Basic aspects of the zero-knowledge concept: theoretical foundations, modern ZKP systems, and conceptual representation of zk-SNARK technology

Authors

DOI:

https://doi.org/10.30837/rt.2026.1.224.02

Keywords:

zero knowledge, interactive zero-knowledge proof, non-interactive zero-knowledge proof, zero knowledge protocol, arithmetic circuit, zk-SNARK, cybersecurity

Abstract

In the context of rapid and widespread digitalization of society, active implementation of new innovative technologies, and the growth of cyber threats, the issue of organizing effective cybersecurity for enterprises is becoming particularly important. To protect today's modern digital enterprise, you need a comprehensive strategy for secure access to your corporate resources anytime, anywhere, regardless of where they are located. By following Zero Trust Architecture (ZTA) principles, which call for least privilege access and continuous verification, businesses can effectively minimize their attack surface and limit potential losses from compromised accounts. However, existing access control and authentication mechanisms alone are not always sufficient to ensure complete protection of critical data, especially in scenarios where proof of access rights or actions is required without revealing content. In such cases, an effective addition to ZTA can be the use of Zero-Knowledge (ZK) concept, which allows confirming access rights or ownership (knowledge) of certain information without the need to disclose it, which significantly reduces the risks of leaks and unauthorized access. At the same time, representatives of businesses interested in the security of their systems are not yet fully aware of the advantages of this concept. The practical application of already known Zero-Knowledge Proof (ZKP) capabilities in various relevant areas that ensure security is being hampered, among other things, by a lack of awareness and insufficient theoretical training in this area among specialists responsible for security and communicating these capabilities (their potential) to the managers of relevant IT companies. In other words, there is currently a problem related to a lack of awareness about the zero-knowledge concept (its theoretical and practical significance) for making the right decision when building a security system for a corporate information system in modern conditions. This article is exactly aimed at solving this problem. The purpose of this work is to systematize the theoretical foundations and practical application of the zero-knowledge concept using simple and obvious examples in order to understand the potential of ZKP in solving problems of confidentiality/privacy and data verification. To this end, it outlined the main aspects of the zero-knowledge concept, including an analysis of the applicability of interactive and non-interactive approaches, an assessment of existing ZKP systems, and a conceptual representation of zk-SNARK technology based on the popular Groth16 scheme with mathematical justification. This contributes to a better understanding and future use of this dynamically developing and complex concept as one of the key mechanisms of modern cryptography, providing the ability to prove the correctness of calculations without disclosing the computational process or the initial data.

References

Довгань О., Литвинова Л., Дорогих С. Кібербезпека в інформаційному суспільстві : Інформаційно-аналітичний дайджест. Державна наукова установа «Інститут інформації, безпеки і права Національної академії правових наук України», Національна бібліотека України імені В. І. Вернадського, Київ. 2025. Вип. 9. 176 с. URL: https://ippi.org.ua/sites/default/files/2025-09.pdf.

Kerman A., Borchert O., Rose S., Division E., Tan A. Implementing a zero trust architecture. National Insti-tute of Standards and Technology. 2020. 17 p. URL: https://www.nccoe.nist.gov/sites/default/files/legacy-files/zta-project-description-final.pdf.

Buck C., Olenberger C., Schweizer A., Völter F., Eymann, T. Never trust, always verify: A multivocal litera-ture review on current knowledge and research gaps of zero-trust. Computers & Security. 2021. 110. 102436.

National Cybersecurity Center of Excellence (NCCoE). Implementing a Zero Trust Architecture. URL: https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture.

Єсін В. І., Вілігура В. В., Узлов Д. Ю. Огляд існуючих моделей та основних принципів нульової дові-ри // Радіотехніка. 2024. Вип. 217. С. 39–54. https://doi.org/10.30837/rt.2024.2.217.03.

