{"id":"https://openalex.org/W4401705550","doi":"https://doi.org/10.15388/24-infor564","title":"Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs","display_name":"Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4401705550","doi":"https://doi.org/10.15388/24-infor564"},"language":"en","primary_location":{"id":"doi:10.15388/24-infor564","is_oa":true,"landing_page_url":"https://doi.org/10.15388/24-infor564","pdf_url":"https://informatica.vu.lt/journal/INFORMATICA/article/1344/file/pdf","source":{"id":"https://openalex.org/S57195646","display_name":"Informatica","issn_l":"0868-4952","issn":["0868-4952","1822-8844"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatica","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://informatica.vu.lt/journal/INFORMATICA/article/1344/file/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009807660","display_name":"Au\u0161rys Kil\u010diauskas","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Au\u0161rys Kil\u010diauskas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092893978","display_name":"Antanas Bendoraitis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antanas Bendoraitis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5019879500","display_name":"Eligijus Sakalauskas","orcid":"https://orcid.org/0000-0002-4620-4469"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eligijus Sakalauskas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009807660"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3767,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8410757,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"601","last_page":"616"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.8364661335945129},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7774766087532043},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5997152328491211},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5561025142669678},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5510511994361877},{"id":"https://openalex.org/keywords/net","display_name":"Net (polyhedron)","score":0.5495093464851379},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5134433507919312},{"id":"https://openalex.org/keywords/balance","display_name":"Balance (ability)","score":0.505969226360321},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38238221406936646},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30276983976364136},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2317807674407959},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.140578031539917},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.07502689957618713},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.05932497978210449}],"concepts":[{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.8364661335945129},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7774766087532043},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5997152328491211},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5561025142669678},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5510511994361877},{"id":"https://openalex.org/C14166107","wikidata":"https://www.wikidata.org/wiki/Q253829","display_name":"Net (polyhedron)","level":2,"score":0.5495093464851379},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5134433507919312},{"id":"https://openalex.org/C168031717","wikidata":"https://www.wikidata.org/wiki/Q1530280","display_name":"Balance (ability)","level":2,"score":0.505969226360321},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38238221406936646},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30276983976364136},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2317807674407959},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.140578031539917},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.07502689957618713},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.05932497978210449},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15388/24-infor564","is_oa":true,"landing_page_url":"https://doi.org/10.15388/24-infor564","pdf_url":"https://informatica.vu.lt/journal/INFORMATICA/article/1344/file/pdf","source":{"id":"https://openalex.org/S57195646","display_name":"Informatica","issn_l":"0868-4952","issn":["0868-4952","1822-8844"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatica","raw_type":"journal-article"},{"id":"pmh:oai:ktu.edu:elaba:208805571","is_oa":true,"landing_page_url":"https://vb.ktu.edu/KTU:ELABAPDB208805571&prefLang=en_US","pdf_url":null,"source":{"id":"https://openalex.org/S4406922255","display_name":"KTUePubl (Repository of Kaunas University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"eISSN 1822-8844","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.15388/24-infor564","is_oa":true,"landing_page_url":"https://doi.org/10.15388/24-infor564","pdf_url":"https://informatica.vu.lt/journal/INFORMATICA/article/1344/file/pdf","source":{"id":"https://openalex.org/S57195646","display_name":"Informatica","issn_l":"0868-4952","issn":["0868-4952","1822-8844"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatica","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401705550.pdf","grobid_xml":"https://content.openalex.org/works/W4401705550.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2108834246","https://openalex.org/W2744499307","https://openalex.org/W2759434051","https://openalex.org/W2883748642","https://openalex.org/W2913667878","https://openalex.org/W2955608984","https://openalex.org/W2963010231","https://openalex.org/W4206316416","https://openalex.org/W4283314926","https://openalex.org/W4387744650"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W1970588133","https://openalex.org/W2022025391","https://openalex.org/W2163538620","https://openalex.org/W1567449721"],"abstract_inverted_index":{"One":[0],"of":[1,10,74,90,102,123,143,170,175,203,220,253,273,306],"the":[2,6,31,78,87,99,108,121,135,141,144,157,168,171,173,190,197,236,248,258,264,271,291,295,307],"main":[3],"trends":[4],"for":[5,30,58,68,179,257],"monitoring":[7],"and":[8,28,61,71,159,194,213,282],"control":[9],"business":[11,41],"processes":[12,17],"is":[13,129,261,267],"to":[14,46,98,139,184,269,293],"implement":[15],"these":[16],"via":[18],"private":[19,115],"blockchain":[20,116,244],"systems.":[21],"These":[22],"systems":[23],"must":[24,95,117],"ensure":[25],"data":[26,256],"privacy":[27],"verifiability":[29],"entire":[32],"network":[33,136],"here":[34],"denoted":[35],"by":[36],"\u2018Net\u2019.":[37],"In":[38],"addition,":[39],"every":[40],"activity":[42],"should":[43],"be":[44,96,118,137,182],"declared":[45],"a":[47,66,69,114,150,217,225,231,239,243],"trusted":[48],"third":[49],"party":[50],"(TTP),":[51],"such":[52],"as":[53,238],"an":[54],"Audit":[55],"Authority":[56],"(AA),":[57],"tax":[59],"declaration":[60],"collection":[62],"purposes.":[63],"We":[64],"present":[65],"solution":[67,309],"confidential":[70],"verifiable":[72],"realization":[73,205],"transactions":[75],"based":[76,246],"on":[77,247,290,300],"Unspent":[79],"Transaction":[80],"Output":[81],"(UTxO)":[82],"paradigm.":[83],"This":[84,148,260,285],"means":[85],"that":[86,131],"total":[88,100],"sum":[89,101],"transaction":[91,103,125,145,255,297],"inputs":[92,158],"(incomes)":[93],"$In$":[94],"equal":[97],"outputs":[104,160],"(expenses)":[105],"$Ex$,":[106],"satisfying":[107],"balance":[109,146,298],"equation":[110,299],"$In=Ex$.":[111],"Privacy":[112],"in":[113,134,207,242],"achieved":[119],"through":[120],"encryption":[122,180,212],"actual":[124],"values.":[126],"However,":[127],"it":[128,215],"crucial":[130],"all":[132,288],"participants":[133],"able":[138,268],"verify":[140],"validity":[142],"equation.":[147],"poses":[149],"challenge":[151],"with":[152,163,189,196,216,277],"probabilistically":[153],"encrypted":[154,162,188,254,276,301],"data.":[155,302],"Moreover,":[156],"are":[161,187,310],"different":[164,176,279,283],"public":[165,177,192,199,280],"keys.":[166],"With":[167],"introduction":[169],"AA,":[172],"number":[174],"keys":[178,281],"can":[181],"reduced":[183],"two.":[185],"Incomes":[186],"Receiver\u2019s":[191],"key":[193],"expenses":[195],"AA\u2019s":[198],"key.":[200],"The":[201,303],"novelty":[202],"our":[204],"lies":[206],"taking":[208],"additively-multiplicative,":[209],"homomorphic":[210],"ElGamal":[211],"integrating":[214],"proposed":[218,265,308],"paradigm":[219],"modified":[221],"Schnorr":[222],"identification":[223],"providing":[224],"non-interactive":[226],"zero-knowledge":[227],"proof":[228],"(NIZKP)":[229],"using":[230],"cryptographically":[232],"secure":[233],"h-function.":[234],"Introducing":[235],"AA":[237],"structural":[240],"element":[241],"system":[245],"UTxO":[249],"enables":[250],"effective":[251],"verification":[252],"Net.":[259],"possible":[262],"because":[263],"NIZKP":[266],"prove":[270],"equivalency":[272],"two":[274,278],"ciphertexts":[275],"actors.":[284],"integration":[286],"allows":[287],"users":[289],"Net":[292],"check":[294],"UTxO-based":[296],"security":[304],"considerations":[305],"presented.":[311]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
