{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:19:50Z","timestamp":1754162390291,"version":"3.41.2"},"reference-count":0,"publisher":"SASA Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JISIS"],"published-print":{"date-parts":[[2025,5,30]]},"abstract":"<jats:p>Distributed trust systems have been transformed by blockchain technology; however, scalability and privacy preservation remain major obstacles. Blockchain-based ridesharing platforms, which provide decentralization, privacy, and enhanced user control inside the system, have been offered as a solution to these problems. Blockchain-based ridesharing services have scaling problems in spite of these benefits. These systems' performance declines with an increase in users, which restricts their usefulness in high-volume marketplaces. To overcome these constraints, this study investigates how blockchain topologies can use zero-knowledge proof (ZKP) approaches. We provide a thorough examination of the current ZKP implementations in blockchain systems, such as zk-Rollups and Bulletproofs, assessing their theoretical underpinnings, real-world uses, and performance indicators. Our study shows that although ZKP integration can increase throughput through rollup technologies and greatly improve privacy guarantees, computational overhead and implementation difficulties continue to be obstacles to broad adoption. Provide a framework for ZKP integration that is tailored to balance privacy, scalability, and usability. This could move blockchain technology closer to more useful real-world applications.<\/jats:p>","DOI":"10.58346\/jisis.2025.i2.061","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T05:07:12Z","timestamp":1753852032000},"page":"926-941","source":"Crossref","is-referenced-by-count":0,"title":["Zero-Knowledge Proof (ZKP) Techniques Within Blockchain Technology"],"prefix":"10.58346","volume":"15","author":[{"given":"Unnikrishnan","family":"K N","sequence":"first","affiliation":[]},{"given":"Victer Paul Victer Paul","family":"P","sequence":"additional","affiliation":[]}],"member":"37075","published-online":{"date-parts":[[2025,5,30]]},"container-title":["Journal of Internet Services and Information Security"],"original-title":[],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T05:07:13Z","timestamp":1753852033000},"score":1,"resource":{"primary":{"URL":"https:\/\/jisis.org\/wp-content\/uploads\/2025\/07\/2025.I2.061.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,30]]},"references-count":0,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,5,30]]},"published-print":{"date-parts":[[2025,5,30]]}},"URL":"https:\/\/doi.org\/10.58346\/jisis.2025.i2.061","relation":{},"ISSN":["2182-2069","2182-2077"],"issn-type":[{"type":"print","value":"2182-2069"},{"type":"electronic","value":"2182-2077"}],"subject":[],"published":{"date-parts":[[2025,5,30]]}}}