zkPass Protocol: A Technical Overview of Privacy-Preserving Data Verification

·

In an era where data privacy and trustless verification are paramount, zkPass emerges as a groundbreaking oracle protocol that enables users to securely prove ownership of private internet data—without exposing the data itself. Built on zkTLS, a fusion of 3P-TLS and hybrid zero-knowledge (ZK) cryptography, zkPass redefines how personal information is shared and verified across decentralized applications.

Whether it's financial records, educational credentials, or identity documents, zkPass allows individuals to generate on-chain verifiable proofs from any HTTPS website—bypassing traditional OAuth APIs while preserving full confidentiality.

👉 Discover how decentralized identity verification is evolving with cutting-edge zero-knowledge technology

Core Architecture: Redefining Trust in Data Sharing

Traditional verification systems place users at risk by requiring them to hand over sensitive data to third parties. In contrast, zkPass flips this model: the prover (user) interacts directly with the data source and generates cryptographic proof for the verifier (service provider)—ensuring no raw data ever leaves the user’s device.

This paradigm shift introduces three key roles:

The protocol leverages advanced cryptographic techniques including:

How 3P-TLS and MPC Enable Privacy-First Communication

Phase 1: Three-Way Handshake

Unlike standard TLS, which only involves client and server, zkPass introduces a third participant—the zkPass node—to jointly establish session keys using Paillier homomorphic encryption. During the handshake:

This design guarantees that even if the node is compromised, it cannot reconstruct the user’s encrypted data.

Phase 2: Key Derivation via MPC

After the handshake, P and V engage in MPC to derive two critical keys:

Crucially, V only receives part of the mac_key and none of the enc_key, making it impossible for the node to view or tamper with user data. Any modification to the response will fail MAC verification.

Phase 3: Secure Data Exchange & Proof Preparation

Standard TLS procedures handle data transmission. Then, P and V exchange parameters needed for the upcoming ZK proof generation. Optimizations such as silent Oblivious Transfer (OT), stacked Garbled Circuits (GC), and AES128 circuit reductions cut computation time by over 70% compared to naive implementations.

These enhancements make zkPass not only secure but also practical for real-world use.

Zero-Knowledge Proof Layer: Hybrid ZK Protocol

zkPass employs a two-stage ZK system combining Interactive ZK (IZK) and Non-Interactive ZK (NIZK) for optimal performance and privacy.

Interactive ZK (VOLE-ZK23)

Using Vector Oblivious Linear Evaluation (VOLE), zkPass constructs a "commit-and-prove" framework where:

Key constraints enforced in the circuit include:

Optimizations like SoftSpoken reduce network overhead by 50%, while SIMD-like "multi-data signal input" enables reuse of VOLE parameters across repeated operations—dramatically improving throughput.

👉 Explore how blockchain platforms are integrating privacy-preserving proofs

Transition to NIZK with SNARKs

Once IZK verification succeeds, the node signs the result. The user then inserts this signed output into a Merkle tree managed by an SBT (Selective Blockchain Tree) smart contract.

To later prove validity publicly:

This approach enables selective disclosure: users can prove specific claims (e.g., “I am over 18”) without revealing their actual birthdate or other attributes.

Selective Blockchain Trees (SBT): Structured Privacy

zkPass implements SBTs based on ERC998, a composable NFT standard. Two types of tokens are used:

Each dSBT contains a claim tree:

Users generate proofs for specific queries:

Example: Prove “age > 18” without revealing exact age.

Proofs are verified on-chain using lightweight functions—ensuring transparency without compromising privacy.

Security Model: Defense Against Malicious Actors

zkPass assumes semi-honest behavior by default but defends against active threats through:

Gateway Anonymization

A gateway layer masks network metadata, ensuring nodes cannot distinguish real users from auditors ("fishermen").

Fisherman Incentives

Randomly assigned tasks challenge nodes to process dummy requests. If a node behaves maliciously:

This creates strong economic disincentives for cheating.

Automated Arbitration

A mediator caches communication logs and can replay VOLE parameters to audit disputes. Entire process is automated—no manual intervention required.


Frequently Asked Questions

Q: What kind of data can zkPass verify?
A: Any data accessible via HTTPS—legal IDs, bank statements, academic records, social profiles, medical history, and more.

Q: Does zkPass require special integration with websites?
A: No. It works with existing HTTPS sites without requiring API changes or backend modifications.

Q: Can verifiers see my private data?
A: No. Only zero-knowledge proofs are shared. Your raw data remains encrypted and local.

Q: How does zkPass prevent fake proofs?
A: Through cryptographic binding to TLS sessions, MAC verification, and node-signed Merkle inclusion proofs.

Q: Is zkPass decentralized?
A: Yes. Nodes operate in a permissionless network with slashing mechanisms and fisherman oversight.

Q: What blockchains support zkPass?
A: zkPass integrates with Ethereum-compatible chains and Layer 2 solutions via smart contracts.


👉 Learn how next-gen dApps are using zero-knowledge oracles for secure identity verification