Єсін В. І., Вілігура В. В., Узлов Д. Ю. Архітектура нульової довіри: проблеми та рекомендації щодо успішного впровадження // Радіотехніка. 2024. Вип. 218. С. 7–34. https://doi.org/10.30837/rt.2024.3.218.01.

Goldwasser S., Micali S., Rackoff C. The knowledge complexity of interactive proof-systems // Proceedings of the seventeenth annual ACM symposium on Theory of computing (STOC '85). Association for Computing Machin-ery, New York, NY, USA, 1985. P. 291–304. https://doi.org/10.1145/22145.22178.

Goldwasser S., Micali, S., Rackoff C. The knowledge complexity of interactive proof systems. SIAM Journal on Computing. 1989. 18 (1). P. 186–208. https://doi.org/10.1137/0218012.

ZKProof Community Reference. Version 0.3. 2022. URL: https://docs.zkproof.org/pages/reference/reference.pdf.

Schnorr C. P. Efficient signature generation by smart cards // Cryptology. 1991. 4. P. 161–174. https://doi.org/10.1007/BF00196725.

Schnorr C. P. Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system. U.S. Patent No. 4,995,082. 19 Feb. 1991.

Cui H., Zhang K., Chen Y., Liu Z., Yu Y. MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof Sys-tem // Bertino E., Shulman H., Waidner M. (eds) Computer Security – ESORICS 2021. ESORICS 2021. Lecture Notes in Computer Science, Springer, Cham. 2021. Vol. 12973. P. 332–351. https://doi.org/10.1007/978-3-030-88428-4_17.

Ozdemir A., Boneh D. Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distrib-uted Secrets // 31st USENIX Security Symposium (USENIX Security 22). 2022. P. 4291–4308. URL: https://www.usenix.org/system/files/sec22-ozdemir.pdf.

Kanjalkar S., Zhang Y., Gandlur S., Miller A. Publicly Auditable MPC-as-a-Service with succinct verifica-tion and universal setup // 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, Austria. 2021. P. 386–411. https://doi.org/10.1109/EuroSPW54576.2021.00048.

Boneh D., Boyen X., Shacham H. Short Group Signatures // Franklin M. (eds) Advances in Cryptology – CRYPTO 2004. CRYPTO 2004. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 2004. Vol 3152. P. 41–55. https://doi.org/10.1007/978-3-540-28628-8_3.

Camenisch J., Lysyanskaya A. Signature Schemes and Anonymous Credentials from Bilinear Maps // Frank-lin M. (eds) Advances in Cryptology – CRYPTO 2004. CRYPTO 2004. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 2004. Vol. 3152. P. 56–72. https://doi.org/10.1007/978-3-540-28628-8_4.

Tessaro S., Zhu, C. Revisiting BBS Signatures // Hazay C., Stam M. (eds) Advances in Cryptology – EUROCRYPT 2023. EUROCRYPT 2023. Lecture Notes in Computer Science, Springer, Cham. 2023. Vol. 14008. P. 691–721. https://doi.org/10.1007/978-3-031-30589-4_24.

Ben-Sasson E., Bentov I., Horesh Y., Riabzev M. Scalable, transparent, and post-quantum secure computa-tional integrity. Cryptology ePrint Archive. 2018. 046. URL: https://eprint.iacr.org/2018/046.pdf.

Lavin R., Liu X., Mohanty H., Norman L., Zaarour G., Krishnamachari B. A survey on the applications of zero-knowledge proofs. arXiv preprint arXiv:2408.00243. 2024. URL: https://arxiv.org/pdf/2408.00243.

Goldreich O. Foundations of Cryptography. Basic Tools (Vol. 1). Cambridge University Press, 2001. 372 p.

Blum M., Feldman P., Micali S. Non-interactive zero-knowledge and its applications // Proceedings of the twentieth annual ACM symposium on Theory of computing (STOC '88). Association for Computing Machinery,New York, NY, USA, 1988. P. 103–112. https://doi.org/10.1145/62212.62222.

