{"title":"Research on ZKP Algorithm of Data Asset Security and Privacy Protection Based on Blockchain Technology","authors":"Fei Lan, Junjia Yang, Hao Feng, Wendi Xu, Wenxin Qiu, Zhang Zhao, Yanzuo Chen","doi":"10.4018/ijec.349211","DOIUrl":null,"url":null,"abstract":"Zero Knowledge Proof (ZKP) is a very effective method of preserving privacy as it hides the most confidential information throughout the transaction. In this paper, we present a security and privacy-preserving approach for blockchain that relies on account and multi-data asset models using the Zero Knowledge Proof (ZKP) mechanism. We provide options for transferring data assets and detecting duplicate expenditures, and we also develop transaction structures, anonymised addresses and anonymised metadata for the data assets. To create and validate the ZKP, we use the zk-SNARKs algorithm and specify validation criteria for masked transactions, and finally conduct experimental tests to validate it. Creating better algorithms for ZKP will be the focus of our future efforts.","PeriodicalId":0,"journal":{"name":"","volume":"54 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijec.349211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Zero Knowledge Proof (ZKP) is a very effective method of preserving privacy as it hides the most confidential information throughout the transaction. In this paper, we present a security and privacy-preserving approach for blockchain that relies on account and multi-data asset models using the Zero Knowledge Proof (ZKP) mechanism. We provide options for transferring data assets and detecting duplicate expenditures, and we also develop transaction structures, anonymised addresses and anonymised metadata for the data assets. To create and validate the ZKP, we use the zk-SNARKs algorithm and specify validation criteria for masked transactions, and finally conduct experimental tests to validate it. Creating better algorithms for ZKP will be the focus of our future efforts.