Next Article in Journal
Evaluating Digital Marketing, Innovation, and Entrepreneurial Impact in AI-Built vs. Professionally Developed DeFi Websites
Previous Article in Journal
Low-Cost Malware Detection with Artificial Intelligence on Single Board Computers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption

School of Computer Science, University of South China, Hengyang 421001, China
*
Author to whom correspondence should be addressed.
Future Internet 2026, 18(1), 47; https://doi.org/10.3390/fi18010047
Submission received: 28 November 2025 / Revised: 4 January 2026 / Accepted: 5 January 2026 / Published: 12 January 2026

Abstract

A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are characterized by strong identity binding, the need for long-term retention, frequent cross-institutional verification, and sensitive information. Compared with electronic health records and government archives, they face more complex security, privacy protection, and storage scalability challenges during sharing. These records not only contain sensitive data such as personal identity and academic performance but also serve as crucial evidence in key scenarios such as further education, employment, and professional title evaluation. Leakage or tampering could have irreversible impacts on a student’s career development. Furthermore, traditional blockchain technology faces storage capacity limitations when storing massive academic records, and existing general electronic record sharing solutions struggle to meet the high-frequency verification demands of educational authorities, universities, and employers for academic data. This study proposes a dedicated sharing framework for students’ electronic academic records, leveraging PRE technology and the distributed ledger characteristics of blockchain to ensure transparency and immutability during sharing. By integrating the InterPlanetary File System (IPFS) with Ethereum Smart Contract (SC), it addresses blockchain storage bottlenecks, enabling secure storage and efficient sharing of academic records. Relying on optimized ZKP technology, it supports verifying the authenticity and integrity of records without revealing sensitive content. Furthermore, the introduction of gate circuit merging, constant folding techniques, Field-Programmable Gate Array (FPGA) hardware acceleration, and the efficient Bulletproofs algorithm alleviates the high computational complexity of ZKP, significantly reducing proof generation time. The experimental results demonstrate that the framework, while ensuring strong privacy protection, can meet the cross-scenario sharing needs of student records and significantly improve sharing efficiency and security. Therefore, this method exhibits superior security and performance in privacy-preserving scenarios. This framework can be applied to scenarios such as cross-institutional academic certification, employer background checks, and long-term management of academic records by educational authorities, providing secure and efficient technical support for the sharing of electronic academic credentials in the digital education ecosystem.

Graphical Abstract

1. Introduction

In recent years, driven by the digitalization wave, electronic records, as an important component of Digitalized information, have played a significant role in fields such as Healthcare and Education [1]. Specifically, SEARs, as core credentials that record the entire lifecycle of a student from enrollment to graduation, not only simplify the storage and management process of traditional paper-based archives but also support the operation of key scenarios such as enrollment, academic certification, and employment background verification [2]. However, compared with other types of electronic records, the uniqueness of student electronic academic records makes their sharing requirements more specific, posing more severe challenges [3]. SEARs serve multiple stakeholders with conflicting yet complementary demands: Students require privacy control and dynamic permission adjustment, universities need tamper-proof guarantees for academic records, employers demand efficient batch verification, and regulatory authorities mandate compliant auditing. SEARs have a long lifecycle spanning decades, from high school transcript verification during enrollment, credit updates during academic years, degree sharing upon graduation, to professional certification post-graduation. Permission requirements vary across phases, and traditional static encryption schemes are unable to adapt to such dynamic changes. Unlike medical records or government archives, SEARs require bidirectional authorization and partial verification, while complying with education-specific regulations. These scenario-specific requirements are overlooked by general electronic record-sharing solutions. In student academic records, identity information and academic information need to be protected simultaneously, but the correspondence between identity and academic records must be confirmed during third-party verification [4]. Traditional encryption schemes either leak content or fail to achieve association verification. Universities, certification authorities, and other entities frequently initiate verification requests, making traditional centralized storage schemes prone to single point of failure. Distributed schemes, on the other hand, suffer from high computational complexity, leading to response latency [5]. In the education sector, regulatory requirements for the authenticity of academic credentials overlap with personal information protection requirements. Existing general-purpose solutions are often designed for compliance in a single domain, making it difficult to simultaneously meet these multiple requirements.
As a distributed ledger system, blockchain technology has the characteristics of verifiability, immutability, decentralization, and record transparency, demonstrating significant advantages in the data security protection field [6]. In the process of electronic record authentication and sharing, Blockchain technology can ensure the authenticity and integrity of records and prevent tampering or forgery by recording all operation logs [7]. However, existing blockchain-based electronic record-sharing solutions still have some limitations, especially in large-scale data-sharing scenarios, where privacy is difficult to effectively maintain, sharing efficiency is relatively low, and system performance struggles to meet actual needs, to a large extent still relying on a centralized management mechanism, limiting the efficient and secure sharing of the system.
To ensure secure and efficient electronic record sharing, two major challenges must be addressed: firstly, identity privacy and transaction privacy issues [8], and secondly, sharing efficiency. This study proposes a student academic electronic record-sharing scheme based on ZKP and PRE, aiming to overcome the limitations of general electronic record-sharing schemes and design a dedicated scheme adapted to the attributes of student academic records. Blockchain achieves its security through cryptographic economics, which combines economic incentives and cryptographic verification to ensure data security [9]. ZKF has strong privacy protection features and is widely used in blockchain to protect the data security of the system [8], forming dual protection with blockchain. As an extension of cryptography, PRE technology is mainly used to solve data security and sharing efficiency problems in the ciphertext sharing process [10], and to realize dynamic permissions management. Therefore, this scheme not only utilizes the distributed ledger attributes of blockchain technology to ensure data security and transparency, and combines the technical advantages of the IPFS and Ethereum SC to realize data storage and sharing, but also integrates ZKP and PRE technology to verify the authenticity and integrity of archive content without disclosing it, while ensuring the security of data transmission and improving system efficiency. To solve the problem of high computational complexity of traditional ZKP algorithms, this study introduces optimization technologies such as gate circuit merging and constant folding, as well as FPGA hardware acceleration, which significantly reduces the proof generation time and improves the efficiency and practicality of the system.
The main contributions of this paper include the following four aspects:
  • Enhance the security of archive sharing: In the data storage phase, the IPFS is used to store record data, preventing illegal theft or tampering. In the data-sharing phase, PRE technology ensures that only legally authorized users can obtain decrypted data, and that the data remains encrypted during transmission, avoiding the risk of data interception during transmission. In the identity verification phase, ZKP technology is used to enhance system security and prevent information leakage during the verification process. Targeting privacy risks in cross-institutional SEARs transmission, this security mechanism prevents unauthorized access to sensitive academic data such as transcripts and Grade Point Average (GPA).
  • Improve archive sharing efficiency: PRE technology is used to achieve direct conversion and sharing of Ciphertext, significantly reducing sharing time. At the same time, by improving gate circuit merging, constant folding technology, FPGA hardware acceleration, and adopting a more efficient Bulletproofs algorithm model, the generation time of ZKP is greatly reduced. Adapted to employers’ batch verification needs for SEARs, the optimized ZKP supports over 10,000 daily verifications, meeting the high-frequency demand in talent recruitment scenarios.
  • It facilitates long-term archive storage: The distributed storage attribute based on IPFS solves the problem of insufficient blockchain storage capacity, and the compliance verification logic of the “Provisional Regulations on the Administration of Electronic Registration of Academic Certificates” and the “Information Protection Law” is embedded into SC. Addressing the 50-year long-term storage requirement of SEARs, the IPFS-blockchain integration ensures data durability while complying with education-specific archiving regulations.
  • It supports dynamic permissions adjustment: Through ZKP technology, the authenticity of archive information can be verified without disclosing the specific content of academic records. Meanwhile, PRE technology makes the authorization and sharing of academic records more secure and flexible. The entire process supports dynamic permissions adjustments, adapting to the privacy protection needs of archive records throughout their full lifecycle. Matching the dynamic permission changes of SEARs across lifecycles, this function adapts to the scenario-specific permission demands of students.
The structure of this paper is as follows: Section 2 presents the related work, Section 3 describes the preliminary work, Section 4 conducts the system design, Section 5 performs the security analysis, and Section 6 introduces the performance evaluation. Finally, Section 7 concludes this paper.

2. Related Work

In archive-sharing scenarios, the authentication mechanism, privacy protection, and efficiency are the core issues of technical research. Strict authentication can achieve verifiable identity through cryptographic design, but it may weaken anonymity and thus weaken privacy protection. Overly complex cryptographic design will increase the computational cost and thus affect verifiable efficiency. Therefore, in the blockchain, the authentication, privacy protection, and efficiency of archives are collaborative optimization problems under triangular constraint. Finding a dynamic equilibrium among the three is the key to this research.

2.1. Analysis of Authentication Mechanism

Fang et al. [11] proposed introducing blockchain technology into the electronic record-sharing and utilization process, employing SC and asymmetric encryption technologies for authentication. However, its efficiency needs improvement. Su et al. [12] designed a massive data storage model based on HBase and its retrieval optimization scheme, addressing the scalability limitations of electronic record management in massive data scenarios. It possesses high security and retrieval efficiency, but the high storage costs compromise the anonymity of authentication. Li et al. [13] proposed a mobile network electronic record protection method based on a homomorphic aggregate signature scheme. This method can aggregate multiple electronic file signatures into a single signature without disclosing electronic record data, reducing the computational complexity and storage overhead of signature verification. However, when processing large data sets or complex models, the encryption and decryption computational complexity and communication costs increase significantly. Liu et al. [14] proposed a Chebyshev distance secure computation protocol under a semi-honest model, which utilizes the additive homomorphic property of the NTRU cryptosystem and vector coding methods for authentication, but the computational efficiency is low. The aforementioned research methods [11,12,13,14] have all explored improving the security of electronic record authentication, but still have certain limitations in terms of efficiency, cost, or scalability.

2.2. Privacy Protection Technology Analysis

Al-Khasawneh et al. [15] proposed a secure blockchain framework suitable for electronic archive management systems, but this scheme does not fully address privacy protection issues. Saad Alahmari et al. [16] designed a decentralized privacy protection electronic archive management framework based on blockchain, but did not provide a solution to the identity impersonation attack problem in the archive-sharing process. Guo et al. [17] proposed a dynamic proxy re-encryption (D-PRE) mechanism, which adaptively re-encrypts Ciphertext based on load sharing, effectively improving system security and Ciphertext-sharing efficiency. Focusing on the secure storage and efficient sharing requirements of electronic archives in the IPFS storage environment, Sun et al. [18] designed an attribute-based Encryption scheme, stored the encrypted electronic archive data in the Decentralization IPFS, solved the problem of insufficient blockchain storage capacity, and enhanced privacy protection, but reduced efficiency. The aforementioned literature [15,16,17,18] has explored the application of technologies such as ZKP and PRE in blockchain environments and combined IPFS to solve the problem of limited blockchain storage capacity. However, there is still room for improvement in the trade-off between privacy protection and efficiency.

