Apply Zero Knowledge to current applications

Tram Ho

Concept

ZK is a cryptographic concept that refers to a method of proving something without revealing any information beyond what is proven. In other words, a ZK proof allows one person to prove to the other party that they know a secret or a particular piece of information without having to disclose that information.

An important property of zero-knowledge proofs is that they are probabilistic. This means that there is always a small chance that the prover could lie or cheat in some way, but this possibility can be made any smaller through many iterations of the proof. . In fact, zero-knowledge proofs are considered very secure and reliable, and are widely used in various cryptographic applications.

In a nutshell, zero-knowledge proofs are a powerful cryptographic tool that allows to securely verify information and knowledge.

Studies & Protocols

Zilch

Launching 2021, Zilch can be used to ensure privacy in transactions on the blockchain. One of the advantages of Zilch is that it can be used in public and private blockchain applications. Zilch can help ensure user privacy while preserving the publicity of transactions on the blockchain. Zilch is also capable of minimizing the data size required for transaction verification on the blockchain. This reduces costs and speeds up the processing of transactions on the blockchain.

However, one of the downsides of Zilch is that it can affect the efficiency of the blockchain system. Since the process of verifying and validating transactions on the blockchain is hidden by Zilch, this can reduce the possibility of identifying errors in the system.

In addition, Zilch also requires participants to use special software to create and verify certificates. This can create a technical barrier for those who want to use Zilch.

ZK-STARK

ZK-STARK helps verify the correctness of information without having to disclose it. It is a kind of zero-knowledge proof technology that is more efficient and secure than previous zk-SNARK algorithms.

Unlike zk-SNARK, ZK-STARK does not require trust in previously generated secret parameters. Instead, it allows proofs to be generated in a completely transparent and public manner, which eliminates the security risks associated with the use of secret parameters.

ZK-SNARK

ZK-SNARK (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) is a type of zero-knowledge proof algorithm used in blockchain applications to secure information. ZK-SNARK was created by Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers and Eran Tromer in 2014.

ZK-SNARK allows to prove that a given information is true without having to disclose it. It allows the proving party to demonstrate that it knows the information to be proven, without having to disclose any other information related to that information.

ZK-SNARK is used in blockchain applications such as Ethereum and Zcash to protect user information and increase privacy. For example, Zcash uses ZK-SNARK to anonymize transactions on the blockchain, protecting user privacy.

Aurora

Aurora is a decentralized application (dApp) development platform built on the Ethereum blockchain. Aurora uses zk (zero-knowledge) technology to improve the security and speed of its applications.

Specifically, Aurora uses a type of zk technology called zk-rollups to solve Ethereum’s security and scalability issues. Zk-rollups allow the storage and processing of a large number of transactions on the blockchain’s subchain, where transactions are repackaged into a single transaction known as a “rollup”.

Ligero

Ligero is an open source security protocol based on zero-knowledge proof (ZKP) technology, developed by researchers at Tel Aviv University. ZK Ligero aims to minimize computational costs when using ZKP in blockchain applications and similar systems.

In ZK Ligero, security proofs are generated with only a very small amount of computation, significantly reducing computational costs compared to traditional ZKP methods. This makes ZK Ligero a viable solution for blockchain applications with limited computational resources.

In addition, ZK Ligero also solves the security problem associated with attacks by using a method known as “multi-input proof presentation”, which allows for multiple proofs. aggregated into a single piece of evidence.

You can see more Aurora vs Ligero comparison here

Virgo

ZK-Virgo is a zero-knowledge proof (ZKP) technology developed by IOHK (Input Output Hong Kong) company – the company that developed the Cardano blockchain.

ZK-Virgo uses technologies such as zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) to allow transactions to be verified and secure without revealing private information. Applications of ZK-Virgo may include identity verification, transaction security and personal information protection.

In addition, ZK-Virgo is made for high performance and scalability. This technology can be used to solve security and privacy related issues in blockchain applications and other financial systems.

There are also many previous Zero Knowledge construction studies, you can learn more about the development history of ZK.

Application in industry

Blockchain and Cryptocurrencies:

ZK proof is used in the blockchain to provide the ability to authenticate transactions while still protecting personal information, safe for the network while users do not need to provide too much information, helping to speed up processing and transaction confirmation time on the network. Some blockchains have recently used ZK proofs and are becoming big trends in the future such as: Optimism, Arbitrum, ZKsync, Polygon ZKEVM, Scroll…

Some blockchains have used ZK to create digital currencies such as Zcoin, Zcash in 2016. They work on a model of not trusting any users or centralized system at all to ensure anonymity, apart from It also has the feature of hiding information such as the transaction amount.

