Zero Knowledge Proofs
About case
Zero Knowledge Proof (ZKP) is a cryptographic concept that allows data verification without revealing the data itself. The proof occurs by transforming data to an obfuscated and undecryptable format and only allows confirming the data's correspondence to given input parameters through receiving a TRUE or FALSE reply.
KYC system based on ZKP doesn't reveal users' data, but it’s still able to verify its validity for the financial system. ZKP can be implemented in a custom KYC system to make it more reliable and secure for users.
Our solution uses a cutting-edge Halo2 protocol, which is a new development in the SNARK family of algorithms. Based on this protocol, we provide an automated and distributed KYC system that is significantly safer for users and their personal data than most modern KYC systems. The following diagram illustrates the high-level architecture of the system and the interaction between its core components.
Just like any other ZK project, our solution provides Prover and Verifier components, which are the core of the entire ZKP concept.
In our solution, the Prover is a component that is tightly integrated with the data registry where users’ personal data is stored. The Prover can be integrated with any SQL database and generates Zero Knowledge Proofs on demand based on the provided user data.
The Verifier is located on the blockchain side of the solution and is implemented as a “system contract,” meaning it is integrated directly into the blockchain node. The Verifier enables the verification of ZK proofs generated by our Provers and only such proofs.
In addition to the Prover and Verifier, the system includes a Dispatcher component, which orchestrates requests between organizations, data registries, and blockchain-based verification.
It is also important to note that our solution does not require a trusted setup or any related ceremonies, in contrast to most SNARK-based ZK solutions. This allows for a more flexible and updatable system architecture.
Development process
PLANNING AND TECHNICAL DETAILS
Meeting with the client to determine exact requirements and desired functional capabilities of the project.
ARCHITECTURE DESIGN
Designing the project’s architecture, creating a development and integration plan, and establishing system components and interactions.
DEVELOPMENT AND IMPLEMENTATION
Commencing product development, including coding, integrating components, and managing ongoing refinement and feature implementation.
TESTING AND REFINEMENT
Performing thorough testing, identifying and resolving issues, and ensuring the product meets all performance and functionality requirements.
Release and Support
Managing the product launch, overseeing deployment, and providing post-release support.
Team in project
PROJECT MANAGER
Manages processes, coordinates deadlines, communicates with clients, and gathers requirements.DEVOPS
Manages infrastructure, automates processes, handles CI/CD, monitors systems, analyzes data, and ensures security.BACK-END DEVELOPER
Develops server-side logic, manages databases, works with programming languages and frameworks, handles authentication and security, and documents processes.cryptography engineer
Develops encryption algorithms, ensures data security, analyzes cryptographic vulnerabilities, and integrates encryption into applications.QA-ENGINEER
Plans and executes tests, performs both manual and automated testing, creates reports, interacts with developers, and participates in release activities.
Services in case
Same Articles
All Articles
Extreme Optimization of GasToken
In this article, we will delve into optimizing GasToken. It's important to note that it is no longer relevant to the Ethereum network. In 2021, the London hard fork introduced EIP-3529 because the GasToken economy was inefficient. The Binance Smart Chain (BSC) continues to use this mechanism.

Tokens missent to the 1inch Aggregation Router? Forget about them
Over $500K in tokens were mistakenly sent to 1inch Aggregation Routers — and anyone with the right knowledge could withdraw them. This article breaks down how the rescueFunds function works, and why it's not as secure as it seems.

The Multi-Party Magic Behind Carbontec’s Hard-to-Break Wallets
Carbontec uses MPC to secure wallets—no single key to steal, no complex setup. Just seamless, bulletproof crypto protection.
Cases
Light EVM
