{"id":"https://openalex.org/W4416549449","doi":"https://doi.org/10.1145/3719027.3744796","title":"KZH-Fold: Accountable Voting from Sublinear Accumulation","display_name":"KZH-Fold: Accountable Voting from Sublinear Accumulation","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549449","doi":"https://doi.org/10.1145/3719027.3744796"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3744796","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3744796","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120661427","display_name":"George Kadianakis","orcid":"https://orcid.org/0009-0009-2771-0145"},"institutions":[{"id":"https://openalex.org/I206127235","display_name":"Academy of Athens","ror":"https://ror.org/00qsdn986","country_code":"GR","type":"education","lineage":["https://openalex.org/I206127235"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"George Kadianakis","raw_affiliation_strings":["Ethereum Foundation, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Ethereum Foundation, Athens, Greece","institution_ids":["https://openalex.org/I206127235"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066266435","display_name":"Arantxa Zapico","orcid":"https://orcid.org/0000-0002-9587-8494"},"institutions":[{"id":"https://openalex.org/I4210154782","display_name":"Favaloro Foundation","ror":"https://ror.org/053f3rt53","country_code":"AR","type":"facility","lineage":["https://openalex.org/I4210154782"]}],"countries":["AR"],"is_corresponding":false,"raw_author_name":"Arantxa Zapico","raw_affiliation_strings":["Ethereum Foundation, C\u00f3rdoba, Argentina"],"affiliations":[{"raw_affiliation_string":"Ethereum Foundation, C\u00f3rdoba, Argentina","institution_ids":["https://openalex.org/I4210154782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115060039","display_name":"Hossein Hafezi","orcid":"https://orcid.org/0009-0001-1974-7708"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossein Hafezi","raw_affiliation_strings":["New York University, New York, New York, USA"],"affiliations":[{"raw_affiliation_string":"New York University, New York, New York, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050862609","display_name":"Benedikt B\u00fcnz","orcid":"https://orcid.org/0000-0003-2082-4480"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benedikt B\u00fcnz","raw_affiliation_strings":["New York University, New York, New York, USA"],"affiliations":[{"raw_affiliation_string":"New York University, New York, New York, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5120661427"],"corresponding_institution_ids":["https://openalex.org/I206127235"],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89619005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"409","last_page":"422"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.5285000205039978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.5285000205039978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.11190000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.08739999681711197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.7900000214576721},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.614300012588501},{"id":"https://openalex.org/keywords/accumulator","display_name":"Accumulator (cryptography)","score":0.5961999893188477},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5514000058174133},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5436000227928162},{"id":"https://openalex.org/keywords/sublinear-function","display_name":"Sublinear function","score":0.534500002861023},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.5315999984741211},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.51910001039505},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.46560001373291016},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.44279998540878296}],"concepts":[{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.7900000214576721},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7103000283241272},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.614300012588501},{"id":"https://openalex.org/C2078106","wikidata":"https://www.wikidata.org/wiki/Q14906620","display_name":"Accumulator (cryptography)","level":2,"score":0.5961999893188477},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5514000058174133},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5436000227928162},{"id":"https://openalex.org/C117160843","wikidata":"https://www.wikidata.org/wiki/Q338652","display_name":"Sublinear function","level":2,"score":0.534500002861023},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.5315999984741211},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.51910001039505},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.46560001373291016},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4431999921798706},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.44279998540878296},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43299999833106995},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.390500009059906},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.34450000524520874},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.34139999747276306},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3197999894618988},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31630000472068787},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31360000371932983},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3122999966144562},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.31220000982284546},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.30550000071525574},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.2989000082015991},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.29420000314712524},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C24858836","wikidata":"https://www.wikidata.org/wiki/Q844718","display_name":"Theory of computation","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.27160000801086426},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.26510000228881836},{"id":"https://openalex.org/C7720571","wikidata":"https://www.wikidata.org/wiki/Q1136880","display_name":"Power of two","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C53480672","wikidata":"https://www.wikidata.org/wiki/Q1424189","display_name":"Leader election","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.25870001316070557}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3744796","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3744796","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2113244484","https://openalex.org/W2964159515"],"related_works":[],"abstract_inverted_index":{"Accumulation":[0],"schemes":[1,20],"are":[2,36],"powerful":[3],"primitives":[4],"that":[5,35],"enable":[6],"distributed":[7,39],"and":[8,29,60,76,81,90,117,146,191,200,204,212],"incremental":[9],"verifiable":[10],"computation":[11],"with":[12,21,68,97,114],"less":[13],"overhead":[14,190],"than":[15],"recursive":[16],"SNARKs.":[17],"However,":[18],"existing":[19],"constant-size":[22,70],"accumulation":[23,66],"verifiers,":[24],"suffer":[25],"from":[26],"linear-sized":[27,33],"accumulators":[28],"deciders,":[30],"leading":[31],"to":[32,87,126,138,195],"proofs":[34],"unsuitable":[37],"in":[38,156,210,216],"settings.":[40],"Motivated":[41],"by":[42,171],"the":[43,63,104,110,130,139,150,157,167,227,231],"need":[44],"for":[45],"bandwidth":[46],"efficient":[47],"accountable":[48,174],"voting":[49,175],"protocols,":[50,203],"(I)":[51],"We":[52,198],"introduce":[53],"KZH,":[54],"a":[55,69,98,123,134,178,207,213],"novel":[56,179],"polynomial":[57],"commitment":[58],"scheme,":[59],"(II)":[61],"KZH-fold,":[62],"first":[64,111],"sublinear":[65,115],"scheme":[67,85,113,176],"verifier":[71,99,192],"(3":[72],"group":[73],"scalar":[74],"multiplications)":[75],"O(n1/2":[77],")":[78],"accumulator":[79,89],"size":[80,101,141,152],"decider":[82,91,217],"time.":[83,233],"Our":[84],"generalizes":[86],"achieve":[88],"complexity":[92],"of":[93,100,132,142,159,169,185,229],"k":[94],"\u2022":[95],"n1/k":[96],"k.":[102],"Using":[103],"BCLMS":[105],"compiler,":[106],"(III)":[107],"we":[108,121,165],"build":[109],"IVC/PCD":[112],"proof":[116],"decider.":[118],"(IV)":[119],"Next,":[120],"propose":[122],"new":[124],"approach":[125],"non-uniform":[127],"IVC,":[128],"where":[129],"cost":[131,228],"proving":[133,222],"step":[135],"is":[136,153],"proportional":[137],"maximum":[140],"all":[143],"instruction":[144],"circuits,":[145],"unlike":[147],"previous":[148],"approaches,":[149],"witness":[151],"not":[154],"linear":[155],"number":[158],"instructions.":[160],"(V)":[161],"Leveraging":[162],"these":[163],"advancements,":[164],"demonstrate":[166],"power":[168],"KZH-fold":[170,205],"implementing":[172],"an":[173],"using":[177],"signature":[180],"aggregation":[181],"protocol":[182],"supporting":[183],"millions":[184],"nodes,":[186],"significantly":[187],"reducing":[188],"communication":[189,211],"time":[193,218],"compared":[194],"BLS-based":[196],"aggregation.":[197],"implemented":[199],"benchmarked":[201],"our":[202],"achieves":[206],"2000x":[208],"reduction":[209],"50x":[214],"improvement":[215],"over":[219],"Nova":[220],"when":[221],"2000":[223],"Poseidon":[224],"hashes,":[225],"at":[226],"3x":[230],"prover":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
