Cointime

Download App
iOS & Android

Zero-Knowledge Proof in Blockchain Explained | Quillaudits

Validated Project

Table of Contents:

  1. What is Zero-Knowledge Proof?
  2. History of Zero-Knowledge Proof
  3. Types of Zero-Knowledge Proof
  4. Working of Zero-Knowledge Proofs
  5. Zero-Knowledge Applications in Blockchain
  6. Zero-Knowledge Proofing Techniques
  7. ZK Rollups (ETH Scaling)
  8. ZK Based Privacy Protocols

What is Zero-Knowledge Proof?

A zero-knowledge proof is a way of proving if a certain statement is true or not without actually revealing the statement itself. Here, the ‘prover’ is the party trying to prove a claim, while the ‘verifier’ is responsible for validating the claim.

In Simpler Terms, Zero-knowledge proof (ZK proof) technologies enable one party to prove to another party that they know something without actually sharing the information with another party in order to prove their knowledge.

A Use Case:Let's Suppose I want to take a loan, But don’t want to reveal my financial history to banks. Using Zero-Knowledge proof, bank will be able to verify my financial history (e.g. credit score, proof of residence, account payments, and real estate) without knowing any specific data about those assets.

History of Zero Knowledge Proofs?

Zero-knowledge proofs were first devised by MIT researchers Shafi GoldwasserSilvio Micali, and Charles Rackoff in a 1985 paper, “The Knowledge Complexity of Interactive Proof-Systems”. The paper introduced key concepts including an interactive proof (IP) hierarchy and conceived the concept of knowledge complexity, a measure to see how much proof is transferred from the prover to the verifier.

Perhaps most importantly, they gave the first zero-knowledge proof for a concrete problem when they demonstrated how to construct ZKPs for any NP-set, with any commitment scheme.

Types of Zero Knowledge Proofs?

The two fundamental types of ZKPs include the following:

  1. Interactive ZeroKnowledge Proofs: In Interactive ZKP, The verifier challenges the prover who provides replies to these challenges until the verifier is convinced. They need to be simultaneously online and the prover must complete a series of actions to convince the verifier about a specific fact.
  2. Non-Interactive ZeroKnowledge Proofs: Non-interactive Zero-Knowledge Proofs do not require an interactive process between the prover and verifier. The prover delivers the proof to the verifier and the proof can be verified by the verifier only once at any time. It requires more computational power as compared to Interactive Zero Knowledge Proof.

Working of Zero-Knowledge Proof:

In basic form, a zero-knowledge proof is made up of three elements: witness(confidential Info), challenge, and response.

  • Witness: With a zero-knowledge proof, the prover wants to prove knowledge of some hidden information. The secret information is the “witness” to the proof, and the prover’s assumed knowledge of the witness establishes a set of questions that can only be answered by a party with knowledge of the information. Thus, the prover starts the proving process by randomly choosing a question, calculating the answer, and sending it to the verifier.
  • Challenge: The verifier randomly picks another question from the set and asks the prover to answer it.
  • Response: The prover accepts the question, calculates the answer, and returns it to the verifier. The prover’s response allows the verifier to check if the former really has access to the witness. To ensure the prover isn’t guessing blindly and getting the correct answers by chance, the verifier picks more questions to ask. By repeating this interaction many times, the possibility of the prover faking knowledge of the witness drops significantly until the verifier is satisfied.

The Application of Zero Knowledge Proof in BlockChains?

There are many applications of Zero Knowledge Proof, In this blog, we will be covering applications of ZK in Block Chains:

  • Private transactions on blockchains: Transaction data is encrypted and proof posted to prove it was computed correctly. ZKPs are also used in private transactions that do not reveal monetary data and receiver and sender information. An example is Tornado Cash, a decentralized, non-custodial service that allows users to conduct private transactions on Ethereum
  • Performance optimizations: Application code is executed off-chain, or by a single node on the blockchain network, and only proof of its correct execution is posted to the blockchain for other parties to verify its correctness. An example is ZK Rollups, where transactions are executed off-chain and finally, a summary of all transactions is then submitted on-chain.
  • Transferring private blockchain transactions: The most notable concern in private blockchain transactions is the numerous loopholes evident in conventional procedures. The productive integration of ZKP with private blockchain transactions can create a powerful hacker-proof process.
  • Data Security and Privacy: Organizations that control sensitive data, such as banks and hospitals, must keep them free from third-party access. ZKPs and blockchain together can make accessing data impossible.

