You are currently on the new version of our website. Access the old version .

817 Results Found

  • Review
  • Open Access
31 Citations
10,510 Views
20 Pages

A Survey on Zero-Knowledge Authentication for Internet of Things

  • Zhigang Chen,
  • Yuting Jiang,
  • Xinxia Song and
  • Liqun Chen

27 February 2023

The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of IoT smart devices can lead to the destruction of networks in untrustworthy environments. Therefore, authentication is a necessary tool to ensure the legit...

  • Article
  • Open Access
6 Citations
5,204 Views
14 Pages

A Zero-Knowledge Proof System with Algebraic Geometry Techniques

  • Edgar González Fernández,
  • Guillermo Morales-Luna and
  • Feliu Sagols

8 January 2020

Current requirements for ensuring data exchange over the internet to fight against security breaches have to consider new cryptographic attacks. The most recent advances in cryptanalysis are boosted by quantum computers, which are able to break commo...

  • Article
  • Open Access
15 Citations
6,631 Views
21 Pages

Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits

  • Marta Bellés-Muñoz,
  • Barry Whitehat,
  • Jordi Baylina,
  • Vanesa Daza and
  • Jose Luis Muñoz-Tapia

25 November 2021

Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from. The most efficient circuit-based zero-knowledge proofs use a p...

  • Article
  • Open Access
4 Citations
5,160 Views
26 Pages

Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3

  • Yang Yang,
  • Shangbin Han,
  • Ping Xie,
  • Yan Zhu,
  • Zhenyang Ding,
  • Shengjie Hou,
  • Shicheng Xu and
  • Haibin Zheng

9 August 2022

With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge pro...

  • Article
  • Open Access
4 Citations
3,704 Views
17 Pages

Novel Blockchain and Zero-Knowledge Proof Technology-Driven Car Insurance

  • Zhuoliang Qiu,
  • Zhijun Xie,
  • Xianliang Jiang,
  • Chuan Ran and
  • Kewei Chen

13 September 2023

It is crucial to ensure the privacy and authenticity of the owner’s information in car insurance claims. However, the current traditional car insurance claims scenario suffers from inefficiency, complex service, unreliable data, and data leakag...

  • Article
  • Open Access
9 Citations
4,459 Views
22 Pages

Implementation and Security Test of Zero-Knowledge Protocols on SSI Blockchain

  • Cristina Vilchez Moya,
  • Juan Ramón Bermejo Higuera,
  • Javier Bermejo Higuera and
  • Juan Antonio Sicilia Montalvo

29 April 2023

The problem of digital identity acquires more relevance every day in the eyes of a society that spends more and more time connected to the Internet. It has evolved throughout its history to reach a decentralized model known as Self-Sovereign Identity...

  • Article
  • Open Access
9 Citations
4,295 Views
22 Pages

8 September 2024

UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a soluti...

  • Article
  • Open Access
16 Citations
10,407 Views
17 Pages

13 October 2021

Zero-Knowledge Proofs (ZKPs) are cryptographic primitives allowing a party to prove to another party that the former knows some information while keeping it secret. Such a premise can lead to the development of numerous privacy-preserving protocols i...

  • Article
  • Open Access
11 Citations
5,079 Views
28 Pages

An Access Control System Based on Blockchain with Zero-Knowledge Rollups in High-Traffic IoT Environments

  • Xin Lin,
  • Yuanyuan Zhang,
  • Changhai Huang,
  • Bin Xing,
  • Liangyin Chen,
  • Dasha Hu and
  • Yanru Chen

24 March 2023

The access control (AC) system in an IoT (Internet of Things) context ensures that only authorized entities have access to specific devices and that the authorization procedure is based on pre-established rules. Recently, blockchain-based AC systems...

