SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Zero Knowledge
Zero Knowledge
Zero Knowledge
Proof
Proof
Proof
Muhammad Khubaib.
Muhammad Khubaib.
Muhammad Khubaib. Sadia sarfara
Sadia sarfara
Sadia sarfara
Kamran Shafiq.
Kamran Shafiq.
Kamran Shafiq. Samina Aslam
Samina Aslam
Samina Aslam
History
The concept of ZKP was first
introduced by computer scientists
Shafi Goldwasser, Silvio Micali, and
Charles Rackoff in their 1985 paper
The Knowledge Complexity of
Interactive Proof Systems.
History
However, the idea of ZKP can be traced back to the
early 1980s, when researchers started investigating
the concept of interactive proof systems.
In 1986, Goldwasser and Micali developed a more
formal definition of ZKP, which they described as
"proofs that can be verified without any knowledge of
the witness, other than the fact that the witness knows
the proof."
History
Since then, ZKP has become an important tool in the
field of cryptography, particularly for applications
such as authentication, digital signatures, and secure
data transfer.
One of the most famous applications of ZKP is in the
field of electronic voting, where it is used to ensure
that votes are counted accurately and without
compromising the privacy of individual voters.
Introduction
A zero-knowledge proof is a cryptographic
protocol that allows one party to prove to another
party that they know a certain piece of
information without revealing that information.
This can be done in a way that the verifier is
convinced of the validity of the proof, but has no
knowledge of the actual information.
PROPERTIES
Completeness: If the statement being proven
is true, the verifier will be convinced of this
fact with high probability after interacting
with the prover.
Soundness: If the statement being proven is
false, the prover will not be able to convince
the verifier of its truth, except with negligible
probability.
Properties of ZNP
Properties of ZNP
Zero-knowledge: The protocol does not reveal any
information beyond the fact that the statement being
proven is true. In other words, the verifier does not
learn anything about the prover's knowledge or
secrets beyond the fact that they are capable of
proving the statement.
Properties of ZNP
Resistance to forgery and impersonation: Zero-
knowledge proofs are designed to be secure
against attacks where an adversary attempts to
forge a proof or impersonate the prover.
This property is important in applications where
the security of the protocol depends on the proof
being authentic and not tampered with.
Example
Imagine that Alice and Bob are exploring a cave system together.
They come to a fork in the cave where there are two paths, one
leading to the left and the other to the right. Alice claims to know
which path leads to a hidden treasure, but she doesn't want to
reveal the location of the treasure to Bob. Bob is skeptical and
wants proof that Alice actually knows the location of the treasure.
To prove her knowledge without revealing the location of the
treasure, Alice could lead Bob down the path she claims is the
correct one. As they walk, Alice could point out certain rock
formations or other features of the cave that only someone who
had been there before would know. Bob could then take note of
these features and use them to verify later that Alice actually
knew the location of the treasure without revealing the location to
anyone else.
Importance
Zero-Knowledge Proofs have become increasingly
important in modern cryptography because they
offer a way to prove the authenticity of
information or transactions without revealing any
sensitive information.
They are particularly useful in situations where
parties do not trust each other or where there is a
risk of fraud or malicious behavior.
Importance
Key applications in modern cryptography include:
Block-chain Technology: Zero-knowledge proofs are
used in block-chain technology to prove ownership
of digital assets or to verify the validity of a
transaction without revealing any sensitive
information.
This is important for ensuring the security and
privacy of the block-chain network.
Importance
Password Authentication: Zero-knowledge proofs
can be used to verify the authenticity of a user's
password without actually revealing the password
itself. This is useful for online authentication and
security.
Importance
Data Privacy: Zero-knowledge proofs can be used to
verify that certain data exists or is true without
actually revealing the data itself. This is useful for
maintaining the privacy of sensitive information
such as medical records or financial transactions
Future Directions
Internet of Things (IoT): Zero-knowledge proofs
can be used to ensure the privacy and security of
data collected by IoT devices, which are becoming
increasingly prevalent in our daily lives.
Future Directions
Machine Learning: Zero-knowledge proofs can be
used to protect the privacy of data used in machine
learning algorithms, which are becoming more
important in fields such as healthcare and finance.
Decentralized Finance (DeFi): Zero-knowledge
proofs are expected to play an important role in
decentralized finance, which is a new form of
finance that uses blockchain technology and smart
contracts to create decentralized, trustless financial
systems.
Zero knowledge proof.pdf

Weitere ähnliche Inhalte

Ähnlich wie Zero knowledge proof.pdf

I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!jmoquendo
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 
2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)Felipe Prado
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cnDhaval Bhatia
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Amber Butler
 