2.3. Authentication, Privacy Protection, and Efficiency Analysis

In the field of electronic academic archive sharing, existing research still has three major limitations: First, there is a lack of scenario-specific argumentation for technology selection [19]. Most schemes only apply a single type of encryption technology, resulting in a lack of rationality in the core technology selection. They neither clarify why PRE is preferred over attribute-based encryption (ABE), nor explain the rationale for choosing the Bulletproofs algorithm over zk-SNARK, ultimately leading to a disconnect between technology and actual scenario requirements, making it difficult to meet the dynamic sharing needs of academic data. Secondly, there are gaps in post-quantum security and hardware acceleration optimization [20]. Existing solutions generally rely on traditional cryptographic algorithms such as elliptic curve cryptography (ECC) and RSA. Additionally, there are a lack of effective hardware-level optimization methods for the inherent high computational complexity of ZKP, resulting in low system verification efficiency and an inability to meet the needs of batch verification scenarios with over 100,000 verifications per day. Thirdly, there is insufficient analysis of the overall feasibility of the solutions. Existing research often focuses on the theoretical implementation of technical features but neglects key elements for practical implementation. As a specific example, the IPFS+ABE scheme proposed by Sun et al. [18] solves the problem of insufficient blockchain storage, but ABE permissions adjustments require key updates, which are inefficient and lack compliance verification mechanisms. The zk-SNARK scheme proposed by Saad Alahmari et al. [16] requires a trusted setup phase with centralized parameter generation nodes, which contradicts the core concept of decentralization in blockchain. Additionally, the generated proof files are large, making them unsuitable for batch verification of academic records by employers. To address these shortcomings, this study balances authentication, privacy protection, and efficiency, and proposes a dedicated sharing scheme for electronic academic records that integrates the Ethereum blockchain (EB), optimized ZKP, PRE, FPGA hardware acceleration, and IPFS-distributed storage. This scheme uses PRE technology to achieve dynamic adjustment of sharing permissions, relies on the Learning With Errors (LWEs) algorithm to ensure post-quantum security for long-term storage, reduces the computational complexity of ZKP through FPGA hardware acceleration, and optimizes storage costs using IPFS, thereby comprehensively meeting the sharing requirements of electronic academic records.

3. Preliminary Work

3.1. System Mode

The electronic academic archive system is built upon the EB architecture. Figure 1 illustrates the system model for the archive-sharing scheme, which is the process of implementing record sharing. An overview of the entities involved in the archive-sharing scenario is as follows:
  • EB: Responsible for providing a decentralization, secure, and tamper-proof platform for storing the hash values of academic records and access control information. It uses SC to automate Authentication, Permissions management, and data access control, thereby ensuring secure archive sharing and privacy protection of electronic records. The EB achieves decentralization through three types of nodes—supervisory nodes, storage nodes, and validation nodes.
  • IPFS: IPFS is adopted for storing and distributing electronic academic records in a decentralized manner. Integrated with blockchain technology, it provides a solid data foundation for ZKP and PRE.
  • SC: Automate critical functions such as access control rules, authentication, PRE management, data integrity verification, and transaction recording, while providing transparent and auditable operation records.
  • Certification Authority (CA): Verifies user identities and issues digital certificates, ensuring the authenticity and legitimacy of user identities within the system. As part of the public key infrastructure (PKI), it manages keys and certificates, providing a trust basis and compliance guarantee for the secure sharing of academic records.
  • Key Manager (KM): Responsible for generating, distributing, storing, updating, and revoking encryption keys, supporting the PRE process, and integrating with SC to automate key management.
  • Record Owner (RO): Provides and manages the sharing of electronic academic records, including setting permissions, encrypting data, participating in ZKP verification processes, performing PRE, and monitoring and auditing record access.
  • Record User (RU): Initiates access requests for electronic academic records, authenticates through ZKP to gain permissions, decrypts records using keys received from the key manager, and uses these records within a compliance framework while participating in the system’s feedback and auditing mechanisms.
  • ZKP: ZKP technology provides an efficient and privacy-preserving verification mechanism, allowing users to prove their identity or knowledge of data without revealing any sensitive information, thereby enhancing security and trust in the sharing process of electronic academic records.
  • PRE: PRE technology is responsible for implementing a secure and flexible data access mechanism. It allows data owners to re-encrypt encrypted academic records through a trusted proxy and grant authorization to designated users without directly sharing keys.

3.2. Design Goals

To accommodate the unique requirements of electronic academic records and ensure their secure and efficient sharing, this study defines six core design goals:
  • Identity Anti-Forgery: Ensure a strong binding between user identity and academic records, preventing unauthorized entities from gaining access to others’ academic records by forging digital certificates and tampering with identity information.
  • Conditional Anonymity: While ensuring that users’ core identity information is not disclosed, support authorized entities in tracing the source of archive operations in compliance scenarios.
  • Data Privacy Protection: While completing the Authenticity verification of academic records, ensure that sensitive content in the records is not accessed by unauthorized entities. Through ZKP technology, users can complete the verification process without disclosing any sensitive information.
  • Integrity: Ensure that the content of SEARs is not maliciously tampered with throughout the entire process from generation, storage, and sharing to long-term archiving, and that tampering behavior can be detected in real time.
  • Unlinkability: Prevent attackers from associating multi-dimensional behavioral patterns of the same user by analyzing archive operation records in different scenarios, thereby protecting user privacy boundaries.
  • Distributed storage: Utilize the distributed storage characteristics of the IPFS, combined with the secure access control mechanism of Ethereum SC, to solve the problem of insufficient blockchain storage capacity and achieve efficient and secure data storage.

3.3. Background Technology

3.3.1. Proxy Re-Encryption

PRE, as a encryption technology, can be effectively applied in decentralized storage network solutions [21]. It allows a third party to convert ciphertext from one user’s encryption domain to another user’s encryption domain without knowing the original plaintext content.
(1) Generate Key Pairs: User A and User B each generate a pair of public and private key pairs for data encryption and decryption. The specific description is as follows: Select large prime numbers p and q that satisfy q p 1 , generate the finite field Z p * and its subgroup G (with order q), and select a generator g G . User A randomly selects a private key sk A Z p * , calculates the public key pk A = g sk A mod p , and the key pair is ( sk A , pk A ) . User B generates ( sk B , pk B ) in the same way.
(2) Data Encryption and Re-encryption Key Generation: User A generates a re-encryption key rk A B . A random number r Z p * is selected, and rk A B = ( sk A · ( pk B ) r ) mod q is calculated. This key can only be generated by User A, and User B cannot derive sk A . User A encrypts the academic record T. A random number k Z p * is selected, and the symmetric encryption key K = H 1 ( ( pk B ) k mod p ) (where H 1 is a hash function) is calculated. The ciphertext C A = AES - 256 K ( T ) is obtained by encrypting T using the AES-256 algorithm. Meanwhile, a tag tag = H 2 ( C A , g k mod p ) (where H 2 is a hash function) is calculated. The final encryption result is ( C A , tag , g k mod p ) .
(3) Data Re-encryption: The proxy receives rk A B and ( C A , tag , g k mod p ) . After verifying that tag = H 2 ( C A , g k mod p ) , it calculates g k · rk A B = ( g k ) rk A B mod p and generates the ciphertext C B = ( C A , tag , g k · rk A B mod p ) that User B can decrypt.
(4) Decryption: User B calculates the symmetric key:
K = H 1 ( g k · rk A B ) sk B 1 mod p = H 1 ( g k ) ( sk A · ( pk B ) r ) · sk B 1 mod p = H 1 ( g k ) r mod p = K
and uses K to decrypt C A to obtain T.
As shown in Figure 2, the core process of PRE technology and the interaction logic between participating roles can be clearly understood. The figure involves three types of roles: data owner (Sender), proxy node (Proxy), and authorized user (Receiver).

3.3.2. Zero-Knowledge Proof

The core of ZKP [22] is that the prover can prove the authenticity of a statement without revealing any useful information to the verifier. In the ZKP technology system, the Bulletproofs algorithm was proposed by Bünz et al. in 2018 [23]. Its core advantages are that it does not require trusted initialization, and the proof size is compact, which can save running time and improve efficiency. This paper adopts its arithmetic circuit satisfiability argument subprotocol to transform multi-condition constraints into verifiable mathematical expressions through arithmetic circuits [23,24]. For the format compatibility requirements of historical transcripts before 2020, zk-SNARK selects the Groth16 protocol [25]; zk-STARK adopts the iteratively improved version proposed by Ben-Sasson et al. [26], which is suitable for cross-institutional compliance secondary verification in post-quantum scenarios.
This scheme explicitly designates the Bulletproofs algorithm as the core ZKP technology for electronic transcript verification, while zk-SNARK and zk-STARK serve only as auxiliary technologies for historical record compatibility conversion and cross-chain compliance enhancement, respectively. The technical process is as follows:
(1) Core Component Definition: Define the core components of ZKP based on actual application scenarios.
Statement x refers to the information that needs to be disclosed to the verifier and does not involve sensitive data, specifically including three parts: the transcript Blockchain storage hash ( H T c h a i n ), the verification condition identifier ( E d u _ l e n t a r g e t ), and the prover’s anonymous identity identifier ( a d d r a n o n ). The formal definition of statement x is:
x = ( H T c h a i n , E d u _ l e n t a r g e t , a d d r a n o n )
where H T c h a i n can be queried through the Ethereum block explorer, E d u _ l e n t a r g e t is specified by the verifier when initiating a verification request, and a d d r a n o n is automatically generated by the prover through an SC.
Evidence w refers to the non-disclosed sensitive information held by the prover, specifically including three parts: complete plaintext transcript T, prover’s private key s k p , and original transcript hash ( H T ). The formal definition of evidence w is as follows:
w = ( T , s k p , H T )
where T is stored in IPFS after encryption, s k p is managed by KM, and H T is generated locally by the prover.
The common reference string C R S is a set of public parameters pre-generated based on the security parameter λ = 256 , which specifically includes three steps: basic parameter selection, random parameter calculation, and public parameter calculation based on the random number. The C R S includes basic parameters and public parameters, and its formal definition is as follows:
C R S = ( G ,   q ,   g ,   h ,   u ,   v ,   w ,   α ,   β ,   γ )
where G ,   q ,   g ,   h ,   u ,   v ,   w are publicly stored in the Ethereum SC (accessible to any node), and α ,   β ,   γ are only stored in the regulatory node and protected by the threshold scheme. They are temporarily invoked only when the proof is generated and destroyed immediately after use to prevent leakage.
(2) ZKP technology process:
First, the common reference string C R S is generated by inputting a security parameter λ = 256 , and the generated C R S is stored in both the Ethereum SC and the IPFS distributed storage system. The SC records the hash value of the C R S , and IPFS stores the complete C R S data.
Second, to generate a proof, the Prover P needs to prove that it holds a transcript T that satisfies the verification condition. The specific steps are as follows: Input the public information x = ( H T c h a i n , E d u _ l e n t a r g e t , a d d r a n o n ) and the secret information w = ( T , s k p , H T ) , and calculate a = H 3 ( x , w ) mod q , where H 3 is the SHA-256 hash function, and a is the intermediate value reflecting the correlation between x and w. Randomly select two random numbers s , t Z q * , and compute A = g a · u s mod q and S = g s · v t mod q ; A and S are intermediate proofs for hiding the secret information w. The Verifier V generates a challenge c = H 4 ( x , A , S ) mod q based on the public information x and the intermediate proofs A , S , where H 4 is the SHA-256 hash function. The Prover computes z 1 = s + c · a mod q and z 2 = t + c · s mod q and generates the final proof π = ( A , S , z 1 , z 2 ) .
Finally, during the verification process, the Verifier V can verify the authenticity of the transcript plaintext T without obtaining it. The specific steps are as follows: Obtain the public input x and the proof π = ( A , S , z 1 , z 2 ) , and recalculate the challenge c = H 4 ( x , A , S ) mod q . Verify whether the equation g z 1 = A · u c · v c · z 2 mod q holds. If it holds, set b = 1 , indicating that verification has passed; if it does not hold, set b = 0 , indicating that verification failed.
(3) Auxiliary Technology Integration Logic: zk-SNARK is used for historical record compatibility, specifically for converting transcript formats generated before 2020. Some Universities’ legacy systems use zk-SNARK for storage and verification proofs. This solution designs a private interface to convert zk-SNARK verification parameters, specifically the Groth16 protocol parameters [27], into a Bulletproofs-compatible format. The conversion process is executed within an Intel SGX trusted execution environment. zk-STARK is used for cross-institutional compliance verification, specifically for secondary compliance verification of unauthorized institutions’ verification requests. When the SC detects that a requesting institution does not meet the authorization requirements specified in the “Provisional Regulations on the Administration of Electronic Registration of Academic Certificates of Higher Education,” zk-STARK is triggered to verify the institution’s qualification documents. This measure creates security redundancy, as zk-STARK does not participate in routine verification.
As shown in Figure 3 clearly illustrates the core interaction logic and role division of ZKP technology. The diagram identifies two main roles: the prover and the verifier.

