Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
This study explored the diverse applications of zero-knowledge proofs (ZKPs) in next-generation network technologies, particularly in fifth-generation (5G) and emerging sixth-generation (6G) systems. ZKPs are cryptographic methods that enable one party to prove the validity of a statement without re...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11113307/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849392632841633792 |
|---|---|
| author | Aleksandra Szczegielniak-Rekiel Krzysztof Kanciak Jan M. Kelner |
| author_facet | Aleksandra Szczegielniak-Rekiel Krzysztof Kanciak Jan M. Kelner |
| author_sort | Aleksandra Szczegielniak-Rekiel |
| collection | DOAJ |
| description | This study explored the diverse applications of zero-knowledge proofs (ZKPs) in next-generation network technologies, particularly in fifth-generation (5G) and emerging sixth-generation (6G) systems. ZKPs are cryptographic methods that enable one party to prove the validity of a statement without revealing the statement itself, thereby offering significant advantages in privacy-preserving authentication and authorization. Given these properties, ZKPs have garnered increasing research attention in contexts such as the Internet of Things (IoT), vehicular communications, and telecommunication protocols. To the best of our knowledge, this is the first study to provide a comprehensive, taxonomy-driven analysis of ZKP applications specifically designed for 5G and beyond. We categorize existing solutions according to the type of application, the underlying cryptographic technology, maturity level, and relevance to 6G. Furthermore, this paper examines how ZKPs can help mitigate various cybersecurity threats, such as distributed denial-of-service (DDoS) attacks, man-in-the-middle attacks, and location tracking. We also assess recent advancements in ZKP acceleration techniques and highlight the key implementation challenges. Finally, this study outlines promising directions for future research in this rapidly evolving field. |
| format | Article |
| id | doaj-art-5557e9babae44f0bb388f555d7b968a4 |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-5557e9babae44f0bb388f555d7b968a42025-08-20T03:40:44ZengIEEEIEEE Access2169-35362025-01-011313835213838010.1109/ACCESS.2025.359612211113307Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future TrendsAleksandra Szczegielniak-Rekiel0https://orcid.org/0000-0003-3192-4698Krzysztof Kanciak1Jan M. Kelner2https://orcid.org/0000-0002-3902-0784Doctoral School, Military University of Technology, Warsaw, PolandInstitute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, PolandInstitute of Communications Systems, Faculty of Electronics, Military University of Technology, Warsaw, PolandThis study explored the diverse applications of zero-knowledge proofs (ZKPs) in next-generation network technologies, particularly in fifth-generation (5G) and emerging sixth-generation (6G) systems. ZKPs are cryptographic methods that enable one party to prove the validity of a statement without revealing the statement itself, thereby offering significant advantages in privacy-preserving authentication and authorization. Given these properties, ZKPs have garnered increasing research attention in contexts such as the Internet of Things (IoT), vehicular communications, and telecommunication protocols. To the best of our knowledge, this is the first study to provide a comprehensive, taxonomy-driven analysis of ZKP applications specifically designed for 5G and beyond. We categorize existing solutions according to the type of application, the underlying cryptographic technology, maturity level, and relevance to 6G. Furthermore, this paper examines how ZKPs can help mitigate various cybersecurity threats, such as distributed denial-of-service (DDoS) attacks, man-in-the-middle attacks, and location tracking. We also assess recent advancements in ZKP acceleration techniques and highlight the key implementation challenges. Finally, this study outlines promising directions for future research in this rapidly evolving field.https://ieeexplore.ieee.org/document/11113307/Accelerationauthenticationauthorizationblockchaincybersecurityfifth generation (5G) |
| spellingShingle | Aleksandra Szczegielniak-Rekiel Krzysztof Kanciak Jan M. Kelner Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends IEEE Access Acceleration authentication authorization blockchain cybersecurity fifth generation (5G) |
| title | Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends |
| title_full | Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends |
| title_fullStr | Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends |
| title_full_unstemmed | Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends |
| title_short | Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends |
| title_sort | zero knowledge proof in 5g and beyond technologies state of the arts practical aspects applications security issues open challenges and future trends |
| topic | Acceleration authentication authorization blockchain cybersecurity fifth generation (5G) |
| url | https://ieeexplore.ieee.org/document/11113307/ |
| work_keys_str_mv | AT aleksandraszczegielniakrekiel zeroknowledgeproofin5gandbeyondtechnologiesstateoftheartspracticalaspectsapplicationssecurityissuesopenchallengesandfuturetrends AT krzysztofkanciak zeroknowledgeproofin5gandbeyondtechnologiesstateoftheartspracticalaspectsapplicationssecurityissuesopenchallengesandfuturetrends AT janmkelner zeroknowledgeproofin5gandbeyondtechnologiesstateoftheartspracticalaspectsapplicationssecurityissuesopenchallengesandfuturetrends |