{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T23:59:32Z","timestamp":1771804772325,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T00:00:00Z","timestamp":1771718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T00:00:00Z","timestamp":1771718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    We present , a zkSNARK solution for large-scale matrix multiplication. Classical zkSNARK protocols typically underperform in data analytic contexts, hampered by the large size of datasets and the superlinear nature of matrix multiplication. excels in its scalability. The prover time of scales linearly with respect to the number of non-zero elements in the input matrices. For\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$n \\times n$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>\u00d7<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    matrix multiplication with\n                    <jats:italic>N<\/jats:italic>\n                    non-zero elements across three input matrices, employs a structured reference string (SRS) of size\n                    <jats:italic>O<\/jats:italic>\n                    (\n                    <jats:italic>n<\/jats:italic>\n                    ), and achieves RAM usage of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$O(N+n)$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>O<\/mml:mi>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mi>N<\/mml:mi>\n                            <mml:mo>+<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , transcript size of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$O(\\log n)$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>O<\/mml:mi>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mo>log<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , prover time of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$O(N+n)$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>O<\/mml:mi>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mi>N<\/mml:mi>\n                            <mml:mo>+<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , and verifier time of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$O(\\log n)$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>O<\/mml:mi>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mo>log<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    . The prover time, notably at\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$O(N+n)$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>O<\/mml:mi>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mi>N<\/mml:mi>\n                            <mml:mo>+<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    and surpassing all existing protocols, includes\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$O(N+n)$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>O<\/mml:mi>\n                            <mml:mo>(<\/mml:mo>\n                            <mml:mi>N<\/mml:mi>\n                            <mml:mo>+<\/mml:mo>\n                            <mml:mi>n<\/mml:mi>\n                            <mml:mo>)<\/mml:mo>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    field multiplications and\n                    <jats:italic>O<\/jats:italic>\n                    (\n                    <jats:italic>n<\/jats:italic>\n                    ) exponentiations and pairings within bilinear groups. These efficiencies make effective for linear algebra on large matrices common in real-world applications. We evaluated with\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$2^{15} \\times 2^{15}$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:msup>\n                              <mml:mn>2<\/mml:mn>\n                              <mml:mn>15<\/mml:mn>\n                            <\/mml:msup>\n                            <mml:mo>\u00d7<\/mml:mo>\n                            <mml:msup>\n                              <mml:mn>2<\/mml:mn>\n                              <mml:mn>15<\/mml:mn>\n                            <\/mml:msup>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    input matrices each containing 1\n                    <jats:italic>G<\/jats:italic>\n                    non-zero integers, which necessitate 32\n                    <jats:italic>T<\/jats:italic>\n                    integer multiplications in naive matrix multiplication. recorded prover and verifier times of 150.84s and 0.56s, respectively. When applied to\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$1M \\times 1M$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mn>1<\/mml:mn>\n                            <mml:mi>M<\/mml:mi>\n                            <mml:mo>\u00d7<\/mml:mo>\n                            <mml:mn>1<\/mml:mn>\n                            <mml:mi>M<\/mml:mi>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    sparse matrices each containing 1\n                    <jats:italic>G<\/jats:italic>\n                    non-zero integers, it demonstrated prover and verifier times of 1,\u00a0384.45s and 0.67s. Our approach outperforms current zkSNARK solutions by successfully handling the large matrix multiplication task in experiment. We extend matrix operations from field matrices to group matrices, formalizing group matrix algebra. This mathematical advancement brings notable symmetries beneficial for high-dimensional elliptic curve cryptography. By leveraging the bilinear properties of our group matrix algebra in the context of the two-tier commitment scheme, achieves efficiency gains over previous matrix multiplication arguments. To accomplish this, we extend and enhance Bulletproofs to construct an inner product argument featuring a transparent setup and logarithmic verifier time.\n                  <\/jats:p>","DOI":"10.1186\/s42400-025-00462-6","type":"journal-article","created":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T23:16:01Z","timestamp":1771802161000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dualmatrix: conquering zkSNARK for large matrix multiplication"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5858-3411","authenticated-orcid":false,"given":"Mingshu","family":"Cong","sequence":"first","affiliation":[]},{"given":"Tsz Hon","family":"Yuen","sequence":"additional","affiliation":[]},{"given":"Siu Ming","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,22]]},"reference":[{"key":"462_CR1","doi-asserted-by":"crossref","unstructured":"Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M (2010) Structure-preserving signatures and commitments to group elements. CRYPTO 209\u2013236","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"462_CR2","doi-asserted-by":"crossref","unstructured":"Ames S, Hazay C, Ishai Y, Venkitasubramaniam M (2017) Ligero: Lightweight sublinear arguments without a trusted setup. In: CCS, pp 2087\u20142104","DOI":"10.1145\/3133956.3134104"},{"key":"462_CR3","doi-asserted-by":"crossref","unstructured":"Attema T, Cramer R, Kohl L (2021) A compressed $$\\sigma$$-protocol theory for lattices. In: CRYPTO, pp 549\u2013579","DOI":"10.1007\/978-3-030-84245-1_19"},{"key":"462_CR4","doi-asserted-by":"crossref","unstructured":"Attema T, Fehr S, Kloo\u00df M (2022) Fiat-Shamir transformation of multi-round interactive proofs. In: TCC, pp 113\u2013142","DOI":"10.1007\/978-3-031-22318-1_5"},{"key":"462_CR5","doi-asserted-by":"crossref","unstructured":"Ben-Sasson E et\u00a0al (2019) Aurora: Transparent succinct arguments for r1cs. In: EUROCRYPT, pp 103\u2013128","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"462_CR6","doi-asserted-by":"crossref","unstructured":"Bootle J, Cerulli A, Chaidos P, Groth J, Petit C (2016) Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting. IN: EUROCRYPT, pp 327\u2013357","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"462_CR7","doi-asserted-by":"crossref","unstructured":"Bootle J, Chiesa A, Hu Y Orr\u00fa M (2022) Gemini: Elastic SNARKs for diverse environments. In: EUROCRYPT, pp 427\u2013457","DOI":"10.1007\/978-3-031-07085-3_15"},{"key":"462_CR8","doi-asserted-by":"crossref","unstructured":"B\u00fcnz B et\u00a0al (2018) Bulletproofs: Short proofs for confidential transactions and more. S &P 315\u2013334","DOI":"10.1109\/SP.2018.00020"},{"key":"462_CR9","doi-asserted-by":"crossref","unstructured":"B\u00fcnz B, Fisch