zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts

USAMA HABIB CHAUDHRY, RAZI ARSHAD*, Ayesha Khalid, Indranil Ghosh Ray, MEHDI HUSSAIN

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

With the emergence of blockchain and smart contracts, traditional digital applications such as supply chain management, identity management, banking and finance etc. are expected to be transformed into Decentralized Applications (DApps). Blockchain interoperability is a new and exciting aspect of blockchain technology that is quickly gaining popularity in many industries. However, the widespread use of blockchains has not yet been achieved because DApps running on blockchain using smart contracts, require access to authentic off-chain data. Users are more conscious of their personal data privacy and consequently are more reluctant to share their personal data, posing a challenge in the adoption of DApps. To solve this challenge, we present a novel quantum-resistant, data authentication and zero knowledge proof scheme named zk-DASTARK. Our scheme is an extension of zk-STARK, with data authentication scheme. Based on our proposed scheme, we present a novel framework which can be used to feed authenticated off-chain data to DApps without compromising user data privacy. Our proposed framework is efficient against well-known off-chain data authentication frameworks. The proposed framework is implemented on state of the art quantum-resistant IOTA Blockchain and is highly efficient as it takes approximately 60 ms to generate a proof and approximately 10 ms to verify a proof.
Original languageEnglish
JournalComputers & Electrical Engineering
Publication statusAccepted - 15 Jan 2025

Fingerprint

Dive into the research topics of 'zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts'. Together they form a unique fingerprint.

Cite this