  • Article
  • Open Access
5 Citations
4,473 Views
25 Pages

An Efficient Zero-Knowledge Dual Membership Proof Supporting Pos-and-Neg Membership Decision

  • Hongjian Yin,
  • E Chen,
  • Yan Zhu,
  • Rongquan Feng and
  • Stephen S. Yau

5 September 2022

In this paper, we address the problem of secure decision of membership. We present a Zero-Knowledge Dual Membership Proof (ZKDMP) protocol, which can support positive and negative (Pos-and-Neg) membership decisions simultaneously. To do it, two secur...

  • Article
  • Open Access
737 Views
16 Pages

Zero-Shot Elasmobranch Classification Informed by Domain Prior Knowledge

  • Ismael Beviá-Ballesteros,
  • Mario Jerez-Tallón,
  • Nieves Aranda-Garrido,
  • Marcelo Saval-Calvo,
  • Isabel Abel-Abellán and
  • Andrés Fuster-Guilló

The development of systems for the identification of elasmobranchs, including sharks and rays, is crucial for biodiversity conservation and fisheries management, as they represent one of the most threatened marine taxa. This challenge is constrained...

  • Feature Paper
  • Article
  • Open Access
59 Citations
9,923 Views
21 Pages

Blockchain and Demand Response: Zero-Knowledge Proofs for Energy Transactions Privacy

  • Claudia Daniela Pop,
  • Marcel Antal,
  • Tudor Cioara,
  • Ionut Anghel and
  • Ioan Salomie

5 October 2020

Nowadays, the adoption of demand response programs is still lagging due to the prosumers’ lack of awareness, fear of losing control and privacy of energy data, etc. Programs decentralization, by adopting promising technologies such as blockchai...

  • Article
  • Open Access
411 Views
23 Pages

26 December 2025

With the proliferation of mobile devices, identifying previously unseen mobile applications has become a critical challenge in network security. Traditional application identification approaches rely heavily on fixed training categories and limited t...

  • Article
  • Open Access
14 Citations
11,551 Views
20 Pages

A Blockchain and Zero Knowledge Proof Based Data Security Transaction Method in Distributed Computing

  • Bowei Zhang,
  • Heng Pan,
  • Kunyang Li,
  • Ying Xing,
  • Jiaxiang Wang,
  • Dongdong Fan and
  • Wenjie Zhang

30 October 2024

In distributed computing, data trading mechanisms are essential for ensuring the sharing of data across multiple computing nodes. Nevertheless, they currently encounter considerable obstacles, including low accuracy in matching trading parties, ensur...

  • Article
  • Open Access
3 Citations
2,189 Views
27 Pages

5 June 2025

Automated food safety inspection systems rely heavily on the visual detection of contamination, spoilage, and foreign objects in food products. Current approaches typically require extensive labeled training data for each specific hazard type, limiti...

  • Article
  • Open Access
3 Citations
2,755 Views
14 Pages

7 March 2025

This work presents a mathematical solution to data privacy and integrity issues in Split Learning which uses Homomorphic Encryption (HE) and Zero-Knowledge Proofs (ZKP). It allows calculations to be conducted on encrypted data, keeping the data priva...

  • Article
  • Open Access
34 Citations
10,008 Views
20 Pages

Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things

  • Francisco Martín-Fernández,
  • Pino Caballero-Gil and
  • Cándido Caballero-Gil

7 January 2016

This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and comput...

  • Article
  • Open Access
33 Citations
6,293 Views
18 Pages

Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof

  • Tianyu Bai,
  • Yangsheng Hu,
  • Jianfeng He,
  • Hongbo Fan and
  • Zhenzhou An

11 October 2022

The issue of identity authentication for online medical services has been one of the key focuses of the healthcare industry in recent years. Most healthcare organizations use centralized identity management systems (IDMs), which not only limit the in...

  • Article
  • Open Access
1 Citations
1,003 Views
16 Pages

Knowledge-Augmented Zero-Shot Method for Power Equipment Defect Grading with Chain-of-Thought LLMs

  • Jianguang Du,
  • Bo Li,
  • Zhenyu Chen,
  • Lian Shen,
  • Pufan Liu and
  • Zhongyang Ran

As large language models (LLMs) increasingly enter specialized domains, inference without external resources often leads to knowledge gaps, opaque reasoning, and hallucinations. To address these challenges in power equipment defect grading, we propos...

