zkPass
zkPass User's Guide
zkPass User's Guide
  • Getting Started
    • πŸ”ŠIntroduction
      • What is zkPass?
      • How does it work?
      • How zkPass can help you
      • What's Ahead
    • 🌀️Service-based Proof System
      • Main Features
      • zkPass Workflows
      • Deployment Options
        • Public-Cloud Hosting
        • Private-Cloud Hosting
        • On-Premise Hosting
    • πŸ—οΈKey Concepts
      • User Data
      • DVR
      • zkPass Proof
  • Core Components
    • πŸ›οΈService Architecture
      • RESTful API Web Service
      • zkPass Query Host
    • πŸ‘₯zkPass Client Roles
    • 🀝Trust Models
      • Data Privacy Trust Model
      • Data Integrity Trust Model
      • Computation Integrity Trust Model
    • πŸ‘©β€πŸ’»zkPass Module
  • Use Cases
    • 🩸Employee Onboarding
      • β€œBlood Test Result” User Data
      • "Employee Onboarding" DVR
      • zkPass Integration
      • Call Sequence
    • 🚘Loan Application Screening
      • β€œBCA Customer Profile” User Data
      • Loan Screening DVR
      • zkPass Integration
      • Call Sequence
    • πŸ›’Sharing OIDC Users Securely
      • "ShopSphere ID Token" User Data
      • "ShopSphere Account Holder" DVR
      • zkPass Integration
        • Integration Guidelines for ShopSphere OIDC Provider
        • Integration Guidelines for Krisna Service
        • Integration Guideline for ShopSphere App
      • Call Sequence
  • FAQ
    • How is verifiable computing implemented by ZKP?
  • Glossary
    • Client-based Proof System
    • DVR
    • User Data
    • zkPass Proof
Powered by GitBook
On this page
  • The Essence of zkPass
  • Participants in the zkPass System
  • A Secure and Transparent Process
Export as PDF
  1. Getting Started
  2. Introduction

How does it work?

PreviousWhat is zkPass?NextHow zkPass can help you

Last updated 1 year ago

This section provides a high-level overview of how zkPass works, designed for clarity and ease of understanding. Whether you're a developer, a business owner, or just someone curious about zero-knowledge technology, you'll find this guide an essential starting point.

The Essence of zkPass

zkPass serves as a bridge between devices with limited computational capabilities and the robust world of ZKPs. By offloading the heavy lifting of ZKP computations to a secure server, zkPass enables devices of all kinds to participate in privacy-preserving data verification without exposing the actual data. It's a service that maintains confidentiality while allowing certain aspects of the data to be verified, all without the verifier ever seeing the data itself.

Participants in the zkPass System

Three roles are central to the zkPass ecosystem: the Data Issuer, the Data Holder, and the Proof Verifier. The Data Issuer issues the data, the Data Holder is the custodian of their own data, and the Proof Verifier sets conditions on the data and verifies its integrity. Each plays a pivotal role in the delicate dance of data privacy and verification.

The zkPass Workflow

  1. It starts with the Data Holder requesting a Data Verification Request (DVR) from the Proof Verifier. The DVR contains the query about the user data. The Proof Verifier signs the DVR to ensure authenticity and returns it to the Data Holder.

  2. The Data Holder then retrieves the user data from the Data Issuer. This is the user data that is referenced by the DVR query. The Data Issuer also signs user data to ensure authenticity and returns it to the Data Holder.

  3. With the DVR and the user data in hand, the Data Holder submits these items to the zkPass Service, initiating a RESTful API call request to generate a cryptographic zkPass Proof.

  4. zkPass Service receives the API request and generates the zkPass Proof. It returns the proof to the Data Holder

  5. The proof is then sent by the Data Holder to the Proof Verifier for verification.

  6. The Proof Verifier verifies the proof and receives the query result which determines if the Data Holder has met the conditions specified in the query.

A Secure and Transparent Process

Throughout the entire process, the integrity and confidentiality of data are rigorously maintained. By employing robust encryption and digital signatures, zkPass ensures that the user data and DVR maintain their authenticity and privacy, especially during transit. This unwavering dedication to security is further reinforced by the use of Zero-Knowledge Proofs (ZKP) and the Trusted Execution Environment (TEE). In the TEE, the ZKP computations are carried out, guaranteeing that both the data and the queries performed on it remain secure, confidential, and verifiable.

The diagram above illustrates the typical holder-centric . The workflow is centered around the user, as explained below:

πŸ”Š
zkPass workflow
zkPass Workflow for the Holder-Centric