Some practical applications:

  • Building a layer 2 blockchain: Layer 2 blockchains that are scalable for offchain computing and ZK-based onchain transactions have great potential to expand blockchain’s scalability.
  • LayerX: LayerX is a blockchain technology company developing blockchain applications based on ZKP technology.
  • Dusk Network: Dusk Network is a blockchain technology company that provides solutions for applications on blockchain in terms of privacy and is using ZKP technology to ensure user privacy.
  • Coda Protocol: Coda Protocol is a blockchain technology company that provides solutions for applications on blockchain in terms of speed and is using ZKP technology to reduce blockchain size.
  • LayerZero: LayerZero includes technical features and enhancements, including a high-performance routing system to increase transaction speed, and a resource partitioning system. system) to increase system scalability, and security enhancements, including the use of zk-rollups and zk-SNARK to protect user privacy.

Election system

Users can participate in the election without providing their identity and still ensure the legitimacy of the vote. Voters can check that their votes have been counted and counted correctly without revealing information about their choice. ZKP can be used to verify election results without disclosing details about each vote.

Some companies that have adopted ZK:

  • Voatz: Voatz is a mobile voting system used for elections in organizations, companies and local governments. This system uses ZKP to protect the integrity of votes and ensure that votes are counted only once.
  • Horizon State: Horizon State is an online voting system used in community and nonprofit elections. This system uses ZKP to ensure vote integrity and ensure that votes are counted only once.
  • Agora: Agora is a blockchain technology company used for online elections. This system uses ZKP to protect the integrity of votes and ensure that votes are counted only once.

Verify digital identity, Digital signature

ZKP can be used to verify identity privately, prevent fraud and invasion of privacy. In addition, ZKP can also be used to verify the validity of digital signatures and transactions without disclosing information about the parties involved and the details of that transaction. This helps prevent signature forgery, attacks on authentication systems and critical documents, and prevents fraud and invasion of privacy in financial transactions and transactions. commerce.

Some companies that have adopted ZK:

  • IBM: IBM is developing blockchain solutions that use ZKP to ensure the integrity of transactions and verify identities.
  • Microsoft: Microsoft has developed a ZKP solution called Verifiable Confidential Ledger (VCL), which enables identity verification and security of transactions on the blockchain.
  • Ernst & Young (EY): EY has developed a ZKP solution called Nightfall, which enables identity verification and security of transactions on the blockchain.
  • ConsenSys: ConsenSys has developed a ZKP solution called AZTEC, which enables identity verification and security of transactions on the blockchain.
  • Zcash: Zcash is a cryptocurrency that uses ZKP technology to ensure the privacy and security of transactions.

Supply chain management

Zero-Knowledge Proof (ZKP) is a technology used in supply chain management to protect data integrity and increase security during information exchange.

Some companies have used ZKP in supply chain management:

  • Walmart: Walmart was one of the first major companies to use ZKP in its supply chain management. The company has implemented a blockchain system that allows Walmart suppliers to share product-related data, including origin, quality, and shipping information. ZKP is used to ensure data integrity during information sharing between parties.
  • IBM: IBM is a large technology company that has implemented many projects related to supply chain management using ZKP. One of them is the Food Trust project, which allows manufacturers and retailers to share information about the origin and quality of food. ZKP is used to protect the integrity of data and ensure that information is shared only between authorized parties.
  • Komgo: Komgo is a supply chain management platform for the oil and gas industry. The platform uses ZKP to ensure the integrity of contracts and information exchanged between parties during transactions.

Decentralized Commodity Exchange

ZK proofs can be used to authenticate transactions and protect user information

Some products that have applied ZK:

  • Loopring: Loopring is a decentralized exchange that allows users to trade different cryptocurrencies. They used ZKP technology to reduce security risks and increase privacy for users.
  • Aztec: Aztec is a blockchain technology company that provides security and privacy solutions for decentralized exchanges. They use ZKP technology to protect data integrity and ensure user privacy.
  • StarkWare: StarkWare is a blockchain technology company that provides security and transaction acceleration for decentralized exchanges. They used ZKP technology to ensure the privacy and safety of users during transactions.
  • DYDX: Decentralized Exchange

Fraud detection

Zero-Knowledge Proof (ZKP) is a very useful technology in fraud detection as it allows to confirm an event without revealing any information about the original data.

Some companies have used ZKP for fraud detection:

  • Chainalysis: Chainalysis is a blockchain analytics company and has used ZKP technology to detect fraud in cryptocurrency transactions. They use ZKP to authenticate transactions without disclosing the information regarding the sender and receiver.
  • Elliptic: Elliptic is a company that specializes in blockchain security and provides fraud detection solutions for financial institutions. They use ZKP to authenticate transactions and crypto accounts without revealing the user’s personal information.
  • Binance: Binance is one of the largest cryptocurrency exchanges in the world and has used ZKP technology to reduce the risk of fraud and increase the safety of users during transactions.

Own digital assets

ZK proofs can be used to prove ownership of digital assets without having to provide personal information.

