Systematic Review: Comparing zk-SNARK, zk-STARK, and Bulletproof Protocols for Privacy-Preserving Authentication