Fiege U., Fiat A., Shamir A. Zero knowledge proofs of identity. In Proceedings of the nineteenth annual ACM symposium on Theory of computing. 1987. P. 210–217. https://doi.org/10.1145/28395.28419.

Aad I. Zero-Knowledge Proof // Mulder, V., Mermoud, A., Lenders, V., Tellenbach, B. (eds) Trends in Data Protection and Encryption Technologies. Springer, Cham. 2023. P. 25–30. https://doi.org/10.1007/978-3-031-33386-6_6.

Boaz B. Zero knowledge proofs. URL: https://courses.csail.mit.edu/6.857/2018/files/L22-ZK-Boaz.pdf.

Parno B., Howell J., Gentry C., Raykova M. Pinocchio: nearly practical verifiable computation // Communi-cations of the ACM. 2016. 59(2). P. 103–112. https://doi.org/10.1145/2856449.

Ben-Sasson E., Chiesa A., Tromer E., Virza, M. Succinct Non-Interactive Zero Knowledge for a von Neu-mann Architecture // 23rd USENIX Security Symposium (USENIX Security 14). August 20–22, 2014. San Diego, CA. 2014. P. 781–796. URL: https://eprint.iacr.org/2013/879.pdf.

Wen H., Stephens J., Chen Y., Ferles K., Pailoor S., Charbonnet K., Feng Y. Practical Security Analysis of Zero-Knowledge Proof Circuits // 33rd USENIX Security Symposium (USENIX Security 24). 2024. P. 1471-1487.

Chen Z., Jiang Y., Song X., Chen L. A Survey on Zero-Knowledge Authentication for Internet of Things // Electronics. 2023. 12(5). 1145. https://doi.org/10.3390/electronics12051145.

Ethereum. What are zero-knowledge proofs? URL: https://ethereum.org/zero-knowledge-proofs/#what-are-zk-proofs.

Fiat A., Shamir A. How To Prove Yourself: Practical Solutions to Identification and Signature Problems // Odlyzko, A.M. (eds) Advances in Cryptology — CRYPTO’ 86. CRYPTO 1986. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 1987. Vol 263. P. 186–194. https://doi.org/10.1007/3-540-47721-7_12.

Goldreich O., Oren Y. Definitions and properties of zero-knowledge proof systems // Cryptology. 1994. Vol. 7. P. 1–32. https://doi.org/10.1007/BF00195207.

Panther Academy. zk-SNARKs vs zk-STARKs: Comparing Zero-knowledge Proofs. URL: https://blog.pantherprotocol.io/zk-snarks-vs-zk-starks-differences-in-zero-knowledge-technologies/

Gabizon A., Williamson Z. J., Ciobotaru O. Plonk: Permutations over lagrange-bases for oecumenical nonin-teractive arguments of knowledge. Cryptology ePrint Archive, 2019. 953.

Chiesa A., Hu Y., Maller M., Mishra P., Vesely N., Ward N. Marlin: Preprocessing zkSNARKs with Univer-sal and Updatable SRS // Canteaut A., Ishai Y. (eds) Advances in Cryptology – EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science. Springer, Cham. 2020. Vol. 12105. P. 738–768. https://doi.org/10.1007/978-3-030-45721-1_26.

Ward N., Chiesa A., Mishra P., Hu Y., Vesely N., Maller M. Marlin: Preprocessing zkSNARKs with Univer-sal and Updatable SRS // Technical Report No. UCB/EECS-2021-99. 2021. 102 p.

Kate A., Zaverucha G.M., Goldberg I. Constant-Size Commitments to Polynomials and Their Applications // Abe M. (eds) Advances in Cryptology – ASIACRYPT 2010. ASIACRYPT 2010. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 2010. Vol. 6477. P. 177–194. https://doi.org/10.1007/978-3-642-17373-8_11.

