1. Introduction
The development of the Internet enables people to share their digital creations, such as music, video, pictures, etc., anytime and anywhere, which usually requires a lot of time and energy from creators. However, digital content distributed on the Internet is easy to capture, easy to copy, and fast to spread [
1], which means digital content can easily be maliciously copied, posing a serious threat to the protection of intellectual property rights. In order to protect the rights and interests of creators, increase their enthusiasm, and, at the same time, protect the privacy and security of users, an advanced method must be adopted to ensure the reliability and traceability of data.
Copyright protection technology of digital content must also keep up with the rapid development of digitalization. The traditional method of copyright protection requires a centralized and trustworthy organization, which has many limitations, including reliance on centralized organizations and untraceable and easily tampered-with copyright records. Specifically, centralized institutions carry the risk of a single point of failure, and once a central server fails, it can lead to system paralysis, forced suspension of copyright protection services for creators, or even data loss, causing copyright disputes. Secondly, via traditional methods, the circulation of copyright information often lacks transparency and traceability, and creators are unable to control the use and protection of their personal information during the authentication process. This opacity can create information asymmetry between users and institutions, potentially leading to the misuse of information and thus increasing the risk of privacy leakage. Finally, traditional methods are susceptible to the risk of data tampering, as network attackers can modify or forge copyright information, thereby infringing on the rights of creators, leading to copyright disputes and piracy issues. Therefore, traditional intellectual property protection methods are obviously no longer able to meet the development needs of the digital copyright industry, and there is an urgent need for new technology to solve the above problems.
In 2008, Satoshi Nakamoto published a paper titled “Bitcoin: A peer-to-peer electronic cash system” [
2], which proposed a decentralized trading system with blockchain technology as the core technology. In blockchain technology, each node is a peer, ensuring the symmetry of information. Blockchain technology is a decentralized distributed ledger technology in which all nodes participate in maintaining a public ledger through a consensus mechanism. Blockchain uses cryptographic hash functions to calculate a hash value of data in a block, and the latter block stores the hash value of the previous block, forming a chain structure. Due to the characteristics of hash functions, any modification to data will cause changes in the hash value, thereby disrupting the integrity of the blockchain. This method achieves the immutability of on-chain data [
3]. Due to the openness and transparency of the ledger, as well as the chain structure of storage, it is easy to trace the entire transaction chain. The decentralized, tamper-proof, and traceable features of blockchain technology perfectly solve the three problems faced by traditional intellectual property protection technologies mentioned above.
However, blockchain technology also has some shortcomings when used for intellectual property authentication. Intellectual property requires the provision of creators’ personal information, work details, and other privacy information during the authentication process. The transparent nature of blockchain technology requires all information to be stored in public ledgers, and all nodes in the blockchain can view it, which leads to the leakage of creators’ privacy information. Moreover, blockchain technology uses pseudonyms rather than complete anonymity, but with the help of big data analysis and sociological mining methods, real identities in the real world can be mapped to public key addresses [
4,
5]. Users all hope that their privacy and security can be protected, especially in scenarios like intellectual property authentication where personal privacy data must be submitted. Therefore, there is an urgent need for a new technology that can achieve intellectual property authentication while protecting privacy data.
In this paper, we propose a method that combines ECC encryption and digital signatures to achieve selective encryption of user personal information after analyzing the issue of personal privacy information leakage in blockchain-based intellectual property authentication processes. An authentication algorithm based on zk-SNARK is adopted to achieve the authentication of intellectual property ownership in the case of encrypting personal privacy data. The main contributions of this paper are outlined as follows:
We propose a scheme that combines ECC encryption and digital signature to achieve selective disclosure of personal information. Then, a digital signature algorithm is adopted for the intellectual property registration information to ensure the integrity and non-falsifiability of the registration information.
We propose an intellectual property authentication algorithm based on zk-SNARK. The user first generates a digital digest of the plaintext intellectual property registration information through a hash algorithm and then encrypts the intellectual property registration information and uploads it to the blockchain. Finally, the zero-knowledge proof algorithm is used to verify the digital abstract without exposing plaintext information.
We utilize the IPFS distributed storage system for storing large files, while only the IPFS address of the file is recorded on the blockchain. This approach effectively addresses the issue of limited storage capacity on the blockchain, enabling the accommodation of large files without the constraints of blockchain space.
