Zero-knowledge proof protocols: theoretical foundations and applications in modern cryptography
DOI:
https://doi.org/10.30837/rt.2025.3.222.05Keywords:
zero-knowledge, cryptography, blockchain, authentication, digital privacy, zk-SNARK, zk-STARK, discrete logarithm, homomorphic encryptionAbstract
The article presents a comprehensive overview of zero-knowledge proof (ZKP) protocols as a fundamental concept of modern cryptography. The historical background of their emergence and the main properties ensuring reliability and confidentiality, i.e., completeness, soundness, and zero-knowledge — are considered. A classification of protocols into interactive and non-interactive ones is provided, with a special focus on modern solutions such as the zk-SNARK and the zk-STARK. The mathematical foundations of ZKPs are described in detail, including discrete logarithm proofs, the use of homomorphic encryption, polynomial commitments, hashing, and elliptic curves. Practical application areas are analyzed, including cryptocurrencies (Zcash, Ethereum), authentication systems, digital identity, and electronic voting. The advantages of using ZKPs are shown, such as enhanced privacy, reduced need for trusted intermediaries, and strengthened security. At the same time, key challenges are outlined, including scalability, implementation complexity, the problem of trusted setup, and potential vulnerability to quantum computing. It is concluded that zero-knowledge proof protocols are a powerful tool for ensuring confidentiality and reliability of digital systems, while further research is aimed at creating more efficient and quantum-resistant solutions.
References
Goldwasser S., Micali S., Rackoff C. The knowledge complexity of interactive proof systems // SIAM Journal on Computing. 1989. Vol. 18, No. 1. P. 186–208.
Goldwasser S., Micali S., Wigderson A. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design // 27th Annual Symposium on Foundations of Computer Science. IEEE, 1986. P. 174–187.
Camenisch J., Stadler M. Proof systems for general statements in discrete logarithms. ETH Zurich, 2003. [Електронний ресурс]. Режим доступу: https://crypto.ethz.ch/publications/files/CamSta97b.pdf
Ben-Sasson E., Bentov I., Horesh Y., Riabzev M. Scalable, transparent, and post-quantum secure computational integrity // IACR Cryptology ePrint Archive. 2018. No. 046. [Електронний ресурс]. Режим доступу: https://eprint.iacr.org/2018/046.pdf
Groth J. Short pairing-based non-interactive zero-knowledge arguments // Advances in Cryptology – ASIACRYPT 2010. Lecture Notes in Computer Science, Vol. 6477. Springer, 2010. P. 321–340. [Електронний ре-сурс]. Режим доступу: https://www.iacr.org/archive/asiacrypt2010/6477323/6477323.pdf
Yu R., Liu J. K. A survey of zero-knowledge proof systems // Journal of Computer Science and Technology. 2021. Vol. 36, No. 4. P. 705–727.
Mosca M. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? // IEEE Security & Privacy. 2018. Vol. 16. P. 38–41.
Fiat A., Shamir A. How to prove yourself: Practical solutions to identification and signature problems // Advances in Cryptology – CRYPTO’86. Lecture Notes in Computer Science. Vol. 263. Springer, 1987. P. 186–194. [Електронний ресурс]. Режим доступу: https://mit6875.github.io/PAPERS/Fiat-Shamir.pdf
Zero knowledge proofs IBM research project [Електронний ресурс]. Режим доступу: https://research.ibm.com/projects/zero-knowledge-proofs
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