Ähnlich wie Zero knowledge proof.pdf (12)

I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Backdoor Dreaming
Backdoor DreamingBackdoor Dreaming
Backdoor Dreaming
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
 

Kürzlich hochgeladen

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Kürzlich hochgeladen (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Zero knowledge proof.pdf

  • 1. Zero Knowledge Zero Knowledge Zero Knowledge Proof Proof Proof Muhammad Khubaib. Muhammad Khubaib. Muhammad Khubaib. Sadia sarfara Sadia sarfara Sadia sarfara Kamran Shafiq. Kamran Shafiq. Kamran Shafiq. Samina Aslam Samina Aslam Samina Aslam
  • 2.
  • 3. History The concept of ZKP was first introduced by computer scientists Shafi Goldwasser, Silvio Micali, and Charles Rackoff in their 1985 paper The Knowledge Complexity of Interactive Proof Systems.
  • 4.
  • 5. History However, the idea of ZKP can be traced back to the early 1980s, when researchers started investigating the concept of interactive proof systems. In 1986, Goldwasser and Micali developed a more formal definition of ZKP, which they described as "proofs that can be verified without any knowledge of the witness, other than the fact that the witness knows the proof."
  • 6. History Since then, ZKP has become an important tool in the field of cryptography, particularly for applications such as authentication, digital signatures, and secure data transfer. One of the most famous applications of ZKP is in the field of electronic voting, where it is used to ensure that votes are counted accurately and without compromising the privacy of individual voters.
  • 7. Introduction A zero-knowledge proof is a cryptographic protocol that allows one party to prove to another party that they know a certain piece of information without revealing that information. This can be done in a way that the verifier is convinced of the validity of the proof, but has no knowledge of the actual information.
  • 8.
  • 10. Completeness: If the statement being proven is true, the verifier will be convinced of this fact with high probability after interacting with the prover. Soundness: If the statement being proven is false, the prover will not be able to convince the verifier of its truth, except with negligible probability. Properties of ZNP
  • 11. Properties of ZNP Zero-knowledge: The protocol does not reveal any information beyond the fact that the statement being proven is true. In other words, the verifier does not learn anything about the prover's knowledge or secrets beyond the fact that they are capable of proving the statement.
  • 12. Properties of ZNP Resistance to forgery and impersonation: Zero- knowledge proofs are designed to be secure against attacks where an adversary attempts to forge a proof or impersonate the prover. This property is important in applications where the security of the protocol depends on the proof being authentic and not tampered with.
  • 13.
  • 14. Example Imagine that Alice and Bob are exploring a cave system together. They come to a fork in the cave where there are two paths, one leading to the left and the other to the right. Alice claims to know which path leads to a hidden treasure, but she doesn't want to reveal the location of the treasure to Bob. Bob is skeptical and wants proof that Alice actually knows the location of the treasure. To prove her knowledge without revealing the location of the treasure, Alice could lead Bob down the path she claims is the correct one. As they walk, Alice could point out certain rock formations or other features of the cave that only someone who had been there before would know. Bob could then take note of these features and use them to verify later that Alice actually knew the location of the treasure without revealing the location to anyone else.
  • 15. Importance Zero-Knowledge Proofs have become increasingly important in modern cryptography because they offer a way to prove the authenticity of information or transactions without revealing any sensitive information. They are particularly useful in situations where parties do not trust each other or where there is a risk of fraud or malicious behavior.
  • 16. Importance Key applications in modern cryptography include: Block-chain Technology: Zero-knowledge proofs are used in block-chain technology to prove ownership of digital assets or to verify the validity of a transaction without revealing any sensitive information. This is important for ensuring the security and privacy of the block-chain network.
  • 17.
  • 18.
  • 19. Importance Password Authentication: Zero-knowledge proofs can be used to verify the authenticity of a user's password without actually revealing the password itself. This is useful for online authentication and security.
  • 20. Importance Data Privacy: Zero-knowledge proofs can be used to verify that certain data exists or is true without actually revealing the data itself. This is useful for maintaining the privacy of sensitive information such as medical records or financial transactions
  • 21.
  • 22. Future Directions Internet of Things (IoT): Zero-knowledge proofs can be used to ensure the privacy and security of data collected by IoT devices, which are becoming increasingly prevalent in our daily lives.
  • 23.
  • 24. Future Directions Machine Learning: Zero-knowledge proofs can be used to protect the privacy of data used in machine learning algorithms, which are becoming more important in fields such as healthcare and finance.
  • 25. Decentralized Finance (DeFi): Zero-knowledge proofs are expected to play an important role in decentralized finance, which is a new form of finance that uses blockchain technology and smart contracts to create decentralized, trustless financial systems.