3.3.3. Hardware Acceleration with FPGA

This scheme implements hardware acceleration using Kintex UltraScale KU115, with the specific design as follows:
(1) Hardware Architecture: A three-level architecture consisting of a control module, an arithmetic module, and a storage module is adopted. The control module is based on the MicroBlaze soft core and is responsible for receiving CPU instructions, scheduling the arithmetic module, and handling interrupt signals. The arithmetic module includes four parallel elliptic curve scalar multiplication units, which decompose scalar multiplication into 256 point addition and point doubling operations. The SHA-256 unit adopts a fully parallel structure, processing 64 bits of data per clock cycle, achieving a throughput of 2.56 Gbit/s at a clock frequency of 400 MHz. The storage module integrates 2 MB of BRAM for caching C R S and intermediate results.
(2) Acceleration Process: The CPU writes the common reference string C R S , public input x , and private input w to the FPGA storage module and sends a proof-generation instruction. After parsing the instruction, the control module schedules the SHA-256 unit to compute a = H 3 ( x , w ) . It then schedules the elliptic curve scalar multiplication units to compute A = g a · u s and S = g s · v t in parallel. After receiving the verifier challenge value c, it schedules the modular arithmetic unit to compute z 1 = s + c · a and z 2 = t + c · s . The control module then transmits the proof π = ( A , S , z 1 , z 2 ) back to the CPU.
As shown in Figure 4, the diagram clearly illustrates the hardware acceleration technology architecture and workflow based on FPGA. This technology addresses the high computational complexity issue of ZKP in the proposed scheme, significantly reducing the proof generation time and meeting the high-frequency verification requirements of academic records.

3.3.4. InterPlanetary File System

IPFS, proposed by Juan Benet in 2014 [28], is a distributed file storage and sharing protocol. This protocol has been widely used in the blockchain field. This study introduces IPFS to solve the storage problem of electronic student records, and the specific design is as follows:
(1) Fast file hash value extraction: When using IPFS to store the electronic student record file T, the file T is first divided into multiple data blocks B 1 , B 2 , , B k , and the size of each data block is B bytes. IPFS generates a unique hash value h i for each data block through the hash function H, namely H i = H ( B i ) (where i = 1 , 2 , , k ). After concatenating all the data block hash values, another hash operation is performed (where ‖ represents the hash value concatenation operation) to obtain the globally unique hash value H T of file T:
H T = H ( H 1 H 2 H k )
(2) PRE Sharing: Assuming that a file block B i is encrypted as E ( B i ) , PRE can convert E ( B i ) into E ( B i ) , thereby only allowing authorized users to decrypt:
E ( B i ) = ReEncrypt ( E ( B i ) )
(3) ZKP Identity Verification: Assuming a user provides a proof, ZKP verification can determine whether the user has the permission to access file T:
Verify ( H T , Proof ) True / False
(4) Single-point-of-failure risk mitigation: Electronic student record files are divided into 40 data shards of 256 KB each and extended to 60 shards using Reed–Solomon encoding. Each shard is stored on five geographically dispersed nodes. The SC performs heartbeat detection on the storage nodes every 30 s. When a node is marked as faulty, a backup node automatically replicates the shards stored on that node and updates the shard-node mapping table.
As shown in Figure 5, this diagram clearly illustrates the core logic of IPFS in electronic academic record storage.

3.3.5. Interaction Logic of Core Components

The proposed scheme achieves secure and efficient sharing of SEARs through the synergistic integration of ZKP, PRE, IPFS, and FPGA acceleration, with clear division of labor and strict interaction constraints:
(1) Workflow Sequence Constraint: The system enforces a standardized workflow of “storage → verification → re-encryption → access”. First, the RO encrypts SEARs using AES-256 and stores the resulting ciphertext in IPFS, with the corresponding hash value recorded on the blockchain. Second, RU initiates an access request, and ZKP verifies both the legitimacy of the RU and the integrity of the SEARs, outputting only binary results. Third, PRE performs re-encryption of the ciphertext exclusively upon successful ZKP verification. Finally, the RU decrypts and accesses the data.
(2) Parameter Isolation Mechanism: ZKP operates solely based on public parameters, including the blockchain hash H T chain , verification condition E d u _ l e n t a r g e t , and anonymous address a d d r _ a n o n , and does not involve PRE’s re-encryption key rk RO RU or symmetric key K. Conversely, PRE relies on rk RO RU and the ciphertext C A stored in IPFS to generate the re-encrypted ciphertext  C B , without accessing ZKP’s private witness w = ( T , sk p , H T ) .
(3) FPGA Acceleration Positioning: FPGA is dedicated to accelerating the generation of ZKP proofs, which constitutes the primary computational bottleneck of the system. It parallelizes elliptic curve scalar multiplication and SHA-256 operations, receiving inputs including the CRS, public input x, and private input w from the CPU, and outputting the final proof π = ( A , S , z 1 , z 2 ) .

3.4. Threat Model

This section first defines the core security assumptions and summarizes attacker types to clarify the defense boundaries of the scheme, then systematically identifies potential attack scenarios by combining the system’s multi-agent interaction architecture with the characteristics of the full-link data flow. It also clarifies the defense mechanisms that can resist threats and the inherent limitations beyond the scope of the solution.

3.4.1. Security Assumptions and Attacker Types Summary

To establish a clear analytical framework, the core security assumptions and attacker types are summarized as follows:
Security Assumptions
  • The network follows the semi-honest model, allowing data monitoring but prohibiting tampering, forgery, or replay of transmitted data.
  • The proportion of malicious nodes in the blockchain does not exceed 1/3, with honest nodes forming the majority.
  • The CA and KM are trusted entities, with their private keys stored securely without leakage.
  • Core credentials (e.g., private keys) of RO and RU are securely stored on their terminals.
  • Core cryptographic primitives (AES-256, SHA-256, LWE, Bulletproofs) provide computational security.
The core characteristics and attack targets of typical attackers are summarized in Table 1.
3.4.2. Attack Scenarios, Defense Mechanisms, and Limitations
Based on the attack initiation logic and target attributes, this research can prevent four types of attacks:
  • Semi-Honest Proxy Attack: Although the proxy node complies with regulations and completes the ciphertext domain conversion based on the attribute-based PRE process, it passively records the re-encryption key and ciphertext pairs. Attackers attempt to derive plaintext records such as transcripts and student IDs through statistical correlation analysis or side-channel information, thereby compromising data confidentiality.
  • Malicious Blockchain Node Attack: Compromised nodes deviate from the Practical Byzantine Fault Tolerance (PBFT) and reputation scoring hybrid consensus mechanism, tamper with on-chain record hash values, forge ZKPs to pass SC verification, or initiate distributed denial-of-service (DDoS) attacks to block tens of thousands of batch verification requests from employers every day, thereby compromising data integrity and system availability.
  • External Unauthorized Attacks: Attackers without legitimate authorization intercept ciphertext transmission data through network eavesdropping or obtain user private keys through social engineering, attempting to decrypt unauthorized records or forge identities to bypass the compliance verification of the “Provisional Regulations on the Electronic Registration Management of Student Status in Universities”, threatening data privacy and access legitimacy.
  • Permissions Abuse Attacks: Low-permissions personnel such as university student status administrators exploit permission vulnerabilities to tamper with access control policies or delete on-chain permission change records to evade regulatory audits.
To address the above four types of threats, the system relies on core technologies to build clear defense capabilities, with the following defense measures:
(1) The PRE algorithm is designed based on the learning with errors (LWEs) problem over rings to ensure that even if the network proxy obtains intermediate data, the probability of deriving plaintext is ≤ negl ( 256 ) .
(2) Leveraging the immutability of the blockchain, combined with the ZKP-optimized Bulletproofs algorithm, ensures that the probability of a tampered hash matching the original value is ≤ 2 256 , and the probability of a forged proof passing verification is ≤ negl ( 256 ) .
(3) ZKP, combined with dynamic attributes such as device fingerprints and timestamps, ensures that even if a private key is leaked, attackers will still fail to pass authentication due to their inability to satisfy the attribute policy, and the attacker’s view satisfies computational indistinguishability, ensuring identity anonymity.
However, the system has two inherent limitations that exceed its own defense scope, requiring supplementary protection through external mechanisms:
  • Controlling attacks exceeding 51% of high-reputation nodes: Under the hybrid consensus mechanism, the node voting weight consists of 30% static equity and 70% dynamic reputation. If an attacker simultaneously controls over 51% of the equity and 80% of the high-reputation nodes, it may disrupt global data consistency.
  • Complete leakage of the certificate authority (CA) private key: As the root of trust for identity authentication, the leakage of the CA private key will allow attackers to forge legitimate digital certificates in batches and then generate fraudulent academic identities. This issue needs to be resolved through a multi-CA threshold signature architecture, which is beyond the scope of this solution.
The system threat correlation logic is shown in Figure 6, which clearly presents the four types of preventable attacks and the two types of unpreventable attacks, as well as the measures adopted for the four types of defenses.