Zero-knowledge Proofing technologies:

1. zk-SNARK

SNARK stands for “zero-knowledge succinct non-interactive argument on knowledge.” A SNARK is a type of cryptographic proof that is small in size and easy to verify. SNARKs generate a cryptographic proof using elliptical curves, which assume that it’s infeasible to find the discrete logarithm of a random elliptic curve element from a publicly known base point. Computing elliptic curves are less computationally expensive than computing hashing functions used by STARKs, which is why SNARK-based protocols can be more gas efficient.

2. zk-STARKS

STARKS stands for “zero-knowledge scalable transparent argument of knowledge.” It’s a type of cryptographic proof that requires little to no interaction between the prover and the verifier. The key advantages of STARKs over SNARKs are that they have fast prover times and are easier to scale as they offer more computing power. Also, using hash functions makes them quantum resistant.

3. Bulletproofs

Bulletproofs are short, non-interactive zero-knowledge proofs that can convince a verifier that an encrypted value lies within a stated range without disclosing any information about the number.Bulletproofs is a type of range proof that employs zero-knowledge proofing techniques similar to those seen in zkSNARKs and zkSTARKs. Like zkSTARKs, bulletproofs do not require an initial trusted setup ceremony or procedure. Also, they are smaller than zkSTARKs and have significant efficiency and security.

zk-Rollups

Rollups are Layer 2 protocols built on top of Ethereum. Rollups process transactions off-chain, primarily on a rollup-specific chain, and then batch, compress, and deliver the transaction data to the main Ethereum chain. Shifting computation off-chain helps reduce congestion on Ethereum and reduce overall gas costs for users.

ZK Rollups Projects:

zkSync

Loopring

Polygon Hermez

ZK- Based Privacy Protocols

Zero-knowledge proofs power several privacy protocols today due to their non-disclosure feature. With ZK-proofs, users can currently transact on privacy-enabled blockchains and post proofs that confirm that their transactions are valid, and don’t reveal any extra info.

Popular privacy coin, Zcash, uses zk-SNARK cryptography to restore blockchain anonymity for its users and give them control over their transaction information. For instance, when a Zcash user sends coins to another Zcash user, the only available proof of their privacy-enabled transaction comes with zero knowledge. A third-party observer cannot find any additional information about the nature of the transaction, nor the parties and amounts involved.

ZK- Based Privacy Projects:

Zcash

Tornado Cash

Comments

All Comments

Recommended for you

  • The Ethereum network has currently destroyed more than 4.29 million ETH

    According to Ultrasound data, as of now, the Ethereum network has destroyed a total of 4,290,622.06 ETH. Note: Since the introduction of EIP-1559 in the Ethereum London upgrade, the Ethereum network will dynamically adjust the BaseFee of each transaction based on transaction demand and block size, and this portion of the fee will be directly burned and destroyed.

  • Türkiye prepares new encryption law to align with international standards

    Turkey is preparing to submit a new law to regulate cryptocurrency assets to the parliament. The law aims to align with international standards, reduce risks associated with cryptocurrency transactions, and implement strict regulation of cryptocurrency trading platforms by the Capital Markets Board. It will also ensure the safekeeping of assets, establish transparent platforms and customer relationships, and clearly define sanctions for non-compliant behavior. The legislative proposal is expected to be submitted to the parliament within a week.

  • Ripple CEO: The US government’s next target is Tether

    Ripple CEO Brad Garlinghouse recently stated in an interview that the next target of the US government is Tether, the stablecoin company responsible for the circulation of USDT. Some experts believe that Garlinghouse's statement is a very big insider report, and if it really happens, there will be a huge selling pressure in the USDT stablecoin market. In this case, the value of USDT will experience a significant decline.