  • Aztec Protocol: Aztec is a blockchain technology company that provides security and privacy solutions for exchanges and digital asset ownership systems. They used ZKP technology to ensure the privacy and security of transactions and information related to digital asset ownership.
  • Oasis Labs: Oasis Labs is a blockchain technology company that provides security and privacy solutions for applications and systems that own digital assets. They used ZKP technology to ensure the privacy and security of transactions and data related to digital asset ownership.
  • Matter Labs: Matter Labs is a blockchain technology company that provides security and performance solutions for digital asset ownership applications and systems. They used ZKP technology to reduce security risks and ensure privacy for transactions and data related to digital asset ownership.

Remove password

ZK proofs can be used to authenticate identities without providing passwords or personal information.

  • HYPR: HYPR is a security technology company that provides a ZKP solution to eliminate passwords and ensure security for users. HYPR uses this technology to allow users to log into their applications and services without having to enter a password.
  • Unbound Tech: Unbound Tech is a security technology company that provides a ZKP solution to reduce the use of passwords and ensure security for users. Unbound Tech uses this technology to allow users to authenticate and access their applications and services without having to use a password.
  • Beyond Identity: Beyond Identity is a security technology company that provides a ZKP solution to eliminate passwords and increase security for users. Beyond Identity uses this technology to allow users to sign in to their apps and services without having to use a password.

Health information, Medical

Zero-Knowledge Proof (ZKP) can be used to protect the privacy of health information as it is exchanged between parties.

Some companies use ZKP in exchanging health information:

  • Enigma: Enigma is a blockchain technology company that provides a secure and private solution for the exchange of health information. They used ZKP technology to reduce security risks and increase privacy for users.
  • Guardtime: Guardtime is a technology security company that provides security solutions for health data and health information exchange. They used ZKP technology to ensure the privacy and safety of users’ health information.
  • EY: EY is a professional consulting firm that has used ZKP technology to develop a health information exchange solution for hospitals and healthcare providers. They used ZKP technology to protect the privacy of health information and ensure the confidentiality of the exchange.

Information exchange

Currently, there are a number of companies that have used Zero-Knowledge Proof (ZKP) in protecting the privacy and security of messaging and communication. Here are some examples:

  • Signal: Signal is a messaging application that is considered one of the most secure messaging applications available today. They used ZKP technology to protect privacy and ensure data integrity.
  • MobileCoin: MobileCoin is a cryptocurrency designed for use in payments and communication. They used ZKP technology to protect security and ensure privacy during payment and communication.
  • Oasis Labs: Oasis Labs is a blockchain technology company that provides security and privacy solutions for messaging and communication. They used ZKP technology to protect privacy and ensure data integrity during transmission.

Evaluate

Advantage

  • High security
  • Scalability for blockchain network
  • Privacy Guarantee
  • Wide range of applications
  • Interoperability: ZKP can help facilitate the interoperability of different blockchain networks by providing a secure and private way to share information across different networks.

Defect

  • Difficult to implement
  • Requires a large amount of computation
  • Reliability is not entirely certain

What can we do with it

Building ZK application products to verify identity, verify transactions and apply to specific problems of customers such as: Blockchain, Transport, payment, digital assets, Health and medical, Education duc and training for student verification, test, certificate. Financial and investment advice by verifying product information and production processes. The insurance sector in verifying the integrity of claim information…

How should we adopt it

What do we need to prepare?

For a technology company, we need to approach ZK technology to develop the above products as well as support users to expand ZK applications in their real problems. To do that, our engineers need to prepare what knowledge:

  • Cryptography knowledge: covers cryptographic basics such as AES, RSA, ECC, anti-attack protocols such as SSL/TLS, SSH, anti-forgery and attack-proof techniques password detection.
  • Knowledge of information theory: including concepts of information security, information encryption, authentication, and risk analysis.
  • Knowledge of ZK algorithms: including zk-SNARK and zk-STARK algorithms, and how they work. Condensers to create proofs and verify proofs. The application architecture to apply ZK is a component of the system.
  • Blockchain knowledge: covers blockchain basics, blockchain algorithms, and blockchain applications.

How will we use ZK:

  • Apply ZK Application design pattern
  • Apply ZK for identity authentication, digital signatures, digital assets, digital transactions
  • Applying ZK in network security and safety

Zero-knowledge and AI

One of the uses of ZK in AI is in training AI models on sensitive data without disclosing this data to third parties. For example, when medical organizations want to use patient data to train an AI model, sharing this sensitive data can be a sensitive issue. By using ZK technology, medical institutions can train AI models on patient data without having to disclose information about that patient. This helps protect patient privacy and ensures data integrity.

In addition, ZK can also be used to check the correctness of AI results without revealing the details of the AI ​​model being used. For example, when an AI model is used to identify a disease finding on an X-ray image, ZK technology can be used to confirm a disease finding without having to disclose information about the disease. input data or AI model.

Conclusion

In summary, ZK is a very advanced technology and potential for many application areas, especially in the field of information security and authentication. Applying ZK technology to customers’ problems can help increase security and ensure the privacy of their information. In addition, ZK can also be used as a key technology of the company, helping to increase value and put the company in a competitive position with other competitors. With its vast application potential, ZK will continue to grow and become an important technology in the future.

Reference

Share the news now

Source : Viblo