Implementation of a zero-disclosure proof algorithm in digital identity technology in the management of technological processes of the enterprise

Authors

DOI:

https://doi.org/10.17308/sait/1995-5499/2024/2/113-122

Keywords:

Decentralization, Cryptography, Blockchain, zk-SNARK Decentralization, Zero Knowledge Proof

Abstract

The paper discusses models and methods for implementing cryptographic algorithms of zero proof knowledge and discusses various forms of these algorithms, such as zk-SNARK and zk-STARK. The application of the implementation of these algorithms is discussed within the framework of building a digital (sovereign) personality system. The paper also examines in detail the zk-STARK technology, provides sequential steps and mathematical abstractions that can implement such an algorithm and apply it in the solution being designed. The implementation of the algorithm is given by the example of the formulation of the Collatz hypothesis, the construction of the query, the formation of the constraints of the query (constraints) is considered, an example of the formation of a polynomial with a high degree and the subsequent application of the FRI technology (Fast Reed-Solomon Interactive Oracle Proofs of Proximity) is described. The paper also examines the mechanism of working with the degrees of the polynomial, which allows to reduce the degree and simplify the operation of the algorithm. A new method is proposed to improve the security of systems using a distributed data registry (blockchain): the paper considers a developed prototype using zk-STARK technology, which gets rid of a trusted installation (a potential vulnerability of zk-SNARK) and implements an attack-resistant algorithm using quantum computers. The application of the algorithm is considered on the prototype of the blockchain, which allows you to issue new transactions with support for the described method. The paper presents the prototype metrics, measurement of the number of transactions per second, as well as the response time of the blockchain node and the RAM consumed by one node.

Author Biographies

  • Artem S. Akutin, Saratov State Technological University named after Yu. A. Gagarin

    a postgraduate student of the Department of Applied Information Technologies of the Saratov State Technological University named after Yu. A. Gagarin

  • Alexander V. Brovko, Saratov State Technological University named after Yu. A. Gagarin

    Candidate of Technical Sciences, Associate Professor, Professor of the PIT Department of the Saratov State Technological University named after Yu. A. Gagarin

References

Published

2024-10-14

Issue

Section

Information Security

How to Cite

Implementation of a zero-disclosure proof algorithm in digital identity technology in the management of technological processes of the enterprise. (2024). Proceedings of Voronezh State University. Series: Systems Analysis and Information Technologies, 2, 113-122. https://doi.org/10.17308/sait/1995-5499/2024/2/113-122

Most read articles by the same author(s)