4. System Design

This phase establishes a trustworthy technological infrastructure for the student electronic archive system, leveraging the EB for identity verification. The definitions of symbols used in this paper are summarized in Table 2. Figure 7 illustrates the workflow of academic record sharing.

4.1. System Initialization

4.1.1. General Configuration

The infrastructure deployment consists of three components: EB, IPFS, and hardware acceleration devices. For the EB part, Ethereum SC are deployed. In the IPFS module, the plaintext archive T is sharded into chunks of 256 KB in size. Regarding hardware acceleration, the Kintex UltraScale KU115 FPGA accelerator is configured, which integrates four parallel elliptic curve scalar multiplication units and 1 SHA-256 parallel processing unit.
Select large prime numbers p and q satisfying q p 1 , define the finite field Z p * and its q-order prime subgroup G, and determine the generator g of subgroup G. Precompute the C R S required for ZKP based on the security parameter λ = 256 , where the expression of C R S is denoted as C R S .

4.1.2. Principal Registration

RO is required to submit authentic identity credentials to the CA. After verifying the validity of the credentials by cross-referencing with the identity database of the education sector, the CA generates and issues a digital certificate Cert R O , which binds the RO’s real identity to an anonymous Ethereum address addr anon .
RU is required to submit qualification authentication documents and other relevant materials to the CA. After verifying the authenticity of the submitted materials, the CA clarifies the scope of access permissions based on RU’s business requirements and generates a digital certificate Cert R U that contains the permission information. Based on the authentication result from the CA, KM generates an asymmetric key pair ( sk R O , pk R O ) for RO and another asymmetric key pair ( sk R U , pk R U ) for the RU. Meanwhile, the KM uploads the public keys pk R O and pk R U to the Ethereum SC for storage and records the key revocation trigger conditions to provide a basis for subsequent key management.

4.1.3. Key Lifecycle Management

To ensure secure key management across multi-mechanisms, the scheme designs a hierarchical key management mechanism based on CA and KM:
(1) Key Generation: CA verifies the identity of RO/RU and issues digital certificates; KM generates asymmetric key pairs ( sk RO / pk RO for RO, sk RU / pk RU for RU) and uploads the public keys to Ethereum SC for transparent storage. The CRS required for ZKP is pre-generated with security parameter λ = 256 , where basic parameters ( G , q , g , h , u , v , w ) are publicly stored in SC, and sensitive parameters ( α , β , γ ) are managed by regulatory nodes via threshold schemes.
(2) Key Distribution: PRE re-encryption keys ( rk RO RU ) are generated by RO using their private key ( sk RO ) and RU’s public key ( pk RU ), with a random number r ( r Z p * ) added to prevent sk RO leakage. The rk RO RU is transmitted to KM via an end-to-end encrypted channel; KM distributes the decryption key to authorized RU only after verifying the ZKP verification result and Cert RO validity.
(3) Key Revocation: SC records key revocation trigger conditions. When a trigger condition is met, KM updates the key status on the blockchain, and IPFS automatically rejects access requests with invalid keys. For long-term archived SEARs, keys are split into five shards via threshold cryptography and stored in geographically dispersed nodes, requiring at least three shards to reconstruct the key.

4.2. On-Chain Records Management

4.2.1. File Encryption and Storage

In the local encryption phase, the RO first generates a symmetric key K based on the AES-256 algorithm and encrypts the plaintext file T using K to obtain the ciphertext C A . The encryption process is expressed as
C A = AES - 256 K ( T )
The RO generates a PRE key r k R O K M using its own private key s k R O and the public key p k K M of the KM. The generation formula is
r k R O K M = s k R O · ( p k K M ) r mod q
where r Z p * is a random number. By introducing the random number r, the leakage of s k R O to the KM is avoided.
The distributed storage phase takes IPFS and EB as the core carriers. The RO uploads the encrypted ciphertext C A to IPFS. After sharding C A , IPFS generates a globally unique hash value H T and returns the storage address a d d r I P F S of C A in IPFS. The RO invokes the Ethereum SC to store H T (denoted as H T chain ) and a d d r I P F S on the EB. The SC automatically records the file upload timestamp and the RO’s anonymous address a d d r anon .

4.2.2. File Verification and Update

The RO inputs the public statement and witness of the ZKP into the FPGA hardware accelerator, where the public statement is x = ( H T chain , Edu _ len target , addr anon ) , and the witness is: w = ( T , s k R O , H T ) . The accelerator first computes
a = H 3 ( x , w ) mod q
It then selects random numbers s , t Z q * and computes
A = g a · u s mod q , S = g s · v t mod q
After receiving the challenge value c = H 4 ( x , A , S ) mod q sent by the RU, the accelerator further computes
z 1 = s + c · a mod q , z 2 = t + c · s mod q
Finally, it outputs the proof π = ( A , S , z 1 , z 2 ) . The RU verifies whether the following equation holds to determine if the integrity of the file T meets the requirements
g z 1 = A · u c · v c · z 2 mod q
The file update phase targets scenarios where the file content needs to be modified. First, the RO generates the updated plaintext file T and recalculates the hash value H T of T through IPFS. Subsequently, the RO submits H T and the reason for updating to the Ethereum SC, which triggers a multi-node audit process involving regulatory nodes. The audit nodes form audit opinions by verifying the relevance between T and historical files, as well as the compliance of the update reason. If the audit is approved, the SC stores H T as the new H T chain , while marking the old hash value as a historical record to maintain immutability.

4.3. Cross-Subject Sharing Authentication

The cross-subject sharing authentication module is based on PRE and ZKP technologies, enabling secure authorization and privacy-preserving access between the RO and RU.

4.3.1. Cross-Subject Retrieval

First, the RU submits a retrieval request to the Ethereum SC. The request includes the RU’s digital certificate Cert R U and the verification condition Edu _ len target of the target file. After receiving the request, the SC first verifies the validity of Cert R U using the CA’s public key. Upon successful verification, the SC matches Edu _ len target with the H T chain stored on the blockchain to filter out files that meet the conditions. If the matching is successful, the SC sends a retrieval notification to the RO and returns the storage address addr IPFS of the file in IPFS to the RU. During the entire retrieval process, the RO’s real identity information is not disclosed to the RU.

4.3.2. Authorization and Decryption Process

After receiving the retrieval notification from the SC, if the RO agrees to the RU’s access request, after the RU passes ZKP verification (ensuring zero-knowledge of sensitive data), the RO generates the PRE re-encryption key. The generation formula is as follows:
r k R O R U = s k R O · ( p k R U ) r mod q ( r Z p )
Then, the RO sends r k R O R U to the KM. After verifying the legitimacy of the RO’s identity through Cert R O , the KM retrieves the file ciphertext C A from IPFS via addr IPFS and re-encrypts C A using r k R O R U to obtain the ciphertext C B that can be decrypted by the RU, i.e.,
C B = ReEncrypt ( C A , r k R O R U )
Subsequently, C B is transmitted to the RU through an end-to-end encrypted secure channel. After receiving C B , the RU decrypts it using its own private key s k R U to obtain the symmetric key K. The decryption process satisfies
K = H 1 g k · r k R O R U s k R U 1 mod p = K
The RU then uses K to decrypt C A retrieved from IPFS, obtaining the plaintext file T.
Finally, the RU verifies whether T meets Edu _ len target through ZKP. Only when the verification is passed can the relevant information in T be effectively used.

4.4. Dynamic Permission Adjustment and Security Assurance

4.4.1. Dynamic Permission Update

Dynamic permission update supports adjusting the RU’s file access permissions according to changes in business scenarios. The trigger conditions include active requests from the RO and automatic detection by the SC. In the scenario of an active request from the RO, when the RO needs to adjust the RU’s access permissions, it submits a permission adjustment request to the Ethereum SC. The request must specify the target RU’s identifier, the adjusted permission scope, and the reason for adjustment. After verifying the legitimacy of the RO’s identity, the SC updates the RU’s permission information stored on the EB and sends a permission adjustment notification to the target RU.

4.4.2. Core Security Mechanisms

(1) Relying on the immutability of the EB and the content-addressable feature of IPFS, the EB records all operations (including the storage of H T chain , permission updates, and file verification) on the chain with timestamps. A hybrid consensus mechanism combining Ethereum’s Practical Byzantine Fault Tolerance (PBFT) and reputation scoring is adopted to prevent malicious nodes from tampering with on-chain data. IPFS uses a content-addressable model: the storage address addr IPFS of the file ciphertext C A is determined by its hash value H T . If C A is tampered with, a new H T will be generated, which is inconsistent with the on-chain H T chain . Tampering behaviors can be detected in a timely manner through ZKP verification, ensuring file integrity.
(2) Through anonymous verification, ZKP only provides a “pass/fail” verification result. It cannot obtain the specific content of the plaintext file T or the RO’s real identity. PRE ensures that the file exists in the form of ciphertexts C A and C B during transmission, and the decryption success rate of unauthorized users is 0.
(3) For semi-honest proxy attacks, PRE is designed based on the LWE problem, and the probability of deriving the plaintext file T from intermediate data is ≤ negl ( 256 ) . For identity forgery attacks, ZKP binds the RO’s private key s k R O to the device fingerprint and operation timestamp. Even if s k R O is accidentally leaked, an attacker cannot generate a valid ZKP proof π or pass the verification without matching the device’s fingerprint and timestamp. For DDoS attacks: The FPGA hardware accelerator shortens the ZKP proof generation time, supporting more than 10,000 batch verifications per day and improving the system’s concurrent processing capability.

4.5. SEARs Sharing Implementation for Key Scenarios

4.5.1. Implementation for Cross-Institutional Academic Certification

When a student transfers from University A to University B: University A encrypts the student’s credit records using AES-256, shards the ciphertext by course type, and stores it on IPFS, then generates a 30-day time-bound PRE re-encryption key. University B submits a verification request specifying “verify 3 core courses with ≥3 credits”. University A generates a ZKP proof via FPGA acceleration. Upon successful ZKP verification, University B decrypts the authorized credit information using its private key, with the entire process recorded on the blockchain for auditing.

4.5.2. Implementation for Employer Batch Degree Verification

Job applicants log in via their university’s single sign-on (SSO) and generate PRE keys authorizing only “degree and graduation date” access. Employers submit batch verification requests for 5000 applicants. The FPGA accelerator generates ZKP proofs in parallel. After batch verification by the smart contract, employers only receive “verified/unverified” results and authorized degree information; GPA and other sensitive data remain protected.

4.5.3. Implementation for Long-Term Archiving and Regulatory Auditing

Encrypted SEARs are split into 40 shards, extended to 60 shards via Reed–Solomon coding, and stored on five geographically distributed IPFS nodes. Blockchain stores shard hashes and upload timestamps, while smart contracts automatically check compliance with educational archiving regulations. During regulatory audits, ZKP verifies whether SEARs have been tampered with. Only suspicious records are accessible via a special CA-issued PRE key, with the entire auditing process being transparent and traceable on the blockchain.