  • Article
  • Open Access
2 Citations
2,107 Views
44 Pages

13 July 2022

Probabilistically Checkable Proofs (PCPs) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form “x∈L” by querying only a few proof bits. Zero-Knowledge PCPs...

  • Article
  • Open Access
1 Citations
2,775 Views
27 Pages

During the last few years, smart mobile devices have constituted an indispensable part of our lives, being a main element for many daily activities. However, it is well known that several security and privacy concerns still occur, especially taking i...

  • Article
  • Open Access
571 Views
40 Pages

19 December 2025

Conventional machine-learning-based defenses are unable to generalize well to novel chains of ATT&CK actions. Being inefficient with low telemetry budgets, they are also unable to provide causal explainability and auditing. We propose a knowledge...

  • Article
  • Open Access
11 Citations
4,033 Views
20 Pages

Using Adaptive Zero-Knowledge Authentication Protocol in VANET Automotive Network

  • Igor Anatolyevich Kalmykov,
  • Aleksandr Anatolyevich Olenev,
  • Natalia Igorevna Kalmykova and
  • Daniil Vyacheslavovich Dukhovnyj

31 December 2022

One of the most important components of intelligent transportation systems (ITS) is the automotive self-organizing VANET network (vehicular ad hoc network). Its nodes are vehicles with specialized onboard units (OBU) installed on them. Such a network...

  • Article
  • Open Access
3 Citations
1,803 Views
20 Pages

In virtual power plants, diverse business scenarios involving user data, such as queries, transactions, and sharing, pose significant privacy risks. Traditional attribute-based encryption (ABE) methods, while supporting fine-grained access, fall shor...

  • Article
  • Open Access
6 Citations
4,589 Views
21 Pages

28 June 2024

Ontological knowledge graph (OKG) is a well-formed visual representation that depicts knowledge organization in formal elements (e.g., entities and attributes) and their interrelationships. OKG is crucial for innovation management analysis as it prov...

  • Article
  • Open Access
6 Citations
2,923 Views
22 Pages

A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof

  • Ziyi Su,
  • Shiwei Wang,
  • Hongliu Cai,
  • Jiaxuan Huang,
  • Yourong Chen,
  • Xudong Zhang and
  • Muhammad Alam

20 September 2024

Current authentication schemes based on zero-knowledge proof (ZKP) still face issues such as high computation costs, low efficiency, and security assurance difficulty. Therefore, we propose a secure and efficient authentication scheme (SEAS) for larg...

  • Article
  • Open Access
2,212 Views
11 Pages

Secure Processing and Distribution of Data Managed on Private InterPlanetary File System Using Zero-Knowledge Proofs

  • Kyohei Shibano,
  • Kensuke Ito,
  • Changhee Han,
  • Tsz Tat Chu,
  • Wataru Ozaki and
  • Gento Mogi

In this study, a new data-sharing method is proposed that uses a private InterPlanetary File System—a decentralized storage system operated within a closed network—to distribute data to external entities while making its authenticity veri...

  • Article
  • Open Access
726 Views
36 Pages

26 December 2025

Real-time peer-to-peer communication in web browsers typically relies on centralized signaling servers, creating single points of failure, privacy vulnerabilities, and censorship risks. We present WebRTC Swarms, a fully decentralized signaling archit...

  • Feature Paper
  • Article
  • Open Access
23 Citations
5,189 Views
39 Pages

The issuing and verification of higher education certificates, including all higher education documents, still functions in a costly and inappropriately bureaucratic manner. Blockchain technology provides a more secure and consistent way to revolutio...

  • Article
  • Open Access
1 Citations
3,940 Views
29 Pages

Blockchain-based sensor networks offer promising solutions for secure and transparent data management in IoT ecosystems. However, efficient set membership proofs remain a critical challenge, particularly in resource-constrained environments. This pap...

