehensive study of Convergent and Commutative Replicated Data Types. (Jan","author":"Shapiro Marc","year":"2011","unstructured":"Marc Shapiro, Nuno Pregui\u00e7a, Carlos Baquero, and Marek Zawirski. 2011. A comprehensive study of Convergent and Commutative Replicated Data Types. (Jan. 2011). https:\/\/inria.hal.science\/inria-00555588\/document"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Justin Thaler. 2023. Proofs Arguments and Zero-Knowledge. (July 2023). https:\/\/people.cs.georgetown.edu\/jthaler\/ProofsArgsAndZK.pdf","DOI":"10.1561\/9781638281252"}],"event":{"name":"PaPoC '25: 12th Workshop on Principles and Practice of Consistency for Distributed Data","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"World Trade Center Rotterdam Netherlands","acronym":"PaPoC '25"},"container-title":["Proceedings of the 12th Workshop on Principles and Practice of Consistency for Distributed Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721473.3722142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3721473.3722142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:47Z","timestamp":1750295387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721473.3722142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":29,"alternative-id":["10.1145\/3721473.3722142","10.1145\/3721473"],"URL":"https:\/\/doi.org\/10.1145\/3721473.3722142","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-04-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}