Autor: |
Anthoniraj, S., Mishra, Rahul, Loonkar, Shweta, Agarwal, Trapty, Ahluwalia, Gunveen, Gill, Amandeep |
Předmět: |
|
Zdroj: |
Journal of Cybersecurity & Information Management; 2024, Vol. 14 Issue 1, p141-159, 19p |
Abstrakt: |
Privacy and security in the current modern, digital communication and data transfer-oriented world has become imperative. Most commonly used encryption methods often involve exposing sensitive information, which might be an open gate for potential vulnerabilities. This paper aims to explore the topic of applying ZKPs in cybersecurity in a comprehensive manner. For this purpose, Proposed work will provide an exhaustive description of the basic concepts of Zero-Knowledge Proofs, which refer to both the interactive and non-interactive forms of the product. Additionally, the study will focus on presenting various cryptographic protocols and algorithms utilizing Zero-Knowledge Proofs, such as zk-SNARKs and zk-STARKs. In addition to theoretical studies, Proposed work analyze the practical implementation details of Zero-Knowledge Proofs implementations, cryptographic libraries, programming languages, and frameworks commonly used to create ZKP-based applications. Zero-knowledge proofs enable groundbreaking approaches to address cybersecurity problems with an emphasis on user privacy and data confidentiality. On average, cryptographic operations experienced delays of approximately 10 milliseconds which was not intrusive for real-time systems. The system's throughout remained at a steady average of 100 Mbps all times, so it performed well at processing data despite cryptographic overhead. The packet delivery ratio was constantly high at 98%, implying that most data packets were delivered consistently even over encrypted communication paths. [ABSTRACT FROM AUTHOR] |
Databáze: |
Complementary Index |
Externí odkaz: |
|