  • Cointime May 12 News Express

    1.The number of Bittensor subnets for the AI ​​project will increase to 64, and 1024 subnets will be achieved this year2.Trader predicts Bitcoin price will reach $350,0003.vladilena.eth redeemed 1930 weETH from Zircult, suspected of selling4.Solana’s on-chain DEX transaction volume yesterday exceeded the sum of five chains including Ethereum, BSC, and Arbitrum5.RSS3 VSL locked-in amount surged in the past two days and is close to 200 million US dollars 6.The transaction volume of Club Key on friend.tech platform exceeded 1 million7.Lido has paid out more than 516,000 ETH in staking rewards, equivalent to approximately $1.51 billion8.1,000 BTC transferred from TronDAO to an unknown new wallet9.Report: Justin Sun deposited 120,000 eETH into Swell L2, worth $376 million10.1707.36 BTC have flowed out of Binance in the past 7 days

  • Xinjiang launches special campaign to combat illegal fundraising, with key areas including virtual currency, blockchain, etc.

    According to Chang'an Xinjiang Public Account, Xinjiang Autonomous Region and Corps have launched a joint special action to crack down on illegal fund-raising, with key areas including third-party wealth management, fake private equity, fake gold exchange and other traditional fields, as well as emerging fields such as virtual currency, blockchain, cultural tourism, film and television investment, and debt resolution services. It is reported that key cases include cases involving more than 100 million yuan and cases that have been criminally filed for more than five years.

  • A British court has postponed the final sentencing of Wen Jian, a British-Chinese national involved in the country's largest Bitcoin money laundering case, until May 24.

    On May 11th, it was reported that Jian Wen, a 42-year-old British Chinese citizen, was found guilty of "participating in arranging money laundering" in the UK's largest Bitcoin money laundering case. He could be sentenced to up to 14 years in prison. Jian Wen's defense lawyer, Mark Harries, stated that due to the judge's busy schedule, the UK court has postponed Jian Wen's final sentencing, which was originally scheduled for May 10th, to May 24th.

  • Web3 startup Star Nest completes $6 million in Pre-A round of financing

    Hong Kong Web3 music startup Star Nest announced that it has completed a $6 million Pre-A round of financing, led by Chuangqi International Limited, a wholly-owned subsidiary of Hong Kong Stock Exchange-listed company Guofu Innovation. Star Nest will collaborate with Armonia Meta Chain to develop the Star Nest SpaceStar metaverse game, which includes music, role-playing, and social features.In addition, Star Nest plans to launch its NEST project in the third quarter of 2024. Nest will receive 2.1 billion NEST tokens tailored for the project, and Star Nest will use the NEST token to build a more complete music industry token economic system. The NEST token will be widely used for purchasing performance tickets, chain game cooperation, metaverse consumption, governance voting, and other activities.

  • Over $594 million worth of PYTH is staked

    According to Dune data,  there are currently 1,201,167,362 PYTH tokens in the staked state, with a total staked value exceeding $594 million. The number of PYTH stakers has reached 151,211.

  • Blockchain Asset Management announces launch of a dedicated blockchain fund for accredited investors

    Blockchain Asset Management, a cryptocurrency fund with a scale of $100 million, announced the launch of an exclusive blockchain fund for qualified investors. The specific amount of funds raised by the fund has not been disclosed yet, but it is said to have reached "eight figures", which means it is in the tens of millions of dollars. In addition, the investment threshold for the new fund is $100,000, and all investors are required to meet the approved standards (annual income exceeding $200,000, net assets exceeding $1 million).

  • Shanghai Municipal Party Committee Secretary: Welcome Standard Chartered to establish more new institutions, new businesses and new platforms such as blockchain in Shanghai

    Chen Jinong, the Secretary of the Shanghai Municipal Party Committee, met with Weihao Si, the Chairman of the Board of Directors of Standard Chartered Bank, and Mark William D'Arcy, the Executive Director, and some members of the Board of Directors yesterday morning. Chen Jinong stated that he welcomes Standard Chartered Bank to leverage its own advantages, strengthen strategic connections, place more new institutions, businesses, and platforms such as wealth management and blockchain in Shanghai, focus on deepening pragmatic cooperation in technology finance, green finance, digital finance, and create more application scenarios, and provide comprehensive and professional service support for enterprises to go abroad.