Goldwasser S., Tauman Kalai Y. Cryptographic Assumptions: A Position Paper // Kushilevitz E., Malkin T. (eds) Theory of Cryptography. TCC 2016. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 2016. Vol. 9562. P. 505–522. https://doi.org/10.1007/978-3-662-49096-9_21.

Mouris D., Tsoutsos N. G. Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs // IEEE Transactions on Information Forensics and Security. 2021. Vol. 16. P. 3269–3284. https://doi.org/10.1109/TIFS.2021.3074869.

Costello C., Fournet C., Howell J., Kohlweiss M., Kreuter B., Naehrig M., ... Zahur S. Geppetto: Versatile Verifiable Computation // 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 2015. P. 253–270. https://doi.org/10.1109/SP.2015.23.

Ben-Sasson E., Chiesa A., Genkin D., Tromer E., Virza M. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge // Canetti R., Garay J.A. (eds) Advances in Cryptology – CRYPTO 2013. CRYPTO 2013. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 2013. Vol 8043. P. 90–108. https://doi.org/10.1007/978-3-642-40084-1_6.

Wahby R. S., Setty S., Ren Z., Blumberg A. J., Walfish M. Efficient RAM and Control Flow in Verifiable Outsourced Computation // Proceedings 2015 Network and Distributed System Security Symposium. NDSS ’15, 8–11 February 2015, San Diego, CA, USA. 2015. P. 1–15. https://doi.org/10.14722/ndss.2015.23097.

Eberhardt J., Tai S. Zokrates – scalable privacy-preserving off-chain computations // 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)., Halifax, NS, Canada. 2018. P. 1084–1091. https://10.1109/Cybermatics_2018.2018.00199.

Kosba A., Papamanthou C., Shi E. XJsnark: A Framework for Efficient Verifiable Computation // 2018 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA, 2018. P. 944–961. https://10.1109/SP.2018.00018.

Kosba A., Papadopoulos D., Papamanthou C., Song D. MIRAGE: Succinct Arguments for Randomized Al-gorithms with Applications to Universal zk-SNARKs // 29th USENIX Security Symposium (USENIX Security 20). August 12–14, 2020. 2020. P. 2129–2146.

Maller M., Bowe S., Kohlweiss M., Meiklejohn S. Sonic: Zero-Knowledge SNARKs from Linear-Size Uni-versal and Updatable Structured Reference Strings // Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). Association for Computing Machinery, New York, NY, USA, 2019. P. 2111–2128. https://doi.org/10.1145/3319535.3339817.

Bünz B., Bootle J., Boneh D., Poelstra A., Wuille P., Maxwell G. Bulletproofs: Short Proofs for Confidential Transactions and More // 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2018. P. 315–334. https://doi.org/10.1109/SP.2018.00020.

Bünz B., Fisch B., Szepieniec A. Transparent SNARKs from DARK Compilers // Canteaut A., Ishai Y. (eds) Advances in Cryptology – EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, Springer, Cham. 2020. Vol. 12105. P. 677–706. https://doi.org/10.1007/978-3-030-45721-1_24.

Wahby R. S., Tzialla I., Shelat A., Thaler J., Walfish, M. Doubly-Efficient zkSNARKs Without Trusted Setup // 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2018. P. 926–943. https://doi.org/10.1109/SP.2018.00060.

Ames S., Hazay C., Ishai Y., Venkitasubramaniam M. Ligero: Lightweight Sublinear Arguments Without a Trusted Setup // Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). Association for Computing Machinery, New York, NY, USA, 2017. P. 2087–2104. https://doi.org/10.1145/3133956.3134104.

Ben-Sasson E., Bentov I., Horesh Y., Riabzev, M. Scalable Zero Knowledge with No Trusted Setup // Boldyreva A., Micciancio D. (eds) Advances in Cryptology – CRYPTO 2019. CRYPTO 2019. Lecture Notes in Com-puter Science, Springer, Cham. 2019. Vol. 11694. P. 701–732. https://doi.org/10.1007/978-3-030-26954-8_23.

