zkPass
zkPass User's Guide
zkPass User's Guide
  • Getting Started
    • πŸ”ŠIntroduction
      • What is zkPass?
      • How does it work?
      • How zkPass can help you
      • What's Ahead
    • 🌀️Service-based Proof System
      • Main Features
      • zkPass Workflows
      • Deployment Options
        • Public-Cloud Hosting
        • Private-Cloud Hosting
        • On-Premise Hosting
    • πŸ—οΈKey Concepts
      • User Data
      • DVR
      • zkPass Proof
  • Core Components
    • πŸ›οΈService Architecture
      • RESTful API Web Service
      • zkPass Query Host
    • πŸ‘₯zkPass Client Roles
    • 🀝Trust Models
      • Data Privacy Trust Model
      • Data Integrity Trust Model
      • Computation Integrity Trust Model
    • πŸ‘©β€πŸ’»zkPass Module
  • Use Cases
    • 🩸Employee Onboarding
      • β€œBlood Test Result” User Data
      • "Employee Onboarding" DVR
      • zkPass Integration
      • Call Sequence
    • 🚘Loan Application Screening
      • β€œBCA Customer Profile” User Data
      • Loan Screening DVR
      • zkPass Integration
      • Call Sequence
    • πŸ›’Sharing OIDC Users Securely
      • "ShopSphere ID Token" User Data
      • "ShopSphere Account Holder" DVR
      • zkPass Integration
        • Integration Guidelines for ShopSphere OIDC Provider
        • Integration Guidelines for Krisna Service
        • Integration Guideline for ShopSphere App
      • Call Sequence
  • FAQ
    • How is verifiable computing implemented by ZKP?
  • Glossary
    • Client-based Proof System
    • DVR
    • User Data
    • zkPass Proof
Powered by GitBook
On this page
Export as PDF
  1. Core Components

zkPass Module

PreviousComputation Integrity Trust ModelNextEmployee Onboarding

Last updated 7 months ago

The heart of zkPass is the privacy application model. zkPass Module is an application designed to enhance the privacy and security of user data. zkPass Modules leverage advanced cryptographic techniques, such as Zero-Knowledge Proofs (ZKP), to ensure that user data remains private while still being verifiable. This means that specific properties of the data can be confirmed without revealing the actual data itself.

zkPass Module operates within the zkPass ecosystem and supports one or both of the following features:

  1. Protecting the privacy of user data

  2. Operating in a secure environment, Trusted Execution Environment (TEE)

  3. Providing verifiable results

zkPass Modules operate as pluggable modules within the zkPass system. These modules are loaded by the zkPass Host and run within a Trusted Execution Environment (TEE), ensuring that all operations are secure and isolated from potential threats.

Each implementation of a zkPass module consists of two executable modules: Service module and Client module. The service module is the component of the zkPass module that communicates with the zkPass Service. The client module links with the third-party application that needs to utilize the functionalities provided by the zkPass module.

The design for incorporating multiple zkPass modules within the zkPass ecosystem should adhere to the following three architectural guiding principles:

  1. Modular App Design: zkPass Modules should be architected as autonomous, encapsulated modules with clearly defined boundaries.

  2. Pluggable App Module: Integrating new applications ideally should not necessitate rebuilding or recompilation of the core zkPass Service codebase.

  3. Versatile Polymorphic Interfaces: zkPass should implement robust and concise polymorphic interfaces that control the interactions between zkPass modules and the core zkPass Service.

For a more in-depth explanation of the zkPass Module, please refer to the .

πŸ‘©β€πŸ’»
Developer's Guide