3. Proposed Method
3.1. Problem Analysis
Data stored on the blockchain can achieve data traceability and tamper resistance. Especially in the field of intellectual property certification, using blockchain technology to record the registration information of intellectual property can ensure the immutability and traceability of intellectual property information, greatly reducing the difficulty of evidence collection in the process of intellectual property traceability. The decentralized storage mode of blockchain also avoids the potential single point of failure problem that may occur in centralized storage. The openness of blockchain allows any node to freely join the network, and through consensus mechanisms, data in the network can obtain high reliability. Therefore, blockchain-based intellectual property authentication methods can overcome many of the problems associated with traditional centralized authentication schemes. However, although the open and transparent nature of blockchain technology enables the traceability of the authentication process, it also causes many problems in terms of privacy protection. Therefore, the following issues must be considered before model design can commence:
- 1.
How to store intellectual property registration information on a publicly transparent blockchain without disclosing the user’s personal privacy information.
Blockchain technology, with its open, transparent, and tamper-proof features, is commonly used in applications such as identity verification and intellectual property authentication. In our scheme, the registration details of intellectual property are recorded on the blockchain, making them accessible for public viewing. However, the natural openness of blockchain technology conflicts with the need for privacy protection in the process of intellectual property registration: on the one hand, it is necessary to store intellectual property-related information and personal identity information on the chain, retaining evidence of intellectual property ownership. On the other hand, data on the blockchain are visible to all participating nodes. How to effectively conceal sensitive information of users and intellectual property in such an open and transparent system while avoiding privacy leakage has become a problem that needs to be solved. Therefore, we use ECC encryption to encrypt user and intellectual property privacy information, store it on the chain, and ensure the integrity and authenticity of the data through digital signature algorithms.
- 2.
How to authenticate intellectual property ownership while encrypting personal information.
In order to protect user privacy on a transparent blockchain, it is necessary to encrypt user personal information before uploading it to the blockchain for storage. However, achieving intellectual property ownership authentication while encrypting personal information is a problem that needs to be solved. Therefore, we propose an intellectual property authentication method based on non-interactive zero-knowledge proof, which achieves the protection of the user’s personal privacy information while completing the authentication of intellectual property. The entire process is as follows: the creator first performs a hash operation on the registration information containing personal information and intellectual property information in the plaintext to obtain a hash value. Then, a non-interactive zero-knowledge proof algorithm is used to generate a zero-knowledge proof regarding the hash operation. Finally, personal information is encrypted, and the encrypted registration information and generated zero-knowledge proof are uploaded to the system. Other nodes in the blockchain can verify the authenticity of the hash operation through the uploaded zero-knowledge proofs.
- 3.
How to save large files in capacity-limited blocks.
Blockchain is a distributed ledger that contains various transaction records and is essentially a decentralized database. However, the storage capacity of each block in the blockchain is limited, usually limited to around 1 MB. In the process of intellectual property registration, creators need to upload intellectual property works, and the size of intellectual property works usually exceeds the capacity limit of the blockchain. In addition, the size of the zero-knowledge proof file generated in question 2 also exceeds the capacity limit of the block, so it cannot be directly stored on the blockchain. To address this issue, we adopt IPFS to store all intellectual property works and zero-knowledge proofs. After storing the content in IPFS, IPFS will return a hash address for the content. In the blockchain, only the hash address needs to be stored to determine the corresponding original file in IPFS. In this way, large files are stored offline, successfully overcoming blockchain storage limitations without affecting blockchain performance.
3.2. Blockchain Platform Selection
As blockchain technology becomes more widely adopted, numerous blockchain development environments tailored to specific scenarios have emerged. Among these many options, the Ethereum and Bitcoin blockchains are the two most frequently used platforms. In addition, there are other significant platforms, including Hyperledger Fabric. A comparison of several blockchain platforms is presented in
Table 1.
Our intellectual property authentication scheme is based on smart contract technology. As a platform that supports smart contract development, the Ethereum blockchain provides the ability to implement the functions required for the scheme. In addition, Ethereum can support a wide variety of chains that can meet the needs of different application scenarios. Ethereum also has a large and vibrant community consisting of developers, researchers, and various businesses who work together to promote the growth of the Ethereum ecosystem, providing technical assistance, development tools, and educational resources, bringing abundant resources and strong support to developers. Therefore, after careful consideration, our scheme chooses Ethereum as the blockchain platform.
