Call For Papers
Contact Us

  Overview and Applications of Zero Knowledge Proof (ZKP)  
  Authors : Jahid Hasan
  Cite as:


This paper disclosed Zero Knowledge Proof (ZKP) to prove any statement that is true but without revealing the secret of that information to the verifier. After that, it includes a formal example to show how a ZKP works. We showed two computational protocols to prove ZKP and these are: Schnorr's protocol and Fiege-Fiat-Shamir Identification to verify the situation is true or false. The paper concludes the application of ZKP in usage of Blockchain, zk-SNARKs, Zcash cryptocurrency in real life examples. In summarize, it describes the field of ZKP systems and provides a brief its algorithm and applications. Also it concludes with the present and future research interest on ZKP.


Published In : IJCSN Journal Volume 8, Issue 5

Date of Publication : October 2019

Pages : 436-440

Figures :03

Tables : --


Jahid Hasan : Currently pursuing his Master's degree in Nanjing University of Posts and Telecommunications, China. His research interests include Information cryptography, Blockchain technology, 5G network, wireless communications etc.


ZKP, Schnorr's protocol, Fiege-Fiat-Shamir Identification, Blockchain, zk-SNARKs, Zcash

In conclusion, for both the mathematicians and cryptographers, the evidence of ZKP is of significant theoretical and practical concern. From this, we can find how a ZKP works on those protocols and see their behavior. In contrast, we have introduced its applications in real life examples. Mostly, nowadays, Blockchain technology adopting this ZKP techniques for the secured and authentic transaction between two parties. Moreover, ZKP is more promising and advance research area in the field of Blockchain technology and on its distributed ledger systems.


[1] Uriel Feige, Amos Fiat and Adi Shamir, " Zero Knowledge Proofs of Identity," 1987 ACM 0-89791- 221"7/87/0006-0210. [2] ZKP online wiki link: https://en.wikipedia.org/wiki/Zero-knowledge_proof. [3] Dima Kogan, " Proofs of Knowledge, Schnorr ' s protocol, NIZK," CS 355: Topics in Cryptography, Spring 2019. [4] Kiayias, "Crypto: Primitives and Protocols," Lecture 7. [5] Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 5th Ed. CRC Press, 2001. [6] Joseph M. Kizza, "Feige-Fiat-Shamir ZKP Scheme Revisited," Journal of Computing and ICT Research, Vol. 4, No. 1,pp. 9-19. [7] Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou, "Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts," 2016 IEEE Symposium on Security and Privacy. [8] ZK-SNARKs Available: https://z.cash/technology/zksnarks/. [9] Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza, "Zerocash: Decentralized Anonymous Payments from Bitcoin," 2014 IEEE Symposium on Security and Privacy. [10] Niranjanamurthy M, Shashank K S, Sumanth P Gowda, Suhas Bhatta, "RESEARCH STUDY ON TWO FACTOR ZERO KNOWLEDGE PROOF AUTHENTICATION SYSTEM," International Journal of Advance Research in Science and Engineering, Vol. No.5, Special issue no. (01), February 2016.