SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Privacy-preserving techniques using zero
knowledge proof in public Ethereum
3 November 2017
ELCA Informatique SA
Nagib Aouini, Head of Cyber Security Services
Dr Sonia Bogos, Cryptography Engineer
Jorge Alvarado, Lead Blockchain architect, ELCA 1
Agenda
― Why Privacy is important in blockchain ?
― Theory and concept around Zero Knowledge proof
― Application of zk-SNARKs in public Ethereum Blockchain
― Q & A
1
2
3
4
Importance of
privacy
3
• Essential human right
• Allow people exercise unique moral
choices
• Enable our societies evolved around is
healthy, and makes it more resilient and
more humane
©copyright 2017
Why privacy matters
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 4
Once data is
embedded in the
blockchain it
cannot be altered
•
•
•
Do you think
Bitcoin is still
anonymous ?
• Wallet address re-use, linking your transactions
together into a single profile.
• IP address re-use.
• Combining inputs from multiple transactions,
• Using mobile wallet, effectively revealing to a third
party your full set of addresses.
Following a bitcoin
transaction
8
©copyright 2017
How to make private transaction in the blockchain
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 9
©copyright 2017
Application of Zero Knowledge Proof
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 10
Source :
In a Zero-knowledge (ZK) proof we have
2 participants:
• Prover - Peggy
• Verifier - Victor
The prover wants to convince the
verifier that a statement is true without
leaking any extra information.
E.g. the prover wants to convince the
verifier that he has a secret without
revealing it.
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3811
Zero-knowledge proof
©copyright 2017
Zero-knowledge proof
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 12
Properties of ZK proofs:
• Termination: the protocol finishes
after a number of steps.
• Completeness: if the statement is
true then the verifier will be
convinced of this at the end of the
protocol.
• Soundness: if the statement is false
then it is unlikely that the verifier will
be fooled.
• Zero-knowledge: at the end of the
protocol no sensitive information is
leaked to the verifier.
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3813
Zero-knowledge proof
©copyright 2017
zkSNARK
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 14
Zero-knowledge Succinct Non-interactive ARguments of Knowledge
Zero-knowledge: proving existence of a secret without revealing it
Succinct: the communication volume is small
Non-interactive: no interaction
Arguments of Knowledge: proving that one knows the secret
©copyright 2017
Non-interactive Zero-knowledge proof (NIZK)
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 15
Peggy Victor
Common Reference String
Source: https://thenounproject.com
Secret s
Proof p
Verify proof p
©copyright 2017
Common Reference String (CRS)
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 16
Initial parameters Trusted Setup
Common Reference String
Destroy the
parameters !
©copyright 2017
Pairing on elliptic curves
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 17Source: https://desmos.com/calculator, https://en.wikipedia.org/wiki/Swiss_passport
𝐸 𝑎,𝑏 = 𝑂 ∪ { 𝑥, 𝑦 ; 𝑦2
= 𝑥3
+ 𝑎𝑥 + 𝑏}
RSA (bit length) EC (bit length) Security level
1248 160 80
2048 224 112
Pairing: mathematical tool used to instantiate a NIZK
Elliptic curve:
Efficiency
Used by
Homomorphic encryption allows to
perform operations on sensitive data
while keeping it encrypted.
Use case: secure cloud computing
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3818
𝐸𝑛𝑐 𝑚 + 𝐸𝑛𝑐 𝑛 = 𝐸𝑛𝑐(𝑚 + 𝑛)
Homomorphic evaluation/
encryption
©copyright ELCA 2017
Agenda
― Privacy in Ethereum
― Byzantium
― Zk-SNARKs
― Demo
― ZoKrates
― Conclusions
1
2
3
4
5
6
19
©copyright ELCA 2017
Self-service Business
Oriented
Ethereum: public
but private but
public…
20
https://pixabay.com/en/replacement-lamp-lighting-951781/
©copyright ELCA 2017
Self-service Business
Oriented
Byzantium what?
21
https://pixabay.com/en/replacement-lamp-lighting-951781/
©copyright ELCA 2017
Self-service Business
Oriented
zk-SNARKs what?
22
https://pixabay.com/en/replacement-lamp-lighting-951781/
©copyright ELCA 2017 23
?
?
?
?
Reference: https://www.reddit.com/r/ethereum/comments/712idt/ethereum_testnet_just_verified_a_zcash_transaction/
TEST Contract
Library: Pairing
Pre-compiled EC
operations
How does it work?
©copyright ELCA 2017 24
Demo…
©copyright ELCA 2017
Self-service Business
Oriented
ZoKrates… what?
25
https://pixabay.com/en/replacement-lamp-lighting-951781/
©copyright ELCA 2017 26
ZoKrates
“… ZoKrates allows information to be obscured off the main ethereum blockchain and then
uploaded into a smart contract the network can still verify, all without exposing contract
information.”
It is another type of ethereum smart contract. A custom version of the self-executing code that runs
on top of the network, the tool serves as a way to transfer a zk-SNARKs operation onto the
blockchain and to verify that that information is valid.
©copyright ELCA 2017
Conclusions
― Privacy is the holy-grail of public blockchains
― zk-SNARKs allows to verify something without knowing the details
― Byzantium fork on Ethereum brings new functionality to facilitate the
verifiability of zk-SNARKS
― zk-SNARKs is difficult to grasp and even more difficult to code and automate
― More tooling is needed and ZoKrates attempts to fill the gap
27
Innovations @
ELCA
ELCA is working on innovation projects which aim to
cover the following domains:
• Cloud Security and Searchable Encryption in the
cloud
• ChatBot and Natural Language processing
• BigData
• Blockchain
©copyright 2017
ELCA expertise
Digital & Business
Transformation
Complexity
Reduction
Modernization
Automation
& Standartisation
Time to Market
& Agility
Alignement Business
& IT
Security …
MARKET CHALLENGES
PROJEKT ERFAHRUNG
Consulting
Software
Engineering
Technology
Integration
Application &
Cloud Management
BRANCHEN ERFAHRUNG
Financial
Services
Health &
Pension
Public
Administration
Defense &
Cybersecurity
Transportation &
Logistics
Retail & Other
Industries
(ex. Intern. Org,
Energy etc.)
ANGESAGTE THEMEN
IT Business
Consulting
ECM Enterprise
Content
Management
CIM Customer
Interaction
Management
Big Data &
Analytics
SaaS Service
& Operations
Architecture
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 29
©copyright 2017
Blockchain team
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 30
Nagib Aouini : nagib.aouini@elca.ch
Blockchain Technical Advisor /
Strategist
Jorge A.
Ethereum Expert
Hyperledger
Smart Contract
Cloud Architect
Laurent P
Blockchain Java
Hyperledger
Smart Contract
Architect
Reto F.
Security Architect
Blockchain Expert
Zurich
Head of Division / Senior
Consultant
Blockchain evangelist
> 10 senior manager
Sébastien P
Lead Architect
Dev Team
Smart contract
> 10 engineers
– Blockchain
– Team
– Industry
– Business
expert
Financial
– Industry
– Business
expert
Insurance
– Industry
– Business
expert
– Public
sector
– Industry
– Business
expert
Healthcare
Dedicated skilled Blockchain experts
©copyright 2017
• Discuss Blockchain technology
• Explore customer business
model
• Show Blockchain Application
demo
• Understand Blockchain
concepts & elements
• Hands on with
Blockchain on Ethereum /
Hyperledger / Others
• Standard demo customization
• Define business challenge
• Agile iterations incrementally
build project functionality
• Enterprise integration
• Provide Blockchain Dev expert
and consulting services
Élaboration Construction
How ELCA can help on Blockchain technology
Blockchain Hands-
on
Experience
Blockchain
Provide Expertise
and First Project
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 31
Mr Nagib Aouini Mr Jorge Alvaradp
Head of Cyber Security Lead Blockchain Architect
Nagib.aouini@elca.ch Jorge.alvarado@elca.ch
Tel : 021 613 2136 Tel : 021 613 2111
Confidential do not distribute 32
Dr Sonia Bogos
Crypography Engineer
Sonia.bogos@elca.ch
Tel : 021 613 2111