3.3. Architecture Design
The traditional authentication method requires users to provide personal information and compare it with the information stored in the database to complete authentication. However, personal information sent during the authentication process is easily intercepted, leading to privacy leakage. Despite years of effort by researchers to develop many authentication methods that do not require users’ personal information, users still need to provide at least some personal information, and they cannot independently choose which information to hide and which information to disclose. In order to solve the problems of traditional authentication methods mentioned above, we propose an intellectual property authentication scheme based on zero-knowledge proof that can selectively expose personal information or completely not expose any personal information. The architecture diagram of this scheme is shown in
Figure 1.
From
Figure 1, it can be seen that the scheme is divided into four entities: user, blockchain, IPFS, and smart contract. Initially, the system manager deploys the smart contract to the blockchain network. Then, the user fills in the intellectual property registration information according to the parameters specified in the smart contract, generates a hash digest of the registration information through a hash function, and calls the function in the smart contract to upload the intellectual property registration information to the blockchain network. Subsequently, the user generates a zero-knowledge proof related to the hash function and calls the function in the smart contract to upload both the intellectual property file and the zero-knowledge proof file to IPFS for distributed storage. If successfully uploaded, IPFS will return a storage address. Other users can obtain the registration information from the blockchain records. Finally, they can access the zero-knowledge proof file using the storage address recorded on the registration information to authenticate the intellectual property.
The entire plan is divided into seven steps, as shown in
Figure 2.
Step 1: Filling in information phase.
Intellectual property creators shall fill in the relevant fields according to the requirements of
Table 2 for intellectual property registration in plaintext form.
Step 2: Hash digest generation phase.
A hash digest of plaintext registration information is generated using the hash function.
Step 3: Digital signature generation phase.
The creator uses their private key to generate a digital signature of the hash digest generated in the previous step.
Step 4: Zero-knowledge proof generation phase.
The creator generates a zero-knowledge proof concerning the hash operation in step 2 and uploads it along with the verification key to IPFS. Then, IPFS will return a storage address.
Step 5: Encryption phase.
The creator creates a selective disclosure rule for the intellectual property registration information and selects personal privacy information, such as ID number, that they do not want to be exposed. The smart contract will automatically encrypt plaintext intellectual property registration information through the creator’s public key based on the rule.
Step 6: Uploading phase.
The encrypted intellectual property registration information is uploaded to the Ethereum blockchain network. Although all nodes in the blockchain can view the registration information, since the privacy information was encrypted in step 5, personal privacy information will not be disclosed.
Step 7: Zero-knowledge proof verification phase.
All other users in the blockchain can obtain zero-knowledge proof files through the storage address in step 4 to authenticate the registered information.
3.4. Selective Information Disclosure Scheme
When registering intellectual property rights, it is easy to disclose the user’s personal identity and confidential intellectual property information. In our proposed scheme, users can selectively disclose their identity information or encrypt the information they do not want to disclose. Creators need to upload intellectual property and author-related information as proof of intellectual property registration. The content of the intellectual property registration information structure is shown in
Table 2.
Intellectual property registration information includes the intellectual property name, author’s name, author’s ID number, author’s institution, intellectual property type, intellectual property storage location on IPFS, zero-knowledge proof storage location on IPFS, author’s Ethernet address, encryption public key, registration information hash value, and a digital signature generated by the hash value. Among them, the storage location of zero-knowledge proof on IPFS must be publicly available as it is used by other nodes to obtain zero-knowledge proof files for intellectual property authentication. The public encryption key is used to encrypt personal information that needs to be hidden. Only the creator can use the corresponding private key for decryption, and this field must be public. The hash value of registration information is calculated from the plaintext of all the fields mentioned above using the hash function, which serves as the digest of the entire intellectual property registration information. This field is one of the important parameters for zero-knowledge proof verification and must also be made public.
3.4.1. Digital Signature Generation
Firstly, users need to accurately fill out the required fields in the intellectual property registration information in clear text. Next, users must concatenate the contents of each field in the intellectual property registration information to obtain a string composed of concatenated field contents, which is voucher data to be signed. Then, a hash operation is performed on the concatenated string to obtain a hash value, which is also known as the digest of intellectual property registration information. Finally, the intellectual property creator uses their private key to sign the hash digest of the registration information, thereby generating a digital signature of the registration information, which is attached to the intellectual property registration information. This digital signature is mainly used to verify the authenticity and integrity of all field contents in the registration information to ensure that the certificate has not been tampered with or forged. The process of generating signatures is shown in
Figure 3, and the main pseudocodes of the signature generation algorithm logic are shown in Algorithm 1.