Groth J. On the Size of Pairing-Based Non-interactive Arguments // Fischlin M., Coron JS. (eds) Advances in Cryptology – EUROCRYPT 2016. EUROCRYPT 2016. Lecture Notes in Computer Science. Springer, Berlin, Hei-delberg. 2016. Vol. 9666. P. 305–326. https://doi.org/10.1007/978-3-662-49896-5_11.

Katsumata S. A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Se-cure NIZKs // Malkin T., Peikert C. (eds) Advances in Cryptology – CRYPTO 2021. CRYPTO 2021. Lecture Notes in Computer Science,Springer, Cham. 2021. Vol 12826. P. 580–610. https://doi.org/10.1007/978-3-030-84245-1_20.

Lyubashevsky V., Nguyen N. K., Plançon M. Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General // Dodis Y., Shrimpton T. (eds) Advances in Cryptology – CRYPTO 2022. CRYPTO 2022. Lecture Notes in Computer Science, Springer, Cham. 2022. Vol. 13508. P. 71–101. https://doi.org/10.1007/978-3-031-15979-4_3.

Nguyen N. K., O'Rourke G. More Efficient Lattice-Based Zero-Knowledge Proofs with Straight-Line Extrac-tability // Proceedings of the 12th ACM ASIA Public-Key Cryptography Workshop. 2025. P. 34–43. https://doi.org/10.1145/3709015.3728673.

Nikolaenko V., Ragsdale S., Bonneau J., Boneh D. Powers-of-Tau to the People: Decentralizing Setup Ceremonies // Pöpper C., Batina L. (eds) Applied Cryptography and Network Security. ACNS 2024. Lecture Notes in Computer Science, Springer, Cham. 2024. Vol. 14585. P. 105–134. https://doi.org/10.1007/978-3-031-54776-8_5.

Gailly N., Maller M., Nitulescu A. SnarkPack: Practical SNARK Aggregation // Eyal I., Garay J. (eds)Financial Cryptography and Data Security. FC 2022. Lecture Notes in Computer Science. Springer, Cham. 2022. Vol. 13411. P. 203–229. https://doi.org/10.1007/978-3-031-18283-9_10.

Evans D., Kolesnikov V., Rosulek M. A Pragmatic Introduction to Secure Multi-Party Computation // Foun-dations and Trends® in Privacy and Security. 2018. 2(2-3). P 70–246. http://dx.doi.org/10.1561/3300000019.

ZoKrates. URL: https://zokrates.github.io/toolbox/trusted_setup.html.

Zcash. URL: https://z.cash.

Kappos G., Yousaf H., Maller M., Meiklejohn S. An empirical analysis of anonymity in Zcash // 27th USENIX Security Symposium (USENIX Security 18). 2018. P. 463–477.

Hopwood D., Bowe S., Hornby T., Wilcox N. Zcash protocol specification. Version 2024.5.1-112-gcf7a5c [NU6]. 2024. 224 p. URL: https://caladex.io/api/files/papers/zcash%20white%20paper.pdf.

Pertsev A., Semenov R., Storm R. Tornado cash privacy solution version 1.4. 2019. URL: https://assets.super.so/c862512c-bc17-499b-9863-6144c0eb603c/files/e8d4f776-b0b1-422e-a492-f0861c002f64.pdf.

Nadler M., Schär F. Tornado cash and blockchain privacy: a primer for economists and policymakers. Fed-eral Reserve Bank of St. Louis Review. 2023. URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4352337.

Danezis G., Fournet C., Groth J., Kohlweiss M. Square Span Programs with Applications to Succinct NIZK Arguments // Sarkar P., Iwata T. (eds) Advances in Cryptology – ASIACRYPT 2014. ASIACRYPT 2014. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 2014. Vol. 8873. P. 532–550. https://doi.org/10.1007/978-3-662-45611-8_28.