  • Article
  • Open Access
5,880 Views
32 Pages

This research presents a novel framework and experimental results that combine zero-knowledge proofs (ZKPs) with private blockchain technology to safeguard whistleblower privacy while ensuring secure digital evidence submission and verification. For...

  • Article
  • Open Access
4 Citations
4,630 Views
32 Pages

20 December 2024

Frequent user data breaches and misuse incidents highlight the flaws in current identity management systems. This study proposes a blockchain-based, peer-supervised self-sovereign identity (SSI) generation and privacy protection technology. Our appro...

  • Article
  • Open Access
152 Views
32 Pages

12 January 2026

A sharing framework based on Zero-Knowledge Proof (ZKP) and Proxy Re-encryption (PRE) technologies offers a promising solution for sharing Student Electronic Academic Records (SEARs). As core credentials in the education sector, student records are c...

  • Article
  • Open Access
3 Citations
3,329 Views
17 Pages

Authentication is a crucial security service on the Internet. In real-world applications, multiple independent trust domains often exist, with each recognizing only certain identities within their own systems. During cross-domain access, users cannot...

  • Article
  • Open Access
33 Citations
5,496 Views
17 Pages

This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm known as “Sigma protocol with helper”, and prove that the protocol’s secur...

  • Article
  • Open Access
19 Citations
4,276 Views
33 Pages

Research on the Construction of Grain Food Multi-Chain Blockchain Based on Zero-Knowledge Proof

  • Boyang Zhang,
  • Jiping Xu,
  • Xiaoyi Wang,
  • Zhiyao Zhao,
  • Shichao Chen and
  • Xin Zhang

10 April 2023

As the main food source of the world’s population, grain quality safety is of great significance to the healthy development of human beings. The grain food supply chain is characterized by its long life cycle, numerous and complex business data, diff...

  • Article
  • Open Access
9 Citations
7,299 Views
18 Pages

The Relationship between Knowledge, Attitudes, Values, and Technology in Promoting Zero-Waste Pro-Environmental Behaviour in a Zero-Waste Campus Framework

  • Mayawi Baba-Nalikant,
  • Nor Athiyah Abdullah,
  • Mohd Heikal Husin,
  • Sharifah Mashita Syed-Mohamad,
  • Mohamad Saifudin Mohamad Saleh and
  • Asyirah Abdul Rahim

This study aimed to investigate the relationships between knowledge, attitudes, and values in promoting zero-waste, pro-environmental behaviour among the university campus community and how technology plays its role. A survey instrument was developed...

  • Review
  • Open Access
3 Citations
2,644 Views
24 Pages

Scientometric Trends and Knowledge Gaps of Zero-Emission Campuses

  • Nkweauseh Reginald Longfor,
  • Jiarong Hu,
  • You Li,
  • Xuepeng Qian and
  • Weisheng Zhou

28 November 2023

As the urgency of addressing climate change grows, strategies such as developing zero-emission campuses to achieve carbon neutrality are becoming increasingly crucial. Yet, research in this field remains somewhat underdeveloped and fragmented. This s...

  • Review
  • Open Access
31 Citations
8,390 Views
37 Pages

5 March 2022

The use of the term ‘net zero’ has rapidly and recently become mainstream but is often not well-defined in the literature. A brief history of the term was researched, followed by a systematic literature review to consider the research que...

  • Article
  • Open Access

Hybrid Poly Commitments for Scalable Binius Zero-Knowledge Proofs in Federated Learning

  • Hasina Andriambelo,
  • Hery Zo Andriamanohisoa and
  • Naghmeh Moradpoor

Federated learning enables collaborative model training without sharing raw data, but practical deployments increasingly require verifiable guarantees that clients compute updates correctly. Zero-knowledge proofs can provide such guarantees, yet exis...