B, Szepieniec A (2020) Transparent SNARKs from DARK compilers. IN: EUROCRYPT, pp 677\u2013706","DOI":"10.1007\/978-3-030-45721-1_24"},{"key":"462_CR10","doi-asserted-by":"crossref","unstructured":"B\u00fcnz B, Maller M, Mishra P, Tyagi N, Vesely P (2021) Proofs for inner pairing products and applications. In: ASIACRYPT, pp 65\u201397","DOI":"10.1007\/978-3-030-92078-4_3"},{"key":"462_CR11","doi-asserted-by":"crossref","unstructured":"Campanelli M, Fiore D, Querol A (2019) LegoSnark: Modular design and composition of succinct zero-knowledge proofs. In: CCS, pp 2075\u20132092","DOI":"10.1145\/3319535.3339820"},{"key":"462_CR12","unstructured":"Canetti R, et al (2018) Fiat-shamir from simpler assumptions. IACR Cryptol. ePrint Arch. 2018\/1004"},{"key":"462_CR13","doi-asserted-by":"crossref","unstructured":"Chen B, B\u00fcnz B, Boneh D, Zhang Z (2023) Hyperplonk: Plonk with linear-time prover and high-degree custom gates. In: EUROCRYPT, pp 499\u2013530","DOI":"10.1007\/978-3-031-30617-4_17"},{"key":"462_CR14","doi-asserted-by":"crossref","unstructured":"Chiesa A et\u00a0al (2020) Marlin: preprocessing zkSNARKs with universal and updatable SRS. In: EUROCRYPT, pp 738\u2013768","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"462_CR15","doi-asserted-by":"crossref","unstructured":"Chiesa A, Ojha D, Spooner N (2020) Fractal: post-quantum and transparent recursive proofs from holography. In: EUROCRYPT, pp 769\u2013793","DOI":"10.1007\/978-3-030-45721-1_27"},{"key":"462_CR16","doi-asserted-by":"crossref","unstructured":"Cong M, Yuen TH, Yiu SM (2024) zkMatrix: Batched short proof for committed matrix multiplication. In: ASIACCS, pp 289\u2013305","DOI":"10.1145\/3634737.3645003"},{"key":"462_CR17","unstructured":"Gabizon A, Williamson ZJ, Ciobotaru O (2019) Plonk: Permutations over Lagrange-bases for oecumenical noninteractive arguments of knowledge. IACR Cryptol. ePrint Arch. 2019\/953"},{"key":"462_CR18","doi-asserted-by":"crossref","unstructured":"Gennaro R, Gentry C, Parno B, Raykova M (2013) Quadratic span programs and succinct NIZKs without PCPs. In: EUROCRYPT, pp 626\u2013645","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"462_CR19","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S, Lyubashevsky V (2022) Practical non-interactive publicly verifiable secret sharing with thousands of parties. In: EUROCRYPT, pp 458\u2013487","DOI":"10.1007\/978-3-031-06944-4_16"},{"key":"462_CR20","unstructured":"Ghodsi Z, Gu T, Garg, S (2017) Verifiable execution of deep neural networks on an untrusted cloud. In: NIPS, SafetyNets"},{"key":"462_CR21","doi-asserted-by":"crossref","unstructured":"Golovnev A, Lee J, Setty S, Thaler J, Wahby RS (2023) Brakedown: linear-time and field-agnostic SNARKs for R1CS. In: CRYPTO, pp 193\u2013226","DOI":"10.1007\/978-3-031-38545-2_7"},{"key":"462_CR22","unstructured":"Groth J (2004) Honest verifier zero-knowledge arguments applied. Ph.D. thesis, BRICS"},{"key":"462_CR23","doi-asserted-by":"crossref","unstructured":"Groth J (2009) Linear algebra with sub-linear zero-knowledge arguments. In: CRYPTO, pp 192\u2013208","DOI":"10.1007\/978-3-642-03356-8_12"},{"key":"462_CR24","doi-asserted-by":"crossref","unstructured":"Groth J (2011) Efficient zero-knowledge arguments from two-tiered homomorphic commitments. In: ASIACRYPT, pp 431\u2013448","DOI":"10.1007\/978-3-642-25385-0_23"},{"key":"462_CR25","doi-asserted-by":"crossref","unstructured":"Groth J (2016) On the size of pairing-based non-interactive arguments. In: EUROCRYPT, pp 305\u2013326","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"462_CR26","doi-asserted-by":"crossref","unstructured":"Hoffmann M, Kloo\u00df M, Rupp A (2019) Efficient zero-knowledge arguments in the discrete log setting, revisited. In: CCS, pp 2093-2110","DOI":"10.1145\/3319535.3354251"},{"key":"462_CR27","doi-asserted-by":"crossref","unstructured":"Lee J (2021) Dory: Efficient, transparent arguments for generalised inner products and polynomial commitments. In: TCC, pp 1\u201334","DOI":"10.1007\/978-3-030-90453-1_1"},{"key":"462_CR28","doi-asserted-by":"crossref","unstructured":"Liu T, Xie X, Zhang Y (2021) zkCNN: zero