Sheybani N., Ahmed A., Kinsy M., Koushanfar F. Zero-Knowledge Proof Frameworks: A Systematic Survey. arXiv e-prints. 2025. arXiv: 2502.07063. https://doi.org/10.48550/arXiv.2502.07063.

Buterin V. Quadratic Arithmetic Programs: from Zero to Hero. URL: https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649.

Gennaro R., Gentry C., Parno B., Raykova M. Quadratic Span Programs and Succinct NIZKs without PCPs // Johansson T., Nguyen P.Q. (eds) Advances in Cryptology – EUROCRYPT 2013. EUROCRYPT 2013. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 2013. Vol. 7881. P. 626–645. https://doi.org/10.1007/978-3-642-38348-9_37.

ZoKrates. Proving schemes. https://zokrates.github.io/toolbox/proving_schemes.html.

Barreto P. S. L. M., Naehrig M. Pairing-friendly elliptic curves of prime order. International workshop on se-lected areas in cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. P. 319–331.

Freeman D., Scott M. Teske E. A Taxonomy of Pairing-Friendly Elliptic Curves. 2010 // Cryptol. Vol. 23. P.224–280. https://doi.org/10.1007/s00145-009-9048-z.

Sakemi Y., Kobayashi T., Saito T., Wahby R. Pairing-Friendly Curves. 2021. URL: https://www.ietf.org/archive/id/draft-irtf-cfrg-pairing-friendly-curves-10.html.

Groth16 Explained. URL: https://rareskills.io/post/groth16.

The RareSkills Book of Zero Knowledge. URL: https://rareskills.io/zk-book#brxe-mzqdsb.

Stange K.E. The Tate Pairing Via Elliptic Nets // Takagi T., Okamoto T., Okamoto E., Okamoto T. (eds) Pairing-Based Cryptography – Pairing 2007. Pairing 2007. Lecture Notes in Computer Science. Springer, Berlin, Hei-delberg. 2007. Vol. 4575. P. 329–348. https://doi.org/10.1007/978-3-540-73489-5_19.

Hu L., Dong J. W., Pei D. Y. Implementation of cryptosystems based on Tate pairing // Journal of Computer Science and Technology. 2005. Vol. 20(2). P. 264–269.

Ogura N., Kanayama N., Uchiyama S., Okamoto E. Cryptographic Pairings Based on Elliptic Nets // Iwata T., Nishigaki M. (eds) Advances in Information and Computer Security. IWSEC 2011. Lecture Notes in Computer Sci-ence. Springer, Berlin, Heidelberg. 2011. Vol. 7038. P. 65–78. https://doi.org/10.1007/978-3-642-25141-2_5.

Granger R., Hess F., Oyono R., Theriault N., Vercauteren F. Ate Pairing on Hyperelliptic Curves // Naor M. (eds) Advances in Cryptology - EUROCRYPT 2007. EUROCRYPT 2007. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. 2007. Vol. 4515. P. 430–447. https://doi.org/10.1007/978-3-540-72540-4_25.

Nogami Y., Akane M., Sakemi Y., Kato H., Morikawa Y. Integer Variable χ–Based Ate Pairing // Galbraith S.D., Paterson K.G. (eds) Pairing-Based Cryptography – Pairing 2008. Pairing 2008. Lecture Notes in Computer Sci-ence. Springer, Berlin, Heidelberg. 2008. Vol 5209. P. 178–191. https://doi.org/10.1007/978-3-540-85538-5_13.

Published

2026-04-30

How to Cite

Yesin, V., & Vilihura, V. (2026). Basic aspects of the zero-knowledge concept: theoretical foundations, modern ZKP systems, and conceptual representation of zk-SNARK technology. Radiotekhnika, (224), 23–57. https://doi.org/10.30837/rt.2026.1.224.02

Issue

Section

Articles