Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends

This study explored the diverse applications of zero-knowledge proofs (ZKPs) in next-generation network technologies, particularly in fifth-generation (5G) and emerging sixth-generation (6G) systems. ZKPs are cryptographic methods that enable one party to prove the validity of a statement without re...

Full description

Saved in:
Bibliographic Details
Main Authors: Aleksandra Szczegielniak-Rekiel, Krzysztof Kanciak, Jan M. Kelner
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11113307/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849392632841633792
author Aleksandra Szczegielniak-Rekiel
Krzysztof Kanciak
Jan M. Kelner
author_facet Aleksandra Szczegielniak-Rekiel
Krzysztof Kanciak
Jan M. Kelner
author_sort Aleksandra Szczegielniak-Rekiel
collection DOAJ
description This study explored the diverse applications of zero-knowledge proofs (ZKPs) in next-generation network technologies, particularly in fifth-generation (5G) and emerging sixth-generation (6G) systems. ZKPs are cryptographic methods that enable one party to prove the validity of a statement without revealing the statement itself, thereby offering significant advantages in privacy-preserving authentication and authorization. Given these properties, ZKPs have garnered increasing research attention in contexts such as the Internet of Things (IoT), vehicular communications, and telecommunication protocols. To the best of our knowledge, this is the first study to provide a comprehensive, taxonomy-driven analysis of ZKP applications specifically designed for 5G and beyond. We categorize existing solutions according to the type of application, the underlying cryptographic technology, maturity level, and relevance to 6G. Furthermore, this paper examines how ZKPs can help mitigate various cybersecurity threats, such as distributed denial-of-service (DDoS) attacks, man-in-the-middle attacks, and location tracking. We also assess recent advancements in ZKP acceleration techniques and highlight the key implementation challenges. Finally, this study outlines promising directions for future research in this rapidly evolving field.
format Article
id doaj-art-5557e9babae44f0bb388f555d7b968a4
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-5557e9babae44f0bb388f555d7b968a42025-08-20T03:40:44ZengIEEEIEEE Access2169-35362025-01-011313835213838010.1109/ACCESS.2025.359612211113307Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future TrendsAleksandra Szczegielniak-Rekiel0https://orcid.org/0000-0003-3192-4698Krzysztof Kanciak1Jan M. Kelner2https://orcid.org/0000-0002-3902-0784Doctoral School, Military University of Technology, Warsaw, PolandInstitute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, PolandInstitute of Communications Systems, Faculty of Electronics, Military University of Technology, Warsaw, PolandThis study explored the diverse applications of zero-knowledge proofs (ZKPs) in next-generation network technologies, particularly in fifth-generation (5G) and emerging sixth-generation (6G) systems. ZKPs are cryptographic methods that enable one party to prove the validity of a statement without revealing the statement itself, thereby offering significant advantages in privacy-preserving authentication and authorization. Given these properties, ZKPs have garnered increasing research attention in contexts such as the Internet of Things (IoT), vehicular communications, and telecommunication protocols. To the best of our knowledge, this is the first study to provide a comprehensive, taxonomy-driven analysis of ZKP applications specifically designed for 5G and beyond. We categorize existing solutions according to the type of application, the underlying cryptographic technology, maturity level, and relevance to 6G. Furthermore, this paper examines how ZKPs can help mitigate various cybersecurity threats, such as distributed denial-of-service (DDoS) attacks, man-in-the-middle attacks, and location tracking. We also assess recent advancements in ZKP acceleration techniques and highlight the key implementation challenges. Finally, this study outlines promising directions for future research in this rapidly evolving field.https://ieeexplore.ieee.org/document/11113307/Accelerationauthenticationauthorizationblockchaincybersecurityfifth generation (5G)
spellingShingle Aleksandra Szczegielniak-Rekiel
Krzysztof Kanciak
Jan M. Kelner
Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
IEEE Access
Acceleration
authentication
authorization
blockchain
cybersecurity
fifth generation (5G)
title Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
title_full Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
title_fullStr Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
title_full_unstemmed Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
title_short Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends
title_sort zero knowledge proof in 5g and beyond technologies state of the arts practical aspects applications security issues open challenges and future trends
topic Acceleration
authentication
authorization
blockchain
cybersecurity
fifth generation (5G)
url https://ieeexplore.ieee.org/document/11113307/
work_keys_str_mv AT aleksandraszczegielniakrekiel zeroknowledgeproofin5gandbeyondtechnologiesstateoftheartspracticalaspectsapplicationssecurityissuesopenchallengesandfuturetrends
AT krzysztofkanciak zeroknowledgeproofin5gandbeyondtechnologiesstateoftheartspracticalaspectsapplicationssecurityissuesopenchallengesandfuturetrends
AT janmkelner zeroknowledgeproofin5gandbeyondtechnologiesstateoftheartspracticalaspectsapplicationssecurityissuesopenchallengesandfuturetrends