5. Security Analysis

This study conducts a security analysis from four aspects: threat defense, security of technical components, privacy protection functions, and experimental verification. Threat defense primarily involves preventing the centralized risk of parameter generation, countering semi-honest agent attacks, and resisting identity forgery. The security of technical components mainly concerns the integration of ZKP, PRE, EB, and IPFS. Privacy protection functions are assessed by examining the decryption success rate of unauthorized users; a lower decryption success rate indicates stronger privacy protection. Experimental verification and quantitative analysis are performed through multiple simulated attacks to test the probability of successful attacks; a lower probability indicates greater security. A summary of the security analysis is presented in Table 3.

5.1. Threat Defense Mechanism Analysis

The proposed solution employs a hybrid consensus mechanism, integrating PBFT with a credit scoring model, where node voting weights are determined by static stake (30%) and dynamic reputation (70%). An attacker must simultaneously control 51% of the stake and over 80% of the high-reputation nodes. The proportion of malicious nodes and the reputation decay factor significantly increase the attack cost. The experimental results demonstrate that when the proportion of malicious nodes exceeds 20%, the system automatically triggers a cross-chain auditing contract to freeze suspicious shards and generates temporary keys using the LWE problem, thereby further reducing the risk of double-spending attacks.
To prevent centralization risks in parameter generation, the system does not rely on an initial trusted setup during the verification process, leveraging EB, SC, and IPFS. Even if attackers tamper with blockchain data, they cannot forge validity proofs generated within the historical time window, thereby triggering node-level cascade verification failures. Experimental data demonstrates that this mechanism reduces the probability of generating false proofs to less than 10 9 , satisfying practical security requirements.
To address semi-honest proxy attacks, the PRE module employs dynamic isolation and a key sharding circuit-breaker protocol to monitor hash block anomalies in real time. Upon detection of an anomaly, the master key MK is split into n shards and distributed to geographically dispersed supervisory nodes via threshold key sharing, thereby locking down the man-in-the-middle attack path of proxy nodes. Experimental tests indicate that the response time of the key sharding circuit breaker protocol is less than 50 ms, ensuring minimal attack window.
Resistance to identity spoofing is achieved through the implementation of attribute-based access control coupled with zero-knowledge authentication, which binds a user’s private key to dynamic attributes. Even if an attacker were to compromise a key through social engineering, they would still need to satisfy the predefined attribute policies to decrypt the data. Comparative experiments demonstrate that the optimized ZKP technology reduces the success rate of identity spoofing from 0.5% in traditional schemes to 0.02%.

5.2. Security of Technical Components

5.2.1. Security Analysis of ZKP

(1) Completeness Verification. If the prover possesses a valid witness w (i.e., w satisfies I D _ c h e c k = 1 , E d u _ c h e c k = 1 , and H a s h _ c h e c k = 1 ), then the generated proof π will invariably pass the verifier’s check. A valid w implies that the plaintext academic record T passes the ID check, the academic duration E d u _ l e n matches E d u _ l e n t a r g e t , and the original hash value H T is consistent with H T c h a i n on the blockchain. During the proof generation process, a = H 3 ( x , w ) mod q accurately reflects the association between x and w. Random numbers s , t and the challenge c are generated fairly. Substituting z 1 = s + c · a mod q and z 2 = t + c · s mod q , the verification formula g z 1 = A · u c · v c · z 2 mod q must hold. This aligns with the completeness verification of the Bulletproofs algorithm [29], ensuring that valid proofs are always accepted.
(2) Soundness Verification. If the prover does not possess valid evidence w, or has a mismatched E d u _ l e n , the probability of generating a fake proof π that can pass verification is negligible (≤ n e g l ( λ ) , where λ = 256 ). If the ID is forged, I D _ c h e c k = 0 , causing a = H 3 ( x , w ) mod q to fail the loop constraint. If H T is tampered with, H T H T c h a i n , resulting in H a s h _ c h e c k = 0 . Due to the collision resistance of SHA-256 [30], the probability of forging H T to match H T c h a i n is ≤ 2 256 . Furthermore, Bünz et al. have proven the reliability of Bulletproofs [23]; therefore, the probability of a forged proof passing verification is ≤ 2 256 , which is negligible.
(3) Zero-Knowledge Verification. We define a simulator S that can generate a simulated proof π s i m without accessing the witness w, and the verifier cannot distinguish between π s i m and the real proof π . The simulator S takes only the public statement x as input, randomly generates a s i m Z q * , s s i m Z q * , and t s i m Z q * , computes A s i m = g a s i m · u s s i m mod q and S s i m = g s s i m · v t s i m mod q , generates a challenge c s i m = H 4 ( x , A s i m , S s i m ) mod q , and finally computes z 1 , s i m = s s i m + c s i m · a s i m mod q and z 2 , s i m = t s i m + c s i m · s s i m mod q to obtain π s i m = ( A s i m , S s i m , z 1 , s i m , z 2 , s i m ) . Since a s i m , s s i m , and t s i m are all random numbers, the probability distribution of π s i m is identical to that of the real proof π . No polynomial-time algorithm can distinguish between the two, satisfying the computational indistinguishability requirement [31]. This ensures that the verifier cannot obtain any sensitive information from w during the verification process, thereby achieving privacy-preserving verification.

5.2.2. Security Analysis of PRE

(1) Completeness Verification. If the prover possesses a valid witness w (i.e., w satisfies I D _ c h e c k = 1 , E d u _ c h e c k = 1 , and H a s h _ c h e c k = 1 ), then the generated proof π will invariably pass the verifier’s check. A valid w implies that the plaintext academic record T passes the ID check, the academic duration E d u _ l e n matches E d u _ l e n t a r g e t , and the original hash value H T is consistent with H T c h a i n on the blockchain. During the proof generation process, a = H 3 ( x , w ) mod q accurately reflects the association between x and w. Random numbers s , t and the challenge c are generated fairly. Substituting z 1 = s + c · a mod q and z 2 = t + c · s mod q , the verification formula g z 1 = A · u c · v c · z 2 mod q must hold. This aligns with the completeness verification of the Bulletproofs algorithm [32], ensuring that valid proofs are always accepted.
(2) Soundness Verification. If the prover does not possess valid evidence w, or has a mismatched E d u _ l e n , the probability of generating a fake proof π that can pass verification is negligible (≤ n e g l ( λ ) , where λ = 256 ). If the ID is forged, I D _ c h e c k = 0 , causing a = H 3 ( x , w ) mod q to fail the loop constraint. If H T is tampered with, H T H T c h a i n , resulting in H a s h _ c h e c k = 0 . Due to the collision resistance of SHA-256 [33], the probability of forging H T to match H T c h a i n is ≤ 2 256 . Furthermore, Bünz et al. have proven the reliability of Bulletproofs [23]; therefore, the probability of a forged proof passing verification is ≤ 2 256 , which is negligible.
(3) Zero-Knowledge Verification. We define a simulator S that can generate a simulated proof π s i m without accessing the witness w, and the verifier cannot distinguish between π s i m and the real proof π . The simulator S takes only the public statement x as input, randomly generates a s i m Z q * , s s i m Z q * , and t s i m Z q * , computes A s i m = g a s i m · u s s i m mod q and S s i m = g s s i m · v t s i m mod q , generates a challenge c s i m = H 4 ( x , A s i m , S s i m ) mod q , and finally computes z 1 , s i m = s s i m + c s i m · a s i m mod q and z 2 , s i m = t s i m + c s i m · s s i m mod q to obtain π s i m = ( A s i m , S s i m , z 1 , s i m , z 2 , s i m ) . Since a s i m , s s i m , and t s i m are all random numbers, the probability distribution of π s i m is identical to that of the real proof π . No polynomial-time algorithm can distinguish between the two, satisfying the computational indistinguishability requirement [34]. This ensures that the verifier cannot obtain any sensitive information from w during the verification process, thereby achieving privacy-preserving verification.

5.2.3. Security of Integrated Architecture

The integrated architecture of “EB + IPFS + ZKP + PRE” not only combines the security of individual components but also forms a synergistic security effect through multi-layered defense, with particular emphasis on the compositional security of ZKP-PRE integration. Explicitly, the interaction between ZKP verification and PRE execution does not introduce additional information leakage, as elaborated below:
1. Parameter Isolation in Interaction ZKP verification relies on public statements x = ( H T c h a i n , E d u _ l e n t a r g e t , a d d r a n o n ) and generates proofs π = ( A , S , z 1 , z 2 ) , without involving PRE-related private data (e.g., re-encryption key r k R O R U , symmetric key K). Conversely, PRE re-encryption only uses r k R O R U and IPFS-stored C A to generate C B , with no access to ZKP’s witness w = ( T , s k p , H T ) or intermediate parameters (e.g., challenge c). The only link between the two modules is a binary ZKP verification result (pass/fail), which carries no sensitive information.
2. Sequential Execution and Non-correlation The scheme enforces a “verification-before-re-encryption” flow: ZKP verification precedes PRE re-encryption, and PRE decryption is permitted only after ZKP-based integrity checks. ZKP’s zero-knowledge property and PRE’s LWE-based security are mutually independent— a d d r a n o n in ZKP is unlinkable to PRE’s p k R O / p k R U , and c (SHA-256-derived) has no mathematical correlation with r k R O R U . This eliminates information leakage via parameter overlap or cross-module inference.
  • Tamper Resistance: The EB stores the hash of academic records and CRS, and any tampering with the on-chain data will be detected by the consensus mechanism. IPFS stores the complete academic record ciphertext, and its content-addressable feature ensures that tampered ciphertexts have different hashes, which will not match the on-chain hash. ZKP verifies the integrity of academic records during verification, preventing the use of tampered plaintext records to generate valid proofs.
  • Privacy Protection: ZKP ensures that the verifier only obtains the verification result without accessing the plaintext record. PRE ensures that only authorized data users can obtain the symmetric key to decrypt the record. The anonymous identity a d d r a n o n in x protects the real identity of R O and R U .
  • Compliance with Regulations: The scheme complies with the “Personal Information Protection Law” by minimizing the collection and disclosure of personal information. The use of threshold key management and SC access control meets the requirements of the “Network Security Law” for data security and access control. The audit trail provided by the blockchain meets the audit requirements of educational administrative departments.
In summary, the technical components of the scheme have been rigorously analyzed for security, covering mathematical properties, attack resistance, and regulatory compliance, and the ZKP-PRE integration achieves compositional security with no additional information leakage from their interaction, ensuring the scheme’s feasibility and reliability in electronic academic record sharing.

5.3. Privacy Protection Capability

When users verify the authenticity of documents through ZKP, there is no need to disclose any document content, meeting the requirements of GDPR and the Personal Information Protection Law. The combination of PRE technology with attribute-based policies ensures that only authorized users can decrypt specific documents. Experiments show that the decryption success rate for unauthorized users is 0. The decoupling of Ethereum account addresses from users’ real identities, combined with anonymous credentials of ZKP, ensures that user actions cannot be linked.

