Exploration and Analysis of the Application of Zero Knowledge Proof Method in Information Security System
DOI: 10.23977/cpcs.2025.090102 | Downloads: 4 | Views: 104
Author(s)
Xiaoyan Li 1, Shi Wang 1
Affiliation(s)
1 Hainan Vocational University of Science and Technology, Haikou, Hainan, China
Corresponding Author
Xiaoyan LiABSTRACT
In the digital age, information security is crucial. Zero knowledge proof, as an innovative cryptographic technique, can effectively prove the authenticity of information without revealing the information itself. This article delves into the application of zero knowledge proof methods in information security systems, analyzing their principles, advantages, challenges, and future development trends, providing theoretical support and practical references for research and practice in the field of information security.
KEYWORDS
Zero knowledge proof; Information security system; Information security; Identity authentication; applicationCITE THIS PAPER
Xiaoyan Li, Shi Wang, Exploration and Analysis of the Application of Zero Knowledge Proof Method in Information Security System. Computing, Performance and Communication Systems (2025) Vol. 9: 8-13. DOI: http://dx.doi.org/10.23977/cpcs.2025.090102.
REFERENCES
[1] Jia Miao, Yao Zhongyuan, Zhu Weihua, etc The Progress and Prospects of Zero Knowledge Proof Empowering Blockchain [J]. Computer Applications, 2024, 44(12):3669-3677.
[2] Peng Kun Verification methods, devices and systems, equipment and media based on zero knowledge proof CN202110844836.X [2025-02-27].
[3] Anonymous. A privacy protection method for smart contracts based on zero knowledge proof: CN202211721423.3 [P].
[4] Li Guoliang, Shao Sihao Research and Implementation of Electronic License Sharing Scheme Based on Blockchain [J]. Information Security Research, 2023, 9(2):127-null.
[5] Xu Huihui, Tian Yunfei, Peng Jing A new energy cloud system security sharing method based on zero knowledge proof and blockchain [J]. Research on industrial innovation, 2023(20):115-117.
[6] Ding Dong, Li Zhengquan Research on Hardware Acceleration Methods for Elliptic Curve Operations in Zero Knowledge Proofs [J]. Journal of China Jiliang University, 2024, 35(2):185-196.
[7] Ye Chunming, Ye Chunxiao, Zhang Yabing, etc. An anonymous trusted access control method based on verifiable credentials and zero knowledge proofs CN202211346797.1 [2025-02-27].
[8] Song Zhiming, Yu Yimin, Wang Guiwen, etc Zero knowledge authentication and management architecture for digital identity verifiable credentials based on blockchain smart contracts [J]. Journal of Information Security, 2023, 8 (1): 55-77.
Downloads: | 2876 |
---|---|
Visits: | 150638 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks