{"id":"https://openalex.org/W4412770210","doi":"https://doi.org/10.58346/jisis.2025.i2.061","title":"Zero-Knowledge Proof (ZKP) Techniques Within Blockchain Technology","display_name":"Zero-Knowledge Proof (ZKP) Techniques Within Blockchain Technology","publication_year":2025,"publication_date":"2025-05-30","ids":{"openalex":"https://openalex.org/W4412770210","doi":"https://doi.org/10.58346/jisis.2025.i2.061"},"language":"en","primary_location":{"id":"doi:10.58346/jisis.2025.i2.061","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i2.061","pdf_url":"https://doi.org/10.58346/jisis.2025.i2.061","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.58346/jisis.2025.i2.061","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008603971","display_name":"K. N. Unnikrishnan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Unnikrishnan K N","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5119125438","display_name":"Victer Paul Victer Paul P","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Victer Paul Victer Paul P","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008603971"],"corresponding_institution_ids":[],"apc_list":{"value":550,"currency":"USD","value_usd":550},"apc_paid":{"value":550,"currency":"USD","value_usd":550},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28250379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"2","first_page":"926","last_page":"941"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9452999830245972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9452999830245972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.963054895401001},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.8943129777908325},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.540161669254303},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4351280629634857},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2047228217124939},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15846791863441467},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.14058053493499756},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.06613242626190186}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.963054895401001},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.8943129777908325},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.540161669254303},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4351280629634857},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2047228217124939},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15846791863441467},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.14058053493499756},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.06613242626190186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.58346/jisis.2025.i2.061","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i2.061","pdf_url":"https://doi.org/10.58346/jisis.2025.i2.061","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.58346/jisis.2025.i2.061","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jisis.2025.i2.061","pdf_url":"https://doi.org/10.58346/jisis.2025.i2.061","source":{"id":"https://openalex.org/S2739103833","display_name":"Journal of Internet Services and Information Security","issn_l":"2182-2069","issn":["2182-2069","2182-2077"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310319527","host_organization_name":"Innovative Information Science & Technology Research Group (ISYOU)","host_organization_lineage":["https://openalex.org/P4310319527"],"host_organization_lineage_names":["Innovative Information Science & Technology Research Group (ISYOU)"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Internet Services and Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412770210.pdf","grobid_xml":"https://content.openalex.org/works/W4412770210.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4406460655","https://openalex.org/W2952570804"],"abstract_inverted_index":{"Distributed":[0],"trust":[1],"systems":[2],"have":[3,31,43],"been":[4,32],"transformed":[5],"by":[6],"blockchain":[7,75,94,158],"technology;":[8],"however,":[9],"scalability":[10],"and":[11,24,99,107,123,130,153],"privacy":[12,126],"preservation":[13],"remain":[14],"major":[15],"obstacles.":[16],"Blockchain-based":[17,40],"ridesharing":[18,41],"platforms,":[19],"which":[20,60],"provide":[21,84],"decentralization,":[22],"privacy,":[23,151],"enhanced":[25],"user":[26],"control":[27],"inside":[28],"the":[29,89],"system,":[30],"offered":[33],"as":[34,97],"a":[35,85,141],"solution":[36],"to":[37,134,137,149,161],"these":[38,49,69],"problems.":[39],"services":[42],"scaling":[44],"problems":[45],"in":[46,58,64,93],"spite":[47],"of":[48,88],"benefits.":[50],"These":[51],"systems'":[52],"performance":[53,108],"declines":[54],"with":[55],"an":[56],"increase":[57,118],"users,":[59],"restricts":[61],"their":[62,102],"usefulness":[63],"high-volume":[65],"marketplaces.":[66],"To":[67],"overcome":[68],"constraints,":[70],"this":[71],"study":[72,111],"investigates":[73],"how":[74],"topologies":[76],"can":[77,117],"use":[78],"zero-knowledge":[79],"proof":[80],"(ZKP)":[81],"approaches.":[82],"We":[83],"thorough":[86],"examination":[87],"current":[90],"ZKP":[91,115,144],"implementations":[92],"systems,":[95],"such":[96],"zk-Rollups":[98],"Bulletproofs,":[100],"assessing":[101],"theoretical":[103],"underpinnings,":[104],"real-world":[105,164],"uses,":[106],"indicators.":[109],"Our":[110],"shows":[112],"that":[113,146],"although":[114],"integration":[116,145],"throughput":[119],"through":[120],"rollup":[121],"technologies":[122],"greatly":[124],"improve":[125],"guarantees,":[127],"computational":[128],"overhead":[129],"implementation":[131],"difficulties":[132],"continue":[133],"be":[135],"obstacles":[136],"broad":[138],"adoption.":[139],"Provide":[140],"framework":[142],"for":[143],"is":[147],"tailored":[148],"balance":[150],"scalability,":[152],"usability.":[154],"This":[155],"could":[156],"move":[157],"technology":[159],"closer":[160],"more":[162],"useful":[163],"applications.":[165]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