Algorithm 1 Digital Signature Generation |
- 1:
Input:
- 2:
Output:
- 3:
function
- 4:
- 5:
▹P is a point on an elliptic curve - 6:
- 7:
return - 8:
end function
|
The specific process of the signature generation algorithm is as follows:
The private key
is a random integer within [1,
], where
n is the multipliable order of the elliptic curve parameters.
Calculate the public key
using the
and elliptic curve base point
G, as shown in Equation (
2).
Calculate the hash digest
h of intellectual property registration information
m using the
hash function. The relationship between
m and
h is shown in Equation (
3).
Choose a random number
and multiply it by the base point
G of the elliptic curve to obtain a point
on the elliptic curve. The specific calculation method of function
() in Algorithm 1 is shown in Equation (
4).
Calculate the signature using Equations (
5) and (
6), where
.
3.4.2. Digital Signature Verification
Firstly, we use the digest (the hash field) of the intellectual property registration information generated in
Section 3.4.1 to calculate the publicly available encryption public key (the encrypt_pk field) in the intellectual property registration information to generate a voucher for verifying the digital signature. The verification voucher is compared with the digital signature information. If the comparison results are consistent, it indicates that the intellectual property registration information is signed by the intellectual property creator himself and has not been tampered with. If the comparison results are inconsistent, it indicates that the intellectual property registration information may have been tampered with or forged. The signature verification process is shown in
Figure 4, and the signature verification algorithm is shown in Algorithm 2.
The specific process of the signature verification algorithm is as follows:
Verify that both r and s in are integers within the range of [1, ], otherwise verification will fail.
Calculate the parameter
w according to Equations (
7),
.
Calculate parameters
u and
v according to Equations (
8) and (
9),
.
Calculate another point
on the elliptic curve based on parameters
u and
v. The specific calculation method of function
() in Algorithm 2 is shown in Equation (
10).
Verify the
. If Equation (
11) holds, verification is successful; otherwise, verification fails.
Algorithm 2 Digital Signature Verification |
- 1:
Input:
- 2:
Output: or - 3:
function
- 4:
- 5:
- 6:
▹ - 7:
▹Q is a point on an elliptic curve - 8:
- 9:
return - 10:
- 11:
return - 12:
end function
|
3.5. Authentication Scheme Design
Our scheme employs a special type of succinct, non-interactive zero-knowledge proof. The key features of zk-SNARK include allowing the verifier to confirm the correctness of statements without revealing any vital information, thereby protecting user privacy, a concept referred to as
zero-knowledge. Additionally, the proofs are consistently small in size, meeting the
succinct criterion. The verification process is
non-interactive, meaning the verifier does not need to make any further inquiries to validate the proof. zk-SNARKs can prove any computational relationship, encompassing both P and NP problems, where
represents a confidential value that must remain undisclosed. The fundamental transformation relationship of the zk-SNARK protocol is illustrated in
Figure 5.
To avoid revealing secret , it is necessary to use the R1CS constraint to describe the operational rules of algorithm equivalently. It is important to publicly disclose the R1CS constraint, then convert to satisfy any computational relationship equivalently, then equivalently transform into the polynomial coefficient vector of the objective polynomial divided by the QAP polynomial, and finally, equivalently transform it into calculating the discrete logarithm point (polynomial commitment) of the elliptic curve based on the polynomial coefficient vector , forming the discrete logarithm difficulty problem. The verifier reconstructed the integer division relationship based on elliptic curve discrete logarithmic points (polynomial commitment) and verified the correctness of the vector , but the prover did not leak the vector . The following sections provide a detailed introduction to NP problems, R1CS constraints, and QAP.
3.5.1. NP Problem and Reduction
When the solution time of a problem is polynomial proportional to its scale, we say that the problem has polynomial time complexity. Usually, such problems are divided into two categories: P problems and NP problems. P problems refer to problems that can be solved by deterministic Turing machines in polynomial time. For such problems, an algorithm exists that can quickly find the solution to the problem under the constraint of polynomial functions of input size. On the other hand, NP problems are problems where candidate solutions can be verified by deterministic Turing machines in polynomial time. Intuitively speaking, NP problems refer to problems that easily verify the correctness of a solution, but the process of finding a solution may be difficult and usually cannot be solved in polynomial time. For example, given the function value y and the hash function , the hash preimage x is found. The hash preimage x and function value y are required to satisfy . This problem cannot be solved in polynomial time for the preimage x and requires exponential time. However, once the preimage x is given, it can be verified in polynomial time whether the preimage x and the function value y satisfy the calculation relationship.