knowledge proofs for convolutional neural network predictions and accuracy. In: CCS, pp 2968\u20142985","DOI":"10.1145\/3460120.3485379"},{"key":"462_CR29","doi-asserted-by":"crossref","unstructured":"Maller M, Bowe S, Kohlweiss M, Meiklejohn S (2019) Sonic: Zero-knowledge snarks from linear-size universal and updatable structured reference strings. In: CCS, pp 2111\u20132128","DOI":"10.1145\/3319535.3339817"},{"key":"462_CR30","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2856449","volume":"59","author":"B Parno","year":"2016","unstructured":"Parno B, Howell J, Gentry C, Raykova M (2016) Pinocchio: Nearly practical verifiable computation. Commun ACM 59:103\u2013112","journal-title":"Commun ACM"},{"key":"462_CR31","doi-asserted-by":"crossref","unstructured":"Setty S (2020) Spartan: Efficient and general-purpose zksnarks without trusted setup. In: CRYPTO, pp 704\u2013737","DOI":"10.1007\/978-3-030-56877-1_25"},{"key":"462_CR32","unstructured":"Setty S, Lee J (2020) Quarks: Quadruple-efficient transparent zksnarks. IACR Cryptol. ePrint Arch. 2020\/1275"},{"key":"462_CR33","doi-asserted-by":"crossref","unstructured":"Thaler J (2013) Time-optimal interactive proofs for circuit evaluation. In: CRYPTO, pp 71\u201389","DOI":"10.1007\/978-3-642-40084-1_5"},{"key":"462_CR34","unstructured":"Touvron H et al (2023) Llama 2: Open foundation and fine-tuned chat models. arXiv:2307.09288"},{"key":"462_CR35","unstructured":"Weng C, Yang K, Xie X, Katz J, Wang X (2021) Mystique: efficient conversions for Zero-Knowledge proofs with applications to machine learning. In: USENIX, pp 501\u2013518"},{"key":"462_CR36","doi-asserted-by":"crossref","unstructured":"Williams VV (2012) Multiplying matrices faster than coppersmith-winograd. STOC 887\u2013898","DOI":"10.1145\/2213977.2214056"},{"key":"462_CR37","doi-asserted-by":"crossref","unstructured":"Xie T, Zhang J, Zhang Y, Papamanthou C, Song D (2019) Libra: Succinct zero-knowledge proofs with optimal prover computation. CRYPTO, pp 733\u2013764","DOI":"10.1007\/978-3-030-26954-8_24"},{"key":"462_CR38","unstructured":"Xu P et al (2024) Retrieval meets long context large language models. ICLR"},{"key":"462_CR39","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2019","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X (2019) Verifynet: secure and verifiable federated learning. IEEE Trans Inf Forensics Secur 15:911\u2013926","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"462_CR40","doi-asserted-by":"crossref","unstructured":"Yang K, Sarkar P, Weng C Wang X (2021) Quicksilver: Efficient and affordable zero-knowledge proofs for circuits and polynomials over any field. In: CCS, pp 2986\u20133001","DOI":"10.1145\/3460120.3484556"},{"key":"462_CR41","doi-asserted-by":"crossref","unstructured":"Yuen TH, Esgin MF, Liu JK, Au MH, Ding Z (2021) DualRing: generic construction of ring signatures with efficient instantiations. In: CRYPTO, pp 251\u2013281","DOI":"10.1007\/978-3-030-84242-0_10"},{"key":"462_CR42","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1077464.1077466","volume":"1","author":"R Yuster","year":"2005","unstructured":"Yuster R, Zwick U (2005) Fast sparse matrix multiplication. ACM Trans Algorithm 1:2\u201313","journal-title":"ACM Trans Algorithm"},{"key":"462_CR43","doi-asserted-by":"crossref","unstructured":"Zhang J, Xie T, Zhang Y, Song D (2020) Transparent polynomial delegation and its applications to zero knowledge proof. In: S &P, pp 859\u2013876","DOI":"10.1109\/SP40000.2020.00052"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00462-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00462-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00462-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T23:16:06Z","timestamp":1771802166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00462-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,22]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["462"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00462-6","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,22]]},"assertion":[{"value":"6 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"126"}}