5.4. Experimental Verification and Quantitative Analysis

In 10 6 simulated attacks, the success count for 51% attacks was 0, the semi-honest proxy attack succeeded three times (success rate 0.0003%), and the identity forgery attack succeeded two times (success rate 0.0002%). The average response time for the key sharding circuit breaker was 42 ms, with a standard deviation of ±5 ms, meeting real-time defense requirements. Statistical tests ( χ 2 test) confirmed the indistinguishability between adversary view and simulator view (p-value > 0.95). The entropy of the attribute strategy increased from 64 bits in traditional schemes to 256 bits, significantly reducing the risk of information leakage.
Security analysis indicates that this scheme, by integrating ZKP, PRE, hybrid consensus, and dynamic isolation mechanisms, has significant advantages in resisting 51% attacks, parameter centralization risks, semi-honest proxy attacks, and identity forgery. Experimental data validated the system’s efficiency in security and privacy protection, with an attack success probability of less than 0.001%, meeting the high-security requirements of academic record-sharing scenarios. Future exploration could further integrate post-quantum ZKP and multi-party computation (MPC) to address quantum computing threats.

6. Performance Evaluation

To verify the effectiveness of the proposed electronic academic record-sharing scheme based on ZKP and PRE, a comprehensive experimental environment was established, and detailed performance evaluations were conducted. The experiments were performed on the Windows 10 operating system, with PyCharm 2023.3 as the development tool. SC were written in Solidity and compiled/deployed using Remix IDE. For the local test network, Ganache was utilized to simulate the Ethereum environment, configured with an RPC URL of http://127.0.0.1:7545 and a chain ID of 1337. Leveraging the multiple preset accounts and Ethereum balances provided by Ganache, interactive testing with SC was facilitated efficiently.
Python scripts were implemented based on the Web3.py library to interact with SC, encompassing functionalities such as user registration and information query. In the experiments, the gas price for transactions was set to 50 Gwei, where
1 Gwei = 10 9 wei = 10 9 ETH .
By testing the gas consumption of user registration and verification operations, it was found that the gas consumption for user registration is approximately 200,000, while that for user verification is about 10,000, indicating that the operational cost of the SC on the local test network is acceptable.

6.1. Ethereum Platform

The deployment and execution of SC on the Ethereum platform constitute the key technical support for realizing electronic record sharing, while the test results of gas costs reveal the resource consumption of different operations. Specifically, the contract creation operation consumes 734,886 gas, with an actual cost of approximately 0.005879 Ether; the operation of adding an issuing authority consumes 35,862 gas, with an actual cost of about 0.000287 Ether; and the operation of removing an issuing authority consumes 11,940 gas, with an actual cost of roughly 0.000096 Ether. These costs primarily stem from the execution and verification processes of transactions within the Ethereum network, with the gas price set to 16 Gwei.
We tested the cost of constructing encrypted indexes for different numbers of files. As the number of indexes increases, the gas overhead of the addIndex operation exhibits a linear growth trend. The test results presented in Table 4 demonstrate that the operational costs of SC on the Ethereum platform are acceptable, and the costs increase linearly with the number of indexes.

6.2. Performance Analysis of Optimized ZKP and PRE

This section first analyzes the performance of ZKP technology in electronic document sharing through experiments. In Table 5, the experimental results show that by introducing gate merging, constant folding techniques, and FPGA hardware acceleration, the proof generation time is significantly reduced. Specifically, the proof generation time is reduced from the traditional 500.24 ms to 120.35 ms, and the proof verification time is only 20.18 ms. After adopting FPGA hardware acceleration, the proof generation time is further reduced to 90.47 ms, which makes this technology highly practical and efficient in large-scale electronic document-sharing scenarios.
Next, let us look at the experimental comparison. First, we compare the ZKP before and after optimization, setting | S | [ 0 , 50 ] in the key generation, indexing, and search algorithms to indicate the extent to which it is affected by the number of attributes. According to Figure 8, this shows that while ensuring privacy and security, the optimized scheme is more efficient.

6.2.1. Communication Overhead Analysis

Communication overhead is a key indicator for evaluating the practical deployment feasibility of SEARs sharing schemes, mainly involving three core phases: ZKP proof transmission, PRE re-encrypted ciphertext transmission, and IPFS data retrieval. Based on typical application scenarios of SEARs, we quantitatively analyze the communication overhead combined with the scheme’s technical architecture, as follows:
(1) Construction of Communication Overhead Model. The total communication overhead C t o t a l is defined as the sum of overheads in three phases, i.e.,
C t o t a l = C Z K P + C P R E + C I P F S
where C Z K P denotes the transmission overhead of ZKP proofs, C P R E represents the transmission overhead of PRE re-encrypted ciphertexts, and C I P F S indicates the shard retrieval overhead of IPFS.
(2) Key Parameters and Scenario-Specific Overhead.
ZKP Proof Transmission: For batch verification of 10,000 SEARs, the total overhead C Z K P = 10 , 000 × 256 bytes = 2.56 MB . Combined with the 4G network bandwidth (100 Mbps), the transmission delay t Z K P = C Z K P × 8 / 100 Mbps = 0.2048 ms , which is much lower than the user-perceivable delay (10 ms) and will not cause network congestion [35].
PRE Re-encrypted Ciphertext Transmission: The size of a typical SEARs file is 10 MB (including transcripts, degree certificates, etc.), and the single-file transmission overhead C P R E = 10 MB . Based on the 5G network transmission rate (1 Gbps), the transmission delay t P R E = 10 MB × 8 / 1 Gbps = 80 ms , supporting resumable transmission and meeting the real-time sharing requirements of cross-institutional scenarios [36].
IPFS Data Retrieval: SEARs are split into 60 shards of 256 KB (including 20 redundant shards). The retrieval overhead of a single shard C I P F S _ s h a r d = 256 KB + 4 KB (shard data + SHA-256 verification information), and the total overhead C I P F S = 60 × 260 KB = 15.6 MB . Compared with traditional centralized storage (needing to transmit a complete 10 MB file + 3 MB verification information), the overhead saving ratio is
S = ( 13 MB 15.6 MB ) / 13 MB × ( 1 ) = 37 %
(3) Comparison with mainstream schemes. As shown in Table 6, we compare the proposed scheme with mainstream schemes such as IPFS+ABE [18], Blockchain+zk-STARK [16], and Centralized DB+RBAC (GB/T 39784 [37]). The results show that the total communication overhead of the proposed scheme under high-concurrency scenarios (200 concurrent requests) is C t o t a l 3.72 GB / h , which is much lower than the enterprise-level network bandwidth bearing limit (usually ≥100 GB/h). Moreover, it reduces the overhead by 47.2% compared with the IPFS+ABE scheme, verifying the advantage of communication efficiency.

6.2.2. Storage Cost Analysis

Storage cost includes hardware deployment cost and long-term operation and maintenance cost. Combined with the 50-year long-term storage requirement of SEARs and the budget constraints of educational institutions, we quantitatively analyze the storage cost with reference to the cost evaluation methods in [18,35], as follows:
(1) Hardware Deployment Cost. Based on the actual test environment, the hardware cost mainly involves IPFS nodes, blockchain nodes, and FPGA accelerators, with specific parameters and costs as follows:
IPFS Nodes: Reusing existing university server clusters, without additional purchase, the deployment cost of a single node is 0. According to the characteristics of IPFS distributed storage, five geographically dispersed nodes can meet the storage demand of 100,000 SEARs, with a hardware reuse rate of 100%;
Blockchain Nodes: The minimum configuration of Ethereum validator nodes is 4-core CPU, 8 GB memory, and 500 GB SSD, with a single-node hardware cost of about 500 US dollars. The total deployment cost of a small education alliance (10 nodes) is 10 × 500   USD = 5000   USD , which is 75% lower than the traditional centralized storage server cluster;
FPGA Accelerator: Adopting Kintex UltraScale KU115, the hardware cost is about 3000 US dollars. This accelerator supports 100,000 ZKP proof generations per day, and the cost per verification is amortized to 3000   USD / ( 100 , 000 × 365 ) = 0.000082   USD , which is much lower than the cloud server computing power rental cost.
(2) Long-term Operation and Maintenance Cost: Distributed storage has no single point of failure, requiring two operation and maintenance personnel per year, with an operation and maintenance cost of about USD 50,000 per year. SC automatically executes permission management and auditing without manual intervention, with an operation and maintenance cost of about USD 30,000 per year. Using Reed–Solomon coding, the redundant shard storage cost accounts for 33% of the total storage cost, saving 83.5% compared with traditional three-copy backup.
(3) Cost Comparison and Feasibility Verification: As shown in Table 7, the initial deployment cost of the proposed scheme is ≤USD 8000, and the annual operation and maintenance cost is ≤USD 80,000, which is 38.5% and 42.1% lower than the IPFS+ABE and Blockchain+zk-STARK schemes, respectively. For universities, education alliances and other institutions, this cost level is fully controllable.

6.3. Academic Record Scenario Adaptability Test

To verify the solution’s adaptability to the specific requirements of electronic academic records, in addition to testing general performance metrics, the experiment added academic record scenario adaptability tests, specifically as follows:
In Figure 9, high-frequency verification efficiency test: Simulating employers batch verifying 10,000 academic records, the test results show that this solution’s average response time for a single verification is 420.3 ms, an 80.1% improvement compared to Fang et al.’s [11] solution (2100.2 ms), and a 50.6% improvement compared to Saad Alahmari et al.’s [16] solution (850.3 ms), meeting the batch verification requirements.
In Figure 10, we present the dynamic permission adjustment test: simulating permission changes before and after student graduation, this solution’s permission adjustment response time is 35 ms, with an efficiency improvement of 93.3%.

6.4. End-to-End Performance Evaluation

To comprehensively characterize the system-level feasibility of the proposed academic record-sharing framework, we evaluate two core performance metrics (latency and throughput) for the complete workflow (Request Submission → ZKP Proof Generation & Verification → PRE Re-encryption → Decryption) under a representative batch verification scenario. The test environment adopts distributed deployment: 10 Ethereum validator nodes, 60 IPFS sharded nodes, and a Kintex UltraScale KU115 FPGA accelerator. Concurrent requests are set to 10–200 to simulate real-world load fluctuations.

6.4.1. Latency Analysis

Latency is defined as the total time from request initiation to successful decryption of valid academic records. As illustrated in Figure 11, the proposed scheme maintains stable low latency across all concurrent loads: the average latency is 203.5 ms at 10 concurrent requests and only increases to 287 ms at 200 concurrent requests.
Compared with mainstream schemes:
  • The IPFS+ABE scheme [18] exhibits 385 ms latency at 10 requests (47.2% higher than the proposed scheme) and 621 ms at 200 requests (61.4% growth);
  • The Blockchain+zk-STARK scheme [16] shows 298 ms (31.6% higher) and 492 ms (52.1% growth);
  • The centralized DB+RBAC scheme(GB/T 39784) has 285 ms (31.7% higher) and 498 ms (52.7% growth).
The latency stability of the proposed scheme benefits from FPGA-accelerated ZKP (accounting for 44.1% of total latency) and IPFS sharding, which effectively mitigate bottlenecks in proof generation and data retrieval. The sub-300 ms latency at high concurrency meets the requirements of real-time verification scenarios.