The polynomial division problem is another NP problem. Given a polynomial
of order
n and three sets of polynomials
,
,
of order
, find vector
and satisfy the integer division relationship of Equation (
12).
where vector
is the coefficient of each set of polynomials. If vector
is not known, you can only randomly select a vector
to verify whether the division relationship of Equation (
12) holds. Therefore, exponential time is required to violently search for vector
. However, once the vector
is given, it can be quickly verified whether the polynomial satisfies the integer division relationship.
Reduction is a proof strategy that transforms the solution of one problem into the solution of another, which is both efficient and reliable. If problem A can be reduced to problem B, it means that once the solution to problem B is found, this solution can be used to deal with problem A. Our scheme takes the user’s intellectual property registration information as the hash preimage x, calculates the hash function value y through the function, and then reduces the problem of finding the hash preimage x to the polynomial division problem. This is because the polynomial division problem is more suitable as an input for zero-knowledge proof algorithm circuits.
3.5.2. R1CS
A Rand-1 Constraint System (R1CS) is a sequence of three vectors
whose solution is a vector
that satisfies Equation (
13).
Given
variables (the first variable is always set to 1) and constraints, all R1CS descriptions can be seen in
Figure 6 as follows:
Each row is a constraint, and the constraint in the first row can be represented as follows:
3.5.3. QAP and Arithmetic Circuits
Quadratic arithmetic programs (QAPs) can be seen as an abstract representation of a specific set of computations, expressing computational tasks in the form of polynomials and quadratic equations. Through this approach, QAP can transform complex computational tasks into problems that validate polynomials with specific relationships. This transformation enables verification of the correctness of calculations without revealing specific computational details, which is precisely the characteristic required for zero-knowledge proof. The polynomial division problem mentioned in
Section 3.5.1 is an m-bit QAP.
In mathematics, when a series of correspondences between
x and
y are given, a polynomial can be determined through Lagrangian interpolation:
Among them,
refer to the Lagrangian basis, and the calculation formula is as follows:
In the framework of R1CS, U, V, and W in
Figure 6 represent vectors based on the Lagrangian basis rather than traditional polynomial coefficient forms. Before mapping R1CS to the QAP, in order to ensure that the polynomials obtained after mapping to QAP maintain nonlinear independence, it is necessary to first extend the existing constraint system to introduce new constraints. Mapping R1CS to the QAP is shown in
Figure 7.
3.5.4. Zero-Knowledge Proof Generation
The algorithmic flow of our scheme, depicted in
Figure 8, starts by flattening the hash operation on the user’s intellectual property registration information into a low-order circuit, then converting it into an R1CS structure as described in
Section 3.5.2. Next, it is converted into a QAP to make it easier to use the zero-knowledge proof algorithm. To ensure the security of zero-knowledge proof, a trusted setup is required to generate a common reference string (CRS) from which the proving key (PK) and verifying key (VK) are derived. Although the proving key and the verifying key are functionally independent, they are interdependent when used. The proof generated by the proving key can only be correctly verified through the corresponding verifying key. The generation and verification process of zero-knowledge proof in our scheme has been optimized. Our scheme adopts off-chain generation proof and on-chain verification to alleviate the computational pressure on the Ethereum blockchain network and improve its efficiency. After users generate proof off-chain, they upload it to the chain and verify it through the deployed smart contract.
The verification scheme in
Figure 8 refers to verifying the hash operation
, where
x represents the intellectual property registration information and
y represents the digest of the registration information. The process of flattening in the figure is to encode the hash operation into a low-order circuit, convert the low-order circuit into an R1CS structure, and then convert it to a QAP. This article uses the zorates tool to convert hash operations to QAPs. The zorates code is shown in Algorithm 3. To ensure the security of the non interactive zero-knowledge proof interaction process, it is necessary to set its trustworthiness and generate a public string for generating and verifying proofs. In order to alleviate the computational pressure on Ethereum and improve its efficiency, this article adopts a combination of on-chain and off-chain methods to optimize this method. In other words, the proof generation part that requires a large amount of computation is placed offline, and only identity verification operations are performed on the chain.
Algorithm 3 Conversion from Hash to R1CS |
- 1:
import “hashes/sha256/256bitPadded” as sha256 - 2:
import “utils/pack/u32/unpack128” as unpack128 - 3:
import “utils/pack/u32/pack128” as pack128 - 4:
def main(private field[2] preimage, field h0, field h1): - 5:
u32[4] a_bits = unpack128(preimage[0]) - 6:
u32[4] b_bits = unpack128(preimage[1]) - 7:
u32[8] privkey = […a_bits, …b_bits] - 8:
u32[8] res = sha256(privkey) - 9:
assert(h0 == pack128(res[0..4])) - 10:
assert(h1 == pack128(res[4..8]))
|
The specific process of generating zero-knowledge proof is as follows:
Step 1: Define a relationship generator.
Step 2: Convert hash into an arithmetic circuit.
Convert the
operation for calculating personal information hash values into an arithmetic circuit. Then, convert it into R1CS constraints and QAP polynomials using the methods introduced in
Section 3.5.2 and
Section 3.5.3. Next, define
as
and
as
. Satisfy the following Equation (
19) when
:
Step 3: Generate CRS.
Randomly select parameter
, let
,
, and calculate
,
through
:
where
is a point on elliptic curve
, and
is a point on elliptic curve
.
Step 4: Generate the proving key and verifying key.
The proving key
and verifying key
can be calculated using Equations (
22) and (
23).
It can be seen that the size of depends on the number of common input variables, and the size of is related to the overall number of variables.
Step 5: Generate the zero-knowledge proof
.
Choose
and calculate the zero-knowledge proof
when
are known, where
where
A is a point on
,
B is a point on
, and
C is a point on
. The calculation formula for
in Equation (
27) is as follows:
The verifier verifies whether Equation (
29) holds and outputs true or false.
3.5.5. Authentication
After the user successfully uploads and records their intellectual property registration information on the blockchain, the hash value of the certificate will be recorded on the blockchain. At the same time, the blockchain will also record the user’s blockchain address eth_addr, the user’s digital signature, the hash value of intellectual property information hash, and the zero-knowledge proof address proof_addr of the hash digest of intellectual property information stored on IPFS. Using this zero-knowledge proof document, other users can verify the registration information of intellectual property. The specific authentication process mainly includes the following steps:
Step 1: getMessage→(eth_addr, hash, proof_addr, signature).
When users apply for intellectual property verification, they need to submit the application using their own blockchain address eth_addr for the verification node to verify. The verification node will use this address to call the smart contract and retrieve user information stored on the blockchain, including eth_addr, hash, proof_addr, and signature.
Step 2: getZeroProof(proof_addr)→.
The verification node then utilizes the proof_addr to obtain the zero-knowledge proof stored in IPFS.
Step 3: verifyZeroProof(,pp,vk) → accept or reject.
The verification node uses the verification key and the system provided public parameter to verify the zero-knowledge proof . If verification is successful, the result is , otherwise .
The main pseudocode algorithms for the above authentication process are presented in Algorithm 4.
Algorithm 4 Intellectual Property Authentication |
- 1:
Input:
- 2:
Output: or - 3:
function
- 4:
- 5:
( - 6:
- 7:
return - 8:
- 9:
return - 10:
return - 11:
end function
|
6. Conclusions
After analyzing the issue of personal privacy information leakage in the process of blockchain-based intellectual property authentication, we proposed a blockchain-based intellectual property authentication method with privacy protection. Firstly, we proposed a scheme that combines ECC encryption and digital signatures to address the issue of personal privacy information leakage during the intellectual property registration process, allowing for selective disclosure of personal information. We also adopted a digital signature algorithm to ensure the integrity and non-falsifiability of the registration authentication information. Additionally, we introduced a zk-SNARK-based algorithm to authenticate encrypted information, enabling the verification of intellectual property ownership while safeguarding personal privacy data. Finally, to address the issue of storing large intellectual property and zero-knowledge proof files, which are too voluminous for blockchain, we introduced the IPFS distributed storage system. This system accommodates all large files externally while only the corresponding storage addresses are recorded on the blockchain. To assess the performance of our algorithm comprehensively, we conducted tests on its efficiency in encryption, decryption, and the generation and verification of zero-knowledge proofs. The results show that the scheme performed well. In the future, we will explore a more efficient privacy protection scheme that simultaneously protects users’ intellectual property and their personal privacy and security.