Papers
Topics
Authors
Recent
Search
2000 character limit reached

zkFi: Privacy-Preserving and Regulation Compliant Transactions using Zero Knowledge Proofs

Published 2 Jul 2023 in cs.CR | (2307.00521v6)

Abstract: We propose a middleware solution designed to facilitate seamless integration of privacy using zero-knowledge proofs within various multi-chain protocols, encompassing domains such as DeFi, gaming, social networks, DAOs, e-commerce, and the metaverse. Our design achieves two divergent goals. zkFi aims to preserve consumer privacy while achieving regulation compliance through zero-knowledge proofs. These ends are simultaneously achievable. zkFi protocol is designed to function as a plug-and-play solution, offering developers the flexibility to handle transactional assets while abstracting away the complexities associated with zero-knowledge proofs. Notably, specific expertise in zero-knowledge proofs (ZKP) is optional, attributed to zkFi's modular approach and software development kit (SDK) availability.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. Etherscan. (2023). https://etherscan.io/
  2. Metamask Snaps. (2023). https://metamask.io/snaps/
  3. Ledger Developer Portal. (2023). https://developers.ledger.com/docs/embedded-app/introduction/
  4. Uniswap Docs. (2023). https://docs.uniswap.org/concepts/protocol/oracle
  5. TRM Labs, Inc. U.S. Treasury Sanctions Widely Used Crypto Mixer Tornado Cash https://www.trmlabs.com/post/u-s-treasury-sanctions-widely-used-crypto-mixer-tornado-cash
  6. Chainalysis Team Crypto Mixer Usage Reaches All-time Highs in 2022, With Nation State Actors and Cybercriminals Contributing Significant Volume https://blog.chainalysis.com/reports/crypto-mixer-criminal-volume-2022/
  7. NIST (August 2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
  8. ERC-2494: Baby Jubjub Elliptic Curve. https://eips.ethereum.org/EIPS/eip-2494
  9. ERC-4337: Account Abstraction Using Alt Mempool. https://eips.ethereum.org/EIPS/eip-4337
  10. ERC-5564: Stealth Addresses. https://eips.ethereum.org/EIPS/eip-5564
  11. C.P. Schnorr. Efficient Signature Generation by Smart Cards. https://d-nb.info/1156214580/34
  12. Nir Yoav, Langley Adam. ChaCha20 and Poly1305 for IETF Protocols. https://datatracker.ietf.org/doc/html/rfc8439
  13. Morgan E. Peck. The Crazy Security Behind the Birth of Zcash, the Inside Story. https://spectrum.ieee.org/the-crazy-security-behind-the-birth-of-zcash
  14. Vitalik Buterin. How do trusted setups work?. https://vitalik.ca/general/2022/03/14/trustedsetup.html
  15. Jens Groth. On the Size of Pairing-based Non-interactive Arguments. https://eprint.iacr.org/2016/260.pdf

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 3 tweets with 6 likes about this paper.