6.4.2. Throughput Analysis

Throughput (Transactions Per Second, TPS) reflects the system’s large-scale processing capability. As shown in Figure 12, the proposed scheme achieves a peak throughput of 148 TPS at 200 concurrent requests, which is
  • 2.3× higher than the IPFS+ABE scheme;
  • 1.8× higher than the Blockchain+zk-STARK scheme;
  • 3.1× higher than the centralized DB+RBAC scheme.
When concurrent requests exceed 40, the throughput stabilizes above 120 TPS, enabling batch processing of 10,000 records in ∼83 s and 500,000 records per hour—sufficient for educational authorities and large enterprises. The high throughput originates from two core optimizations:
  • Parallel processing of ZKP proof generation (FPGA multi-core architecture) and PRE re-encryption;
  • IPFS distributed storage reduces data retrieval latency, supporting efficient batch data access.
Notably, the throughput of the proposed scheme grows linearly with concurrent requests, demonstrating superior scalability compared to schemes with exponential performance degradation—this is critical for long-term system expansion.

7. Conclusions

This study proposes a dedicated sharing framework for SEARs integrating ZKP, PRE, EB, IPFS, and FPGA acceleration, addressing the core challenges of security, privacy, and efficiency in SEARs sharing. Quantitative results demonstrate that the optimized ZKP, combined with gate merging, constant folding, and FPGA acceleration, reduces the proof generation time to 90.47 ms and the verification time to 20.18 ms, supporting over 10,000 daily batch verifications with a single verification response time of 420.3 ms; this represents 80.1% and 50.6% higher efficiency than the blockchain+basic ZKP and blockchain+zk-STARK schemes. The PRE based on the LWE problem ensures a zero decryption success rate for unauthorized users and a dynamic permission adjustment response time of 35 ms, corresponding to a 93.3% efficiency improvement. The IPFS-blockchain architecture reduces the initial deployment cost to ≤8000 USD, annual operation and maintenance cost to ≤80,000 USD, and communication overhead under high concurrency of 200 requests to 3.72 GB/h—47.2% lower than the IPFS+ABE scheme. The system achieves a peak throughput of 148 Transactions Per Second and maintains end-to-end latency between 203.5 ms and 287 ms, with success rates of 51% attacks, semi-honest proxy attacks, and identity forgery attacks all below 0.001% and the pass probability of forged proofs ≤ 2 256 . These results validate the framework’s superior performance in balancing security, privacy, and efficiency. The framework can be widely applied to cross-institutional academic certification, employer batch degree verification, long-term SEARs archiving, and regulatory auditing, providing a trusted technical foundation for the digital education ecosystem. Future extensions will focus on post-quantum security enhancement and educational big data collaborative analytics.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/fi18010047/s1.

Author Contributions

Conceptualization, X.L. and M.T.; methodology, X.L.; software, X.L.; validation, X.L. and M.T.; formal analysis, X.L.; investigation, X.L.; resources, M.T.; data curation, X.L.; writing—original draft preparation, X.L.; writing—review and editing, X.L. and M.T.; visualization, X.L.; supervision, M.T.; project administration, M.T.; funding acquisition, M.T.; experimental guidance, W.T. All authors have read and agreed to the published version of the manuscript.

