  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/2884</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Design of Novel Cryptographic Model Using Zero-Knowledge Proof Structure for Cyber Security Applications</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Professor, Department of Computer Science &amp; Engineering (Specialization),  School of Engineering &amp; Technology,  JAIN (Deemed-to-be University),  Bangalore, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>S.</given_name>
    <surname>S.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Centre of Research Impact and Outcome, Chitkara University, Rajpura, Punjab, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Rahul</given_name>
    <surname>Mishra</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of ISME, ATLAS SkillTech University, Mumbai, Maharashtra, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Shweta</given_name>
    <surname>Loonkar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Maharishi School of Engineering &amp; Technology, Maharishi University of Information Technology, Uttar Pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Trapty</given_name>
    <surname>Agarwal</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Chitkara Centre for Research and Development, Chitkara University, Himachal Pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Gunveen</given_name>
    <surname>Ahluwalia</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Dean R&amp;D, Department of R&amp;D, Vivekananda Global University, Jaipur, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Amandeep</given_name>
    <surname>Gill</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Privacy and security in the current modern, digital communication and data transfer-oriented world has become imperative. Most commonly used encryption methods often involve exposing sensitive information, which might be an open gate for potential vulnerabilities. This paper aims to explore the topic of applying ZKPs in cybersecurity in a comprehensive manner. For this purpose, Proposed work will provide an exhaustive description of the basic concepts of Zero-Knowledge Proofs , which refer to both the interactive and non-interactive forms of the product. Additionally, the study will focus on presenting various cryptographic protocols and algorithms utilizing Zero-Knowledge Proofs , such as zk-SNARKs and zk-STARKs . In addition to theoretical studies, Proposed work analyze the practical implementation details of Zero-Knowledge Proofs implementations , cryptographic libraries, programming languages, and frameworks commonly used to create ZKP-based applications . Zero-knowledge proofs enable groundbreaking approaches to address cybersecurity problems with an emphasis on user privacy and data confidentiality. On average, cryptographic operations experienced delays of approximately 10 milliseconds which was not intrusive for real-time systems. The system’s throughout remained at a steady average of 100 Mbps all times, so it performed well at processing data despite cryptographic overhead. The packet delivery ratio was constantly high at 98%, implying that most data packets were delivered consistently even over encrypted communication paths. </jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page></first_page>
   <last_page></last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.140110</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/2884</resource>
  </doi_data>
 </journal_article>
</journal>
