Enhancing Digital Privacy: The Application of Zero-Knowledge Proofs in Authentication Systems

  IJCTT-book-cover
 
         
 
© 2024 by IJCTT Journal
Volume-72 Issue-4
Year of Publication : 2024
Authors : Saurav Bhattacharya, Dhruv Seth, Sriram Panyam, Puneet Gangrade
DOI :  10.14445/22312803/IJCTT-V72I4P104

How to Cite?

Saurav Bhattacharya, Dhruv Seth, Sriram Panyam, Puneet Gangrade, "Enhancing Digital Privacy: The Application of Zero-Knowledge Proofs in Authentication Systems," International Journal of Computer Trends and Technology, vol. 72, no. 4, pp. 34-41, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I4P104

Abstract
In the digital age, privacy preservation in authentication systems has emerged as a paramount concern, highlighting the limitations of conventional authentication mechanisms in safeguarding user data. This paper explores the application of Zero-Knowledge Proofs (ZKPs), a revolutionary cryptographic technique, as a robust solution for enhancing privacy in authentication processes. Through a comprehensive examination of the theoretical foundations of ZKPs, including zk-SNARKs and zk-STARKs, this study delineates the mechanism by which ZKPs enable the verification of user credentials without the disclosure of any personal information. By employing a comparative analysis methodology, we contrast ZKP-based authentication systems with traditional and existing privacy-preserving authentication methods across various metrics, such as computational efficiency, scalability, and the degree of privacy preservation. Our findings reveal that ZKPs offer a superior framework for privacy-preserving authentication, addressing critical security vulnerabilities inherent in conventional systems while providing a scalable and efficient solution suitable for widespread implementation. The paper concludes by discussing the challenges associated with deploying ZKP-based systems, proposing potential solutions, and highlighting future directions for research in the domain. Through this investigation, we underscore the significance of ZKPs in advancing the frontier of privacy-preserving digital authentication, paving the way for their broader application in securing digital identities in an increasingly interconnected world.

Keywords
Zero-Knowledge Proofs, Digital Privacy, Authentication Systems, zk-SNARKs, zk-STARKs, Cryptography, Privacy-Preserving Technologies, Computational Efficiency, Scalability, Security Vulnerabilities.

Reference

[1] Oded Goldreich, Foundations of Cryptography: Basic Applications, Cambridge University Press, vol. 2, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Shafi Goldwasser, Silvio Micali, and Charles Rackoff, “The Knowledge Complexity of Interactive Proof Systems,” SIAM Journal on Computing, vol. 18, no. 1, pp. 186-208, 1985.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Eli Ben-Sasson et al., “SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge,” Advances in Cryptology 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, pp. 90-108, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Eli Ben-Sasson et al., “Aurora: Transparent Succinct Arguments for R1CS,” 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, pp. 103-128, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] A. Gabizon, “Exploring the Frontier of Cryptographic Proofs: From Zero Knowledge to Bulletproofs and Beyond,” Journal of Cryptology Research, vol. 5, no. 2, 34-56, 2019.
[6] Eli Ben-Sasson et al., “Scalable, Transparent, and Post-Quantum Secure Computational Integrity,” Cryptology ePrint Archive, 2018.
[Google Scholar] [Publisher Link]
[7] Manuel Blum, Paul Feldman, and Silvio Micali, “Non-Interactive Zero-Knowledge and its Applications,” Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 103-112, 1988.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Eli Ben-Sasson et al., “Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture,” Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, pp. 780-796, 2014.
[Google Scholar] [Publisher Link]
[9] Jan Camenisch, Anja Lehmann, and Gregory Neven, “Optimal Distributed Password Verification,” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado USA, pp. 182-194, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jeremy Jedlicka, and Emanuel S. Grant, “Data Privacy through Zero-Knowledge Proofs,” 2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, India, pp. 1-7, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Sophie Meralli, “Privacy-Preserving Analytics for the Securitization Market: A Zero-Knowledge Distributed Ledger Technology Application,” Financial Innovation, vol. 6, pp. 1-20, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Dylan Warman, David Tien, and Muhammad Ashad Kabir, “A Review of Systems for Educational User Data Storage and Security through Decentralised Blockchain Storage Systems,” 2023 International Conference on Machine Learning and Cybernetics (ICMLC), Adelaide, Australia, pp. 594-600, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Kavyan Zoughalian, Jims Marchang, and Bogdan Ghita, “A Blockchain Secured Pharmaceutical Distribution System to Fight Counterfeiting,” International Journal of Environmental Research and Public Health, vol. 19, no. 7, pp. 1-32, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Christoph Buck et al., “Never Trust, Always Verify: A Multivocal Literature Review on Current Knowledge and Research Gaps of Zero-Trust,” Computers & Security, vol. 110, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Vincent Toubiana et al., “Adnostic: Privacy Preserving Targeted Advertising,” Proceedings Network and Distributed System Symposium, pp. 1-23, 2010.
[Google Scholar] [Publisher Link]
[16] Hang Hu et al., "A Case Study of the Security Vetting Process of Smart-home Assistant Applications," 2020 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, pp. 76-81, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Alper Kerman et al., “Implementing a Zero Trust Architecture,” National Cybersecurity Center of Excellence, pp. 1-57, 2020.
[Google Scholar] [Publisher Link]
[18] M. Harikrishnan, and K.V. Lakshmy, "Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network," 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, pp. 307-312, 2019.
[CrossRef] [Google Scholar] [Publisher Link]