Academic literature on the topic 'Zk-SNARKs Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Zk-SNARKs Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Zk-SNARKs Authentication"

1

Koulianos, Athanasios, Panagiotis Paraskevopoulos, Antonios Litke, and Nikolaos K. Papadakis. "Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof." Sensors 24, no. 17 (2024): 5838. http://dx.doi.org/10.3390/s24175838.

Full text
Abstract:
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We genera
APA, Harvard, Vancouver, ISO, and other styles
2

Salleras, Xavier, and Vanesa Daza. "ZPiE: Zero-Knowledge Proofs in Embedded Systems." Mathematics 9, no. 20 (2021): 2569. http://dx.doi.org/10.3390/math9202569.

Full text
Abstract:
Zero-Knowledge Proofs (ZKPs) are cryptographic primitives allowing a party to prove to another party that the former knows some information while keeping it secret. Such a premise can lead to the development of numerous privacy-preserving protocols in different scenarios, like proving knowledge of some credentials to a server without leaking the identity of the user. Even when the applications of ZKPs were endless, they were not exploited in the wild for a couple of decades due to the fact that computing and verifying proofs was too computationally expensive. However, the advent of efficient s
APA, Harvard, Vancouver, ISO, and other styles
3

Sisodia, Kartik, and Garima Sharma. "Block Chain Based Identify Management for Secure & Decentralised Web Application." Radius: Journal of Science and Technology 2, no. 1 (2025): 251009. https://doi.org/10.5281/zenodo.15366215.

Full text
Abstract:
The research presents a blockchain-based identity management system for protecting decentralized web applications by operating through decentralized processes. Through its permissioned Ethereum network The-system enables automatic operations for identity lifecycle management to register authenticate authorize and revoke users while maintaining privacy of user data (anonymization and encryption of user data). Users receive hashed credentials which the blockchain ledger retains forever as secure storage alongside complete PII data privacy. Smart contracts determine access through comparison betw
APA, Harvard, Vancouver, ISO, and other styles
4

Xiao, Shangzhuo. "Investigations into a Cross-Domain Authentication Model for Cloud Computing, Utilizing a Dynamically Sharded Masterchain-Sidechain Hybrid Architecture for Enhanced Privacy-Regulatory Equilibrium." Science and Technology of Engineering, Chemistry and Environmental Protection 1, no. 2 (2025). https://doi.org/10.61173/q44fp397.

Full text
Abstract:
This study proposes a dynamic main-chain-side-chain hybrid architecture to address the privacy leakage risk (68% APT attack probability) and efficiency bottleneck (42% OAuth2.0 failure rate) in conventional cross-domain authentication systems in cloud computing, focusing on resolving the performance-privacy-regulation paradox. The creation of decentralized authentication involves constructing a multi-layered structure: the primary chain layer utilizes PoS consensus and SHA-3 algorithm to manage identity registration delays at 120ms; the secondary layer employs ShardedBFT dynamic slicing techno
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Zk-SNARKs Authentication"

1

Musfique, Md Masum, Tanvir Ahmed Aadeef, Md Samiur Rahman, Monosij Kanti Sarkar, and Md Fahad Monir. "Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs Verification." In 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2023. http://dx.doi.org/10.1109/wetice57085.2023.10477832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khor, Jing Huey, Michail Sidorov, Nathan Tze Min Ho, and Tze Hank Chia. "Public Blockchain-based Lightweight Anonymous Authentication Platform Using Zk-SNARKs for Low-power IoT Devices." In 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!