Zero Knowledge Proofs

About case

ZKP Use Cases

KYC system based on ZKP doesn't reveal users' data, but it’s still able to verify its validity for the financial system. ZKP can be implemented in a custom KYC system to make it more reliable and secure for users.

Implementation Concept

Our solution uses a cutting-edge Halo2 protocol, which is a new development in the SNARK family of algorithms. Based on this protocol, we provide an automated and distributed KYC system that is significantly safer for users and their personal data than most modern KYC systems. The following diagram illustrates the high-level architecture of the system and the interaction between its core components.

Components overview

Just like any other ZK project, our solution provides Prover and Verifier components, which are the core of the entire ZKP concept.

In our solution, the Prover is a component that is tightly integrated with the data registry where users’ personal data is stored. The Prover can be integrated with any SQL database and generates Zero Knowledge Proofs on demand based on the provided user data.

The Verifier is located on the blockchain side of the solution and is implemented as a “system contract,” meaning it is integrated directly into the blockchain node. The Verifier enables the verification of ZK proofs generated by our Provers and only such proofs.

In addition to the Prover and Verifier, the system includes a Dispatcher component, which orchestrates requests between organizations, data registries, and blockchain-based verification.

It is also important to note that our solution does not require a trusted setup or any related ceremonies, in contrast to most SNARK-based ZK solutions. This allows for a more flexible and updatable system architecture.

Development process

/ 01

PLANNING AND TECHNICAL DETAILS

Meeting with the client to determine exact requirements and desired functional capabilities of the project.

/ 02

ARCHITECTURE DESIGN

Designing the project’s architecture, creating a development and integration plan, and establishing system components and interactions.

/ 03

DEVELOPMENT AND IMPLEMENTATION

Commencing product development, including coding, integrating components, and managing ongoing refinement and feature implementation.

/ 04

TESTING AND REFINEMENT

Performing thorough testing, identifying and resolving issues, and ensuring the product meets all performance and functionality requirements.

/ 05

Release and Support

Managing the product launch, overseeing deployment, and providing post-release support.

Team in project

  • PROJECT MANAGER

    Manages processes, coordinates deadlines, communicates with clients, and gathers requirements.
  • DEVOPS

    Manages infrastructure, automates processes, handles CI/CD, monitors systems, analyzes data, and ensures security.
  • BACK-END DEVELOPER

    Develops server-side logic, manages databases, works with programming languages and frameworks, handles authentication and security, and documents processes.
  • cryptography engineer

    Develops encryption algorithms, ensures data security, analyzes cryptographic vulnerabilities, and integrates encryption into applications.
  • QA-ENGINEER

    Plans and executes tests, performs both manual and automated testing, creates reports, interacts with developers, and participates in release activities.

Services in case

Same Articles

All Articles

Cases

Light EVM
Light EVM

Light EVM

One of the fastest and most optimized EVM implementations for modern blockchain workloads.
Bridge Graphite
Bridge Graphite

Bridge Graphite

Cross-chain bridge for Graphite token: swap across Ethereum, Binance, Solana, Polygon, Arbitrum, and Graphite.