zkPass
zkPass User's Guide
zkPass User's Guide
  • Getting Started
    • ๐Ÿ”ŠIntroduction
      • What is zkPass?
      • How does it work?
      • How zkPass can help you
      • What's Ahead
    • ๐ŸŒค๏ธService-based Proof System
      • Main Features
      • zkPass Workflows
      • Deployment Options
        • Public-Cloud Hosting
        • Private-Cloud Hosting
        • On-Premise Hosting
    • ๐Ÿ—๏ธKey Concepts
      • User Data
      • DVR
      • zkPass Proof
  • Core Components
    • ๐Ÿ›๏ธService Architecture
      • RESTful API Web Service
      • zkPass Query Host
    • ๐Ÿ‘ฅzkPass Client Roles
    • ๐ŸคTrust Models
      • Data Privacy Trust Model
      • Data Integrity Trust Model
      • Computation Integrity Trust Model
    • ๐Ÿ‘ฉโ€๐Ÿ’ปzkPass Module
  • Use Cases
    • ๐ŸฉธEmployee Onboarding
      • โ€œBlood Test Resultโ€ User Data
      • "Employee Onboarding" DVR
      • zkPass Integration
      • Call Sequence
    • ๐Ÿš˜Loan Application Screening
      • โ€œBCA Customer Profileโ€ User Data
      • Loan Screening DVR
      • zkPass Integration
      • Call Sequence
    • ๐Ÿ›’Sharing OIDC Users Securely
      • "ShopSphere ID Token" User Data
      • "ShopSphere Account Holder" DVR
      • zkPass Integration
        • Integration Guidelines for ShopSphere OIDC Provider
        • Integration Guidelines for Krisna Service
        • Integration Guideline for ShopSphere App
      • Call Sequence
  • FAQ
    • How is verifiable computing implemented by ZKP?
  • Glossary
    • Client-based Proof System
    • DVR
    • User Data
    • zkPass Proof
Powered by GitBook
On this page
Export as PDF
  1. FAQ

How is verifiable computing implemented by ZKP?

ZKP, or Zero-Knowledge Proof, is a cryptographic method that allows one party to prove to another that a statement is true without revealing any specific information about the statement itself. In the context of verifiable computing, ZKP can be utilized to verify that computations were executed correctly on a binary app without actually having to re-execute or inspect the computation in detail. This means that even if a malevolent actor attempts to hack or tamper with the binary app's execution, they cannot falsify the ZKP. This is because the proof generated is mathematically bound to the correctness of the computation; any deviation from the correct execution would result in a proof that fails to verify. Therefore, using ZKP ensures that the computational results can be trusted without compromising privacy or revealing underlying data.

Imagine you have a magic box that can solve puzzles. You give a friend a puzzle to put inside the box. The box then spits out a "solved" ticket if it successfully solves the puzzle. Zero-Knowledge Proof (ZKP) is like this magic box. It can prove that a computer program did its job correctly without revealing what the job was or how it was done. So, even if someone tries to trick the magic box, they can't fake the "solved" ticket. In this way, you can trust the box's answer without knowing all its secrets.

PreviousCall SequenceNextClient-based Proof System

Last updated 10 months ago