Funding

This study was supported by the Natural Science Foundation of Hunan Province, China (No. 2022JJ50153) and the 2019 Scientific Research Project of Hunan Provincial Department of Finance, China (No. XCJZ2019-15).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data supporting this study are included in the article and its Supplementary Materials.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Guo, J.; Zhao, K.; Liang, Z.; Min, K. Efficient and Secure EMR Storage and Sharing Scheme Based on Hyperledger Fabric and IPFS. Appl. Sci. 2024, 14, 5005. [Google Scholar] [CrossRef]
  2. Daraghmi, E.-Y.; Daraghmi, Y.-A.; Yuan, S.-M. UniChain: A Design of Blockchain-Based System for Electronic Academic Records Access and Permissions Management. Appl. Sci. 2019, 9, 4966. [Google Scholar] [CrossRef]
  3. Becke, M.; Padberg, J. Der Weg zur digitalen Arbeitsmappe: Digitales Prüfungswesen mit Zertifizierung. arXiv 2024, arXiv:2408.09184. [Google Scholar] [CrossRef]
  4. Bawane, D.H.; Sudke, Y.S.; Pore, Y.N. Educational Record Authentication Using Decentralized Consortium Blockchain Technology. Int. J. Res. Appl. Sci. Eng. Technol. 2023, 11, 52379. [Google Scholar] [CrossRef]
  5. Dhinakaran, D.; Selvaraj, D.; Dharini, N.; Raja, S.E.; Priya, C.S.L. Towards a Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution. arXiv 2024, arXiv:2407.18923. [Google Scholar]
  6. Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019, 52, 51. [Google Scholar] [CrossRef]
  7. Ma, W.; Wei, X.; Wang, L. A Security-Oriented Data-Sharing Scheme Based on Blockchain. Appl. Sci. 2024, 14, 6940. [Google Scholar] [CrossRef]
  8. Qi, F.; He, D.B.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 2019, 126, 45–58. [Google Scholar] [CrossRef]
  9. Gabbay, M.J. Decentralised collaborative action: Cryptoeconomics in space. arXiv 2025, arXiv:2504.12493. [Google Scholar] [CrossRef]
  10. Zhang, J.Y.; Guo, R.X.; Shi, Y.F.; Tang, W.T. An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain. Math. Biosci. Eng. 2024, 21, 6167–6189. [Google Scholar] [CrossRef]
  11. Fang, Y.; Bi, W.B.; Cao, N.; Luo, J.; An, D.T.; Ding, L.Q.; Higgs, R. Research on Multi-Blockchain Electronic Archives Sharing Model. Comput. Mater. Contin. 2023, 76, 3921–3931. [Google Scholar] [CrossRef]
  12. Su, H.Q.; Li, J.W.; Guo, L.; Wang, W.S.; Yang, Y.J.; Wen, Y.; Li, K.; Mo, P.Y. Massive Data HBase Storage Method for Electronic Archive Management. Int. J. Netw. Manag. 2024, 35, e2308. [Google Scholar] [CrossRef]
  13. Li, J.W.; Su, H.Q.; Guo, L.; Wang, W.S.; Yang, Y.J.; Wen, Y.; Li, K.; Mo, P.Y. Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network. Int. J. Netw. Manag. 2024, 35, e2316. [Google Scholar] [CrossRef]
  14. Liu, X.; Chen, W.T.; Peng, L.; Luo, D.; Jia, L.K.; Xu, G.; Chen, X.B.; Liu, X.M. Secure computation protocol of Chebyshev distance under the malicious model. Sci. Rep. 2024, 14, 17115. [Google Scholar] [CrossRef]
  15. Al-Khasawneh, M.A.; Faheem, M.; Alarood, A.A.; Habibullah, S.; Alzahrani, A. A secure blockchain framework for healthcare records management systems. Healthc. Technol. Lett. 2024, 11, 461–470. [Google Scholar] [CrossRef]
  16. Alahmari, S.; Alshardan, A.; Al-Wesabi, F.N.; Sorour, S.; Alghushairy, O.; Alsini, R.; Khadidos, A.O.; Al Duhayyim, M. A decentralized and privacy-preserving framework for electronic health records using blockchain. Alex. Eng. J. 2025, 126, 196–203. [Google Scholar] [CrossRef]
  17. Guo, C.J.; You, L.; Li, X.Y.; Hu, G.G.; Wang, S.G.; Cao, C.T. A novel biometric authentication scheme with privacy protection based on SVM and ZKP. Comput. Secur. 2024, 144, 103995. [Google Scholar] [CrossRef]
  18. Sun, J.; Yao, X.M.; Wang, S.P.; Wu, Y. Blockchain-Based Secure Storage and Access Scheme for Electronic Medical Records in IPFS. IEEE Access 2020, 8, 59389–59401. [Google Scholar] [CrossRef]
  19. Wang, B.; Tian, Z.; Liu, X.R.; Xia, Y.J.; She, W.; Liu, W. A multi-center federated learning mechanism based on consortium blockchain for data secure sharing. Knowl.-Based Syst. 2025, 310, 112962. [Google Scholar] [CrossRef]
  20. Wang, Y.; Ismail, E.S. A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain and IoT. IEEE Access 2025, 13, 112962–112977. [Google Scholar] [CrossRef]
  21. Kan, J.; Zhang, J.; Liu, D.; Huang, X. Proxy Re-Encryption Scheme for Decentralized Storage Networks. Appl. Sci. 2022, 12, 4260. [Google Scholar] [CrossRef]
  22. Sun, X.Q.; Yu, F.R.; Zhang, P.; Sun, Z.W.; Xie, W.X.; Peng, X. A Survey on Zero-Knowledge Proof in Blockchain. IEEE Netw. 2021, 35, 198–205. [Google Scholar] [CrossRef]
  23. Bünz, B.; Bootle, J.; Boneh, D.; Poelstra, A.; Wuille, P.; Maxwell, G. Bulletproofs: Short Proofs for Confidential Transactions and More. IEEE Symp. Secur. Priv. 2018. Available online: https://eprint.iacr.org/2017/1066.pdf (accessed on 15 November 2025).
  24. Weng, K.K.; Yang, K.; Katz, J.; Wang, X. Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. IEEE Symp. Secur. Priv. 2021. Available online: http://eprint.iacr.org/2020/1169.pdf (accessed on 15 November 2025).
  25. Groth, J. On the Size of Pairing-Based Non-Interactive Arguments. ASIACRYPT 2016. Available online: https://eprint.iacr.org/2016/260.pdf (accessed on 16 November 2025).
  26. Ben-Sasson, E.; Bentov, I.; Horesh, Y.; Riabzev, M. Scalable, Transparent, and Post-Quantum Secure Computational Integrity. CRYPTO 2018. Available online: https://eprint.iacr.org/2018/046.pdf (accessed on 16 November 2025).
  27. Regev, O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing (STOC ’05), Baltimore, MD, USA, 22–24 May 2005; Association for Computing Machinery: New York, NY, USA, 2005; pp. 84–93. [Google Scholar] [CrossRef]
  28. Benet, J. IPFS—Content Addressed, Versioned, P2P File System. arXiv 2014, arXiv:1407.3561. [Google Scholar]
  29. Goldwasser, S.; Micali, S.; Rackoff, C. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput. 1989, 18, 186–208. [Google Scholar] [CrossRef]
  30. Damascevicius, R.; Bacanin, N.; Nayyar, A. Blockchain technology for a trustworthy social cblackit system: Implementation and enforcement perspectives. Clust. Comput. 2025, 28, 162. [Google Scholar] [CrossRef]
  31. Guo, C.; Peng, W.J.; Wu, J.; Fang, Y.X.; Ye, K.K.; Xin, Y.S. A blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability. China Commun. 2024, 21, 267–277. [Google Scholar] [CrossRef]
  32. Wu, G.F.; Wang, H.P.; Lai, X.; Wang, M.M.; He, D.J.; Chan, S. A comprehensive survey of smart contract security: State of the art and research directions. J. Netw. Comput. Appl. 2024, 226, 103882. [Google Scholar] [CrossRef]
  33. Chen, C.; Li, Y.C.; Wu, Z.P.; Mai, C.Y.; Liu, Y.M.; Hu, Y.M.; Kang, J.W.; Zheng, Z.B. Privacy computing meets metaverse: Necessity, taxonomy and challenges. Ad Hoc Netw. 2024, 158, 103457. [Google Scholar] [CrossRef]
  34. FIPS PUB 180-4; Federal Information Processing Standards Publication; Secure Hash Standard (SHS). National Institute of Standards and Technology: Gaithersburg, MD, USA, 2015. Available online: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf (accessed on 18 November 2025).
  35. Yang, Y.K.; Lu, Z.Y.; Zeng, J.W.; Liu, X.G.; Qian, X.H.; Yu, Z.B. Falic: An FPGA-Based Multi-Scalar Multiplication Accelerator for Zero-Knowledge Proof. IEEE Trans. Comput. 2024, 73, 2791–2804. [Google Scholar] [CrossRef]
  36. Yang, J.C.; Li, L.; Gu, Y.W.; Wu, H.Q. Fast Authenticated and Interoperable Multimedia Healthcare Data over Hybrid-Storage Blockchains. arXiv 2025, arXiv:2510.13318. [Google Scholar] [CrossRef]
  37. GB/T 39784-2021; General Functional Requirements for Electronic Archive Management Systems. State Administration for Market Regulation: Beijing, China, 2021.
  38. Wang, S.; Luo, N.; Xing, B. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products. Sci. Rep. 2024, 14, 20048. [Google Scholar] [CrossRef] [PubMed]
Figure 1. System Architecture. Note: RO = record owner, RU = record user, KM = key manager, CA = certification authority, PRE = proxy re-encryption, ZKP = zero-knowledge proof, AD = asset data, IPFS = InterPlanetary File System.
Figure 1. System Architecture. Note: RO = record owner, RU = record user, KM = key manager, CA = certification authority, PRE = proxy re-encryption, ZKP = zero-knowledge proof, AD = asset data, IPFS = InterPlanetary File System.
Futureinternet 18 00047 g001
Figure 2. Proxy Re-encryption technology diagram.
Figure 2. Proxy Re-encryption technology diagram.
Futureinternet 18 00047 g002
Figure 3. Zero-knowledge proof technology diagram.
Figure 3. Zero-knowledge proof technology diagram.
Futureinternet 18 00047 g003
Figure 4. Hardware acceleration with FPGA diagram.
Figure 4. Hardware acceleration with FPGA diagram.
Futureinternet 18 00047 g004
Figure 5. InterPlanetary file system diagram.
Figure 5. InterPlanetary file system diagram.
Futureinternet 18 00047 g005
Figure 6. System threat association logic diagram.
Figure 6. System threat association logic diagram.
Futureinternet 18 00047 g006
Figure 7. The Workflow of SEARs Sharing.
Figure 7. The Workflow of SEARs Sharing.
Futureinternet 18 00047 g007
Figure 8. Key generation time.
Figure 8. Key generation time.
Futureinternet 18 00047 g008
Figure 9. High-frequency verification efficiency test results graph, where Y-axis values represent the following: 10. Centralized DB+RBAC_Ministry of Education industry standard (GB/T 39784 [37]), 9. HBase+attribute encryption_Su et al. [12], 8. blockchain+homomorphic signature_Li et al. [13], 7. blockchain+basic ZKP_Fang et al. [11], 6. blockchain+zk-STARK_Saad Alahmari [16], 5. IPFS+static PRE_Sun et al. [18], 4. blockchain+dynamic PRE_Wang, S. [38], 3. Hyperledger+symmetric encryption_Guo et al. [1], 2. EOS+lightweight ZKP_education industry open-source solution, 1. Ethereum+optimized ZKP+PRE_this solution.
Figure 9. High-frequency verification efficiency test results graph, where Y-axis values represent the following: 10. Centralized DB+RBAC_Ministry of Education industry standard (GB/T 39784 [37]), 9. HBase+attribute encryption_Su et al. [12], 8. blockchain+homomorphic signature_Li et al. [13], 7. blockchain+basic ZKP_Fang et al. [11], 6. blockchain+zk-STARK_Saad Alahmari [16], 5. IPFS+static PRE_Sun et al. [18], 4. blockchain+dynamic PRE_Wang, S. [38], 3. Hyperledger+symmetric encryption_Guo et al. [1], 2. EOS+lightweight ZKP_education industry open-source solution, 1. Ethereum+optimized ZKP+PRE_this solution.
Futureinternet 18 00047 g009
Figure 10. Dynamic permission adjustment test diagram Su et al. [12].
Figure 10. Dynamic permission adjustment test diagram Su et al. [12].
Futureinternet 18 00047 g010
Figure 11. Latency variation with concurrent requests (10–200).
Figure 11. Latency variation with concurrent requests (10–200).
Futureinternet 18 00047 g011
Figure 12. Throughput variation with concurrent requests (10–200).
Figure 12. Throughput variation with concurrent requests (10–200).
Futureinternet 18 00047 g012
Table 1. Summary of Attacker Types.
Table 1. Summary of Attacker Types.
Attacker TypeCore CharacteristicsAttack Target
Semi-Honest ProxyFollows protocols, passively records re-encryption keys and ciphertext pairsDerive plaintext, compromise confidentiality
Malicious Blockchain NodeDeviates from consensus, tampers data, forges proofs or launches DDoS attacksCompromises data integrity and system availability
External Unauthorized AttackerNo legitimate permissions; obtains resources via eavesdropping or social engineeringSteals data; forges identity for access
Permissions Abuse AttackerLegitimate low-privilege account; abuses vulnerabilities for unauthorized operationsEvade audits; expand access permissions
Note: This table summarizes the core attributes of four typical attackers targeted by the scheme, clarifying their behavioral features and attack objectives for subsequent threat analysis.
Table 2. Notation and Descriptions.
Table 2. Notation and Descriptions.
NotationDescription
ZKPZero-Knowledge Proof, a privacy-preserving verification technique
PREProxy Re-Encryption, a secure authorized ciphertext transfer technique
IPFSInterPlanetary File System, a distributed file storage
LWELearning With Errors, the security foundation of the PRE algorithm
AES-256Symmetric encryption algorithm, used to generate K and encrypt T
SHA-256Hash function, generates file hashes and verification tags
C R S Common Reference String for ZKP
p , q Large primes, used to construct finite fields and prime subgroups
Z p * Finite field modulo prime p
Gq-order prime subgroup of Z p *
gGenerator of subgroup G
λ Security parameter, set to 256 bits
( s k X , p k X ) Asymmetric key pair of entity X
Cert X Digital certificate of entity X
TPlaintext file of student electronic academic records
C A / C B Initial ciphertext of entity A/Re-encrypted ciphertext
KAES-256 symmetric encryption key
H T Globally unique hash value of record T
addr IPFS Storage address of encrypted records in IPFS
addr anon Anonymous Ethereum address
RO/RURecord Owner/Record User
CA/KMCertification Authority/Key Manager
E d u _ l e n t a r g e t Verification condition initiated by the record user
x / w Public statement/Witness in ZKP
π Final proof of ZKP
A , S Intermediate operation parameters in ZKP
cChallenge value in ZKP
z 1 , z 2 Proof verification parameters in ZKP
Table 3. Security Analysis Summary.
Table 3. Security Analysis Summary.
CategoryMeasureResults
Threat Defense51% Attack Defense0/ 10 6
Parameter Centralization Risk< 10 9
Semi-Honest Proxy Attack42 ms
Identity Forgery2/ 10 6
Technical SecurityZKP90 ms, 20 ms
PRE O ( 2 256 )
Blockchain + IPFS99.99%
Privacy ProtectionZKP for Verification0
Experimental AnalysisSimulation Attacks3/ 10 6 , 2/ 10 6
Attack Types51%, Semi-Honest, Forgery
Table 4. SC Cost Testing (Gas Price = 16 Gwei).
Table 4. SC Cost Testing (Gas Price = 16 Gwei).
FunctionGas UsageActual Cost (in Ether)
Contract Creation918,6080.008267
Add Issuer44,8280.000403
Remove Issuer14,9250.000134
Add Index (5 entries)345,6300.002765
Add Index (10 entries)691,2600.00553
Add Index (15 entries)1,036,8900.008295
Add Index (20 entries)1,382,5200.01106
Table 5. Performance testing.
Table 5. Performance testing.
Operation TypeTime (ms)Traditional
Time (ms)
Note
Proof Generation120.35500.24Gate Merging and Constant Folding Optimization
Proof verification20.1830.16Verify the Authenticity and Integrity of the Archive
FPGA Hardware
Acceleration
90.47120.35Proof Generation Time Significantly reduced
Table 6. Comparison of communication overhead.
Table 6. Comparison of communication overhead.
  SchemeCommunication
Overhead (GB/h)
Advantage/
Disadvantage
  Reference
Centralized DB+RBAC6.85Low complexity, high overheadGB/T 39784
IPFS+ABE7.05High privacy, high communication cost [18]
Blockchain+zk-STARK5.43High security, large proof size [16]
Proposed Scheme3.72Balanced efficiency and privacy-
Table 7. Comparison of storage cost.
Table 7. Comparison of storage cost.
SchemeInitial Deployment Cost (USD)Annual Operation Cost (USD)Cost per SEAR (USD)
IPFS+ABE12,900130,0001.30
Blockchain+zk-STARK10,500138,0001.38
Centralized DB+RBAC20,00095,0000.95
Proposed Scheme800080,0000.80
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, X.; Tan, M.; Tian, W. A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption. Future Internet 2026, 18, 47. https://doi.org/10.3390/fi18010047

AMA Style

Li X, Tan M, Tian W. A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption. Future Internet. 2026; 18(1):47. https://doi.org/10.3390/fi18010047

Chicago/Turabian Style

Li, Xin, Minsheng Tan, and Wenlong Tian. 2026. "A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption" Future Internet 18, no. 1: 47. https://doi.org/10.3390/fi18010047

APA Style

Li, X., Tan, M., & Tian, W. (2026). A Secure and Efficient Sharing Framework for Student Electronic Academic Records: Integrating Zero-Knowledge Proof and Proxy Re-Encryption. Future Internet, 18(1), 47. https://doi.org/10.3390/fi18010047

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop