CFP last date
20 October 2025
Reseach Article

ZkVault: A Privacy-Preserving Smart Contract Framework for Confidential Transactions and Data Feeds

by Jitendra Sharma, Jigyasu Dubey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 44
Year of Publication: 2025
Authors: Jitendra Sharma, Jigyasu Dubey
10.5120/ijca2025925766

Jitendra Sharma, Jigyasu Dubey . ZkVault: A Privacy-Preserving Smart Contract Framework for Confidential Transactions and Data Feeds. International Journal of Computer Applications. 187, 44 ( Sep 2025), 55-64. DOI=10.5120/ijca2025925766

@article{ 10.5120/ijca2025925766,
author = { Jitendra Sharma, Jigyasu Dubey },
title = { ZkVault: A Privacy-Preserving Smart Contract Framework for Confidential Transactions and Data Feeds },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2025 },
volume = { 187 },
number = { 44 },
month = { Sep },
year = { 2025 },
issn = { 0975-8887 },
pages = { 55-64 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number44/zkvault-a-privacy-preserving-smart-contract-framework-for-confidential-transactions-and-data-feeds/ },
doi = { 10.5120/ijca2025925766 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-09-23T00:37:27.950881+05:30
%A Jitendra Sharma
%A Jigyasu Dubey
%T ZkVault: A Privacy-Preserving Smart Contract Framework for Confidential Transactions and Data Feeds
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 44
%P 55-64
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Smart contracts are gradually replacing traditional text-based contracts, as they clearly demonstrate the power of blockchain technology in developing digital contracting that promises decentralized and contract execution without third-party intervention. The open nature of the public blockchains, however, reveals transactional information and smart contract logic, which can present a sizable privacy threat in some highly regulated industries, like healthcare, finance, and identity management. In order to alleviate these constraints, we propose a modular privacy-preserving framework called ZkVault that separates the computation problem, proof generation, and verification into three separate components, to be more flexible and extendable. ZkVault can easily replace secure oracle modules in order to read privacy-preserving off-chain data feeds that allow dynamic contract interaction with external data. Constructed out of zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) and Pedersen commitments, ZkVault ensures: (1) data confidentiality hiding the inputs and intermediate computations; (2) verifiable computation which can be proven to third parties that no contract stages have been corrupted, without revealing any private data; and (3) scalability which off-loads most of the computation off-chain to reduce blockchain overhead. According to experiments that demonstrate that ZkVault can achieve a 40-60 % gas savings over legacy on-chain mechanisms, proof generation imposes a relatively small overhead of ~4s per transaction, which in practice is reasonable. These findings show that ZkVault can provide very robust privacy guarantees and implementation efficiency without sacrificing auditability, and as such, is a strong candidate for next-generation privacy-preserving dApps.

References
  1. E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from Bitcoin,” in Proc. IEEE Symp. Security and Privacy (SP), San Jose, CA, USA, May 2014, pp. 459–474, doi: 10.1109/SP.2014.36.
  2. Aztec Network, “Aztec Protocol: Privacy infrastructure on Ethereum,” https://aztec.network/, accessed Jun. 18, 2025.
  3. EY Global, “Nightfall: Private transactions on Ethereum,” GitHub, 2019. https://github.com/EYBlockchain/nightfall, accessed Jun. 18, 2025.
  4. T. Jedusor, “Mimblewimble whitepaper,” 2016. https://github.com/mimblewimble/grin/blob/master/doc/whitepaper/whitepaper.md, accessed Jun. 18, 2025.
  5. Chainlink Labs, “Chainlink: Decentralized oracle networks,” https://chain.link/, accessed Jun. 18, 2025.
  6. F. Zhang, E. Cecchetti, K. Croman, A. Juels, and E. Shi, “Town Crier: An authenticated data feed for smart contracts,” in Proc. ACM Conf. Computer and Communications Security (CCS), Dallas, TX, USA, Oct. 2016, pp. 270–282, doi: 10.1145/2976749.2978326.
  7. A. Juels, I. Kosba, and E. Shi, “DECO: Liberating web data using decentralized oracles,” Chainlink Labs and IC3, White Paper, 2020. https://deco.org/, accessed Jun. 18, 2025.
  8. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of blockchain technology: Architecture, consensus, and future trends,” in Proc. IEEE Int. Congr. Big Data, Honolulu, HI, USA, 2017, pp. 557–564.
  9. G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, vol. 151, 2014.
  10. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. https://bitcoin.org/bitcoin.pdf
  11. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proc. IEEE Symp. Security and Privacy (SP), 2016, pp. 839–858.
  12. B. Buenz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell, “Bulletproofs: Short proofs for confidential transactions and more,” in Proc. IEEE Symp. Security and Privacy (SP), 2018, pp. 315–334.
  13. E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, and M. Virza, “SNARKs for C: Verifying program executions succinctly and in zero knowledge,” in Advances in Cryptology—CRYPTO 2013, pp. 90–108.
  14. L. Fan, L. Zhang, and J. Liu, “An efficient and privacy-preserving data aggregation scheme for smart grid,” in IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1902–1910, Oct. 2016.
  15. B. Zhang, Y. Zhao, and J. Liang, “Secure and efficient data sharing via smart contracts on blockchain,” in IEEE Internet Things J., vol. 8, no. 5, pp. 3186–3196, Mar. 2021.
  16. D. Chaum, “Blind signatures for untraceable payments,” in Advances in Cryptology, Springer, 1983, pp. 199–203.
  17. R. Gennaro, C. Gentry, and B. Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers,” in Advances in Cryptology – CRYPTO 2010, pp. 465–482.
  18. A. Juels and E. Shi, “The Ring of Gyges: Investigating the future of criminal smart contracts,” in Proc. ACM CCS, 2016, pp. 283–295.
  19. H. Kalodner, S. Goldfeder, A. Chator, J. M. Weinberg, and E. W. Felten, “Arbitrum: Scalable, private smart contracts,” in Proc. USENIX Security Symp., 2018.
  20. M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking Bitcoin: Routing attacks on cryptocurrencies,” in Proc. IEEE Symp. Security and Privacy (SP), 2017, pp. 375–392.
Index Terms

Computer Science
Information Sciences

Keywords

Zero-Knowledge Proofs zk-SNARKs Groth16 Pedersen Commitments Oracle Security DeFi Privacy Smart Contracts Blockchain Confidentiality.