Research on Privacy-Preserving Identity Authentication Algorithm Based on Elliptic Curves and Zero-Knowledge Proofs
DOI: 10.23977/acss.2025.090405 | Downloads: 3 | Views: 72
Author(s)
Shi Wang 1
Affiliation(s)
1 Hainan Vocational University of Science and Technology, Haikou, 571126, China
Corresponding Author
Shi WangABSTRACT
Traditional identity authentication algorithms that rely on centralized trust authorities and plaintext identity verification often suffer from privacy leakage, key misuse, and single-point-of-failure risks. This study proposes a lightweight, privacy-preserving authentication algorithm based on elliptic curve and zero-knowledge proofs to address these issues. The proposed scheme introduces a random challenge and an anonymous verification mechanism during the authentication process to ensure both identity privacy and authentication security. While maintaining high levels of security and verifiability, the algorithm effectively reduces computational complexity and communication overhead. Experimental results demonstrate that the proposed method significantly outperforms traditional RSA and ECDSA in terms of authentication delay, communication cost, and security robustness. This approach is practical and scalable, offering a promising solution for secure authentication in environments with limited resource.
KEYWORDS
Elliptic Curves, Zero-Knowledge Proofs, Identity Authentication, Privacy Protection, Lightweight AlgorithmsCITE THIS PAPER
Shi Wang, Research on Privacy-Preserving Identity Authentication Algorithm Based on Elliptic Curves and Zero-Knowledge Proofs. Advances in Computer, Signals and Systems (2025) Vol. 9: 39-44. DOI: http://dx.doi.org/10.23977/acss.2025.090405.
REFERENCES
[1] Anqi Chi, Lin Bi, Gopal Verma & Xiaoqiang Di.(2025). Enhanced QKD protocol based on zero-knowledge proof and post-quantum signature. Optics Communications, 596, 132431.
[2] Shangping Wang, Qi Huang, Ruoxin Yan, Juanjuan Ma & Xiaoling Xie.(2025). A privacy-enhanced authentication scheme for VANETs based on blockchain and zero-knowledge proof. Vehicular Communications, 56, 100976.
[3] Cyprian Omukhwaya Sakwa, Andrew Omala Anyembe & Fagen Li.(2025). A survey of folding-based zero-knowledge proofs. Information Sciences, 724, 122698.
[4] Khizar Hameed, Faiqa Maqsood & Zhenfei Wang.(2025). Artificial intelligence-enhanced zero-knowledge proofs for privacy-preserving digital forensics in cloud environments. Journal of Network and Computer Applications, 243,104331.
[5] Xiaohua Wu, Tingbo Zhang, Lei Chen & Zirui Wang.(2025). Privacy-preserving cross-chain asset transfers using notary schemes and zero-knowledge proofs. Cluster Computing, 28(6),387.
[6] Li Chunlei, Xing Zhibo, Liu Jiamou, Russello Giovanni, Li Zhen, Wu Yan & Asghar Muhammad Rizwan.(2025). Integrating zero-knowledge proofs into federated learning: a path to on-chain verifiable and privacy-preserving federated learning frameworks. International Journal of Web Information Systems,21(3),275-297.
[7] Butrus Mbimbi, David Murray & Michael Wilson.(2025). Preserving Whistleblower Anonymity through Zero-Knowledge Proofs and Private Blockchain: A Secure Digital Evidence Management Framework. Blockchains, 3(2), 7.
[8] Yangyang Bao, Lingrui Pan, Xiaochun Cheng & Liming Nie.(2025). Enabling privacy-preserving and distributed intelligent credit scoring by zero-knowledge proof and functional encryption. Peer-to-Peer Networking and Applications, 18(3),138.
| Downloads: | 41294 |
|---|---|
| Visits: | 835821 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks

Download as PDF