zkFi: Privacy-Preserving and Regulation Compliant Transactions using Zero Knowledge Proofs (2307.00521v6)
Abstract: We propose a middleware solution designed to facilitate seamless integration of privacy using zero-knowledge proofs within various multi-chain protocols, encompassing domains such as DeFi, gaming, social networks, DAOs, e-commerce, and the metaverse. Our design achieves two divergent goals. zkFi aims to preserve consumer privacy while achieving regulation compliance through zero-knowledge proofs. These ends are simultaneously achievable. zkFi protocol is designed to function as a plug-and-play solution, offering developers the flexibility to handle transactional assets while abstracting away the complexities associated with zero-knowledge proofs. Notably, specific expertise in zero-knowledge proofs (ZKP) is optional, attributed to zkFi's modular approach and software development kit (SDK) availability.
- Etherscan. (2023). https://etherscan.io/
- Metamask Snaps. (2023). https://metamask.io/snaps/
- Ledger Developer Portal. (2023). https://developers.ledger.com/docs/embedded-app/introduction/
- Uniswap Docs. (2023). https://docs.uniswap.org/concepts/protocol/oracle
- TRM Labs, Inc. U.S. Treasury Sanctions Widely Used Crypto Mixer Tornado Cash https://www.trmlabs.com/post/u-s-treasury-sanctions-widely-used-crypto-mixer-tornado-cash
- Chainalysis Team Crypto Mixer Usage Reaches All-time Highs in 2022, With Nation State Actors and Cybercriminals Contributing Significant Volume https://blog.chainalysis.com/reports/crypto-mixer-criminal-volume-2022/
- NIST (August 2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
- ERC-2494: Baby Jubjub Elliptic Curve. https://eips.ethereum.org/EIPS/eip-2494
- ERC-4337: Account Abstraction Using Alt Mempool. https://eips.ethereum.org/EIPS/eip-4337
- ERC-5564: Stealth Addresses. https://eips.ethereum.org/EIPS/eip-5564
- C.P. Schnorr. Efficient Signature Generation by Smart Cards. https://d-nb.info/1156214580/34
- Nir Yoav, Langley Adam. ChaCha20 and Poly1305 for IETF Protocols. https://datatracker.ietf.org/doc/html/rfc8439
- Morgan E. Peck. The Crazy Security Behind the Birth of Zcash, the Inside Story. https://spectrum.ieee.org/the-crazy-security-behind-the-birth-of-zcash
- Vitalik Buterin. How do trusted setups work?. https://vitalik.ca/general/2022/03/14/trustedsetup.html
- Jens Groth. On the Size of Pairing-based Non-interactive Arguments. https://eprint.iacr.org/2016/260.pdf
Collections
Sign up for free to add this paper to one or more collections.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.