Education, Science, Technology, Innovation and Life
Open Access
Sign In

Exploration and Analysis of the Application of Zero Knowledge Proof Method in Information Security System

Download as PDF

DOI: 10.23977/cpcs.2025.090102 | Downloads: 4 | Views: 104

Author(s)

Xiaoyan Li 1, Shi Wang 1

Affiliation(s)

1 Hainan Vocational University of Science and Technology, Haikou, Hainan, China

Corresponding Author

Xiaoyan Li

ABSTRACT

In the digital age, information security is crucial. Zero knowledge proof, as an innovative cryptographic technique, can effectively prove the authenticity of information without revealing the information itself. This article delves into the application of zero knowledge proof methods in information security systems, analyzing their principles, advantages, challenges, and future development trends, providing theoretical support and practical references for research and practice in the field of information security.

KEYWORDS

Zero knowledge proof; Information security system; Information security; Identity authentication; application

CITE THIS PAPER

Xiaoyan Li, Shi Wang, Exploration and Analysis of the Application of Zero Knowledge Proof Method in Information Security System. Computing, Performance and Communication Systems (2025) Vol. 9: 8-13. DOI: http://dx.doi.org/10.23977/cpcs.2025.090102.

REFERENCES

[1] Jia Miao, Yao Zhongyuan, Zhu Weihua, etc The Progress and Prospects of Zero Knowledge Proof Empowering Blockchain [J]. Computer Applications, 2024, 44(12):3669-3677.
[2] Peng Kun Verification methods, devices and systems, equipment and media based on zero knowledge proof CN202110844836.X [2025-02-27].
[3] Anonymous. A privacy protection method for smart contracts based on zero knowledge proof: CN202211721423.3 [P].
[4] Li Guoliang, Shao Sihao Research and Implementation of Electronic License Sharing Scheme Based on Blockchain [J]. Information Security Research, 2023, 9(2):127-null.
[5] Xu Huihui, Tian Yunfei, Peng Jing A new energy cloud system security sharing method based on zero knowledge proof and blockchain [J]. Research on industrial innovation, 2023(20):115-117.
[6] Ding Dong, Li Zhengquan Research on Hardware Acceleration Methods for Elliptic Curve Operations in Zero Knowledge Proofs [J]. Journal of China Jiliang University, 2024, 35(2):185-196.
[7] Ye Chunming, Ye Chunxiao, Zhang Yabing, etc. An anonymous trusted access control method based on verifiable credentials and zero knowledge proofs CN202211346797.1 [2025-02-27].
[8] Song Zhiming, Yu Yimin, Wang Guiwen, etc Zero knowledge authentication and management architecture for digital identity verifiable credentials based on blockchain smart contracts [J]. Journal of Information Security, 2023, 8 (1): 55-77.

Downloads: 2876
Visits: 150638

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.