This paper disclosed Zero Knowledge Proof (ZKP) to prove any statement that is true but without revealing the secret of that
information to the verifier. After that, it includes a formal example to show how a ZKP works. We showed two computational protocols
to prove ZKP and these are: Schnorr's protocol and Fiege-Fiat-Shamir Identification to verify the situation is true or false. The paper
concludes the application of ZKP in usage of Blockchain, zk-SNARKs, Zcash cryptocurrency in real life examples. In summarize, it
describes the field of ZKP systems and provides a brief its algorithm and applications. Also it concludes with the present and future
research interest on ZKP.
Published In:IJCSN Journal Volume 8, Issue 5
Date of Publication : October 2019
Pages : 436-440
Figures :03
Tables : --
Jahid Hasan :
Currently pursuing his Master's
degree in Nanjing University of Posts and
Telecommunications, China. His research interests
include Information cryptography, Blockchain
technology, 5G network, wireless communications
etc.
In conclusion, for both the mathematicians and
cryptographers, the evidence of ZKP is of significant
theoretical and practical concern. From this, we can find
how a ZKP works on those protocols and see their
behavior. In contrast, we have introduced its applications
in real life examples. Mostly, nowadays, Blockchain
technology adopting this ZKP techniques for the secured
and authentic transaction between two parties. Moreover,
ZKP is more promising and advance research area in the
field of Blockchain technology and on its distributed
ledger systems.
[1] Uriel Feige, Amos Fiat and Adi Shamir, " Zero
Knowledge Proofs of Identity," 1987 ACM 0-89791-
221"7/87/0006-0210.
[2] ZKP online wiki link:
https://en.wikipedia.org/wiki/Zero-knowledge_proof.
[3] Dima Kogan, " Proofs of Knowledge, Schnorr ' s
protocol, NIZK," CS 355: Topics in Cryptography,
Spring 2019.
[4] Kiayias, "Crypto: Primitives and Protocols," Lecture
7.
[5] Alfred J. Menezes, Paul C. van Oorschot, and Scott A.
Vanstone. Handbook of Applied Cryptography. 5th Ed.
CRC Press, 2001.
[6] Joseph M. Kizza, "Feige-Fiat-Shamir ZKP Scheme
Revisited," Journal of Computing and ICT Research,
Vol. 4, No. 1,pp. 9-19.
[7] Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen,
Charalampos Papamanthou, "Hawk: The Blockchain
Model of Cryptography and Privacy-Preserving Smart
Contracts," 2016 IEEE Symposium on Security and
Privacy.
[8] ZK-SNARKs Available:
https://z.cash/technology/zksnarks/.
[9] Eli Ben-Sasson, Alessandro Chiesa, Christina Garman,
Matthew Green, Ian Miers, Eran Tromer, Madars Virza, "Zerocash: Decentralized Anonymous Payments from
Bitcoin," 2014 IEEE Symposium on Security and
Privacy.
[10] Niranjanamurthy M, Shashank K S, Sumanth P Gowda,
Suhas Bhatta, "RESEARCH STUDY ON TWO
FACTOR ZERO KNOWLEDGE PROOF
AUTHENTICATION SYSTEM," International Journal
of Advance Research in Science and Engineering, Vol.
No.5, Special issue no. (01), February 2016.