  • Article
  • Open Access
13 Citations
5,471 Views
15 Pages

Adaptive Authentication Protocol Based on Zero-Knowledge Proof

  • Nikita Konstantinovich Chistousov,
  • Igor Anatolyevich Kalmykov,
  • Daniil Vyacheslavovich Dukhovnyj,
  • Maksim Igorevich Kalmykov and
  • Aleksandr Anatolyevich Olenev

30 January 2022

Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the I...

  • Essay
  • Open Access
10 Citations
5,365 Views
14 Pages

State of Knowledge on UK Agricultural Peatlands for Food Production and the Net Zero Transition

  • Isobel L. Lloyd,
  • Virginia Thomas,
  • Chidiebere Ofoegbu,
  • Andrew V. Bradley,
  • Paddy Bullard,
  • Brenda D’Acunha,
  • Beth Delaney,
  • Helen Driver,
  • Chris D. Evans and
  • Heiko Balzter
  • + 12 authors

27 November 2023

Agricultural peatlands are the most productive soils in the UK for the cultivation of many food crops. Historical drainage of peat for agriculture (i.e., cropland and managed grassland), without consideration of other associated environmental and cli...

  • Article
  • Open Access
2 Citations
1,742 Views
35 Pages

A Transductive Zero-Shot Learning Framework for Ransomware Detection Using Malware Knowledge Graphs

  • Ping Wang,
  • Hao-Cyuan Li,
  • Hsiao-Chung Lin,
  • Wen-Hui Lin and
  • Nian-Zu Xie

Malware continues to evolve rapidly, posing significant challenges to network security. Traditional signature-based detection methods often struggle to cope with advanced evasion techniques such as polymorphism, metamorphism, encryption, and stealth,...

  • Article
  • Open Access
7 Citations
10,437 Views
24 Pages

A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System

  • Juan Alamrio Berrios Moya,
  • John Ayoade and
  • Md Ashraf Uddin

30 May 2025

Academic credential fraud presents a significant challenge to the global academic and labor markets, undermining the credibility of legitimate qualifications. In this paper, we introduce ZKBAR-V, a Zero-Knowledge Proof-Enabled Blockchain-Based Academ...

  • Article
  • Open Access
4,647 Views
29 Pages

25 July 2025

Blockchain provides the opportunity for organizations to execute trustable collaborations through smart contract automations. However, linkability problems exist in blockchain-based collaboration platforms due to privacy leakages, which, when exploit...

  • Article
  • Open Access
9 Citations
7,398 Views
23 Pages

12 January 2021

The types of political and policy knowledge required to guide rapid transition to low-carbon economies remain largely disconnected in the fields of political science, psychology, and sociology. The composition and key features of the main actors invo...

  • Article
  • Open Access
3 Citations
3,743 Views
13 Pages

Blockchain Data Availability Scheme with Strong Data Privacy Protection

  • Xinyu Liu,
  • Shan Ji,
  • Xiaowan Wang,
  • Liang Liu and
  • Yongjun Ren

2 February 2023

Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology fac...

  • Article
  • Open Access
8 Citations
4,151 Views
27 Pages

A Lattice-Based Certificateless Traceable Ring Signature Scheme

  • Junbin Liang,
  • Jianye Huang,
  • Qiong Huang,
  • Liantao Lan and
  • Man Ho Allen Au

2 March 2023

A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring s...

  • Article
  • Open Access
1,407 Views
33 Pages

Blockchain and smart contracts are widely used in IoT access control to create decentralized, trustworthy environments for secure access and record management. However, their application introduces a dual challenge: The transparency of blockchain and...

  • Review
  • Open Access
5 Citations
2,800 Views
15 Pages

Visualization and Analysis of Global Vision Zero Studies and Policy Orientation in China

  • Yi He,
  • Yixiong Fan,
  • Lixin Yan,
  • Jianhua Peng and
  • Zhiqiang Li

As a policy that is widely used worldwide, Vision Zero is a long-term strategic goal for road safety in China. The aim of this paper is to examine the literature in the field of Vision Zero retrieved by the Web of Science (WOS) Core Collection databa...

of 17