Weitere ähnliche Inhalte

Was ist angesagt?

How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional?
101 Blockchains
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
101 Blockchains
 
Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021
101 Blockchains
 

Was ist angesagt? (20)

Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional? How To Become A Certified Blockchain Security Professional?
How To Become A Certified Blockchain Security Professional?
 
Hyperledger development & smart contract development
Hyperledger development & smart contract developmentHyperledger development & smart contract development
Hyperledger development & smart contract development
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
Blockchain Training | Blockchain Tutorial for Beginners | Blockchain Technolo...
 
Comparison Blockchain Developer vs. Blockchain Expert
Comparison  Blockchain Developer vs. Blockchain Expert Comparison  Blockchain Developer vs. Blockchain Expert
Comparison Blockchain Developer vs. Blockchain Expert
 
Why are Giant software companies investing in Blockchain?
Why are Giant software companies investing in Blockchain?Why are Giant software companies investing in Blockchain?
Why are Giant software companies investing in Blockchain?
 
Global Cybersecurity Blockchain Group
Global Cybersecurity Blockchain GroupGlobal Cybersecurity Blockchain Group
Global Cybersecurity Blockchain Group
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOT
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
Smart Contracts Programming Tutorial | Solidity Programming Language | Solidi...
Smart Contracts Programming Tutorial | Solidity Programming Language | Solidi...Smart Contracts Programming Tutorial | Solidity Programming Language | Solidi...
Smart Contracts Programming Tutorial | Solidity Programming Language | Solidi...
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchain
 
Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)
 
Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 

Ähnlich wie Bat38 aouini bogosalvarado_zk-snark_blockchain

Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Nagib Aouini
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
sheronlewthwaite
 

Ähnlich wie Bat38 aouini bogosalvarado_zk-snark_blockchain (20)

Privacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public EthereumPrivacy-preserving techniques using zero knowledge proof in public Ethereum
Privacy-preserving techniques using zero knowledge proof in public Ethereum
 
CWIN17 Rome / blockchain
CWIN17 Rome / blockchainCWIN17 Rome / blockchain
CWIN17 Rome / blockchain
 
20190316 - CLBFest - GDPR & Blockchain - Axel Beelen
20190316 - CLBFest - GDPR & Blockchain - Axel Beelen20190316 - CLBFest - GDPR & Blockchain - Axel Beelen
20190316 - CLBFest - GDPR & Blockchain - Axel Beelen
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
Executive summary guild42 elca_blockchain.pptx_v1.0
Executive summary guild42 elca_blockchain.pptx_v1.0Executive summary guild42 elca_blockchain.pptx_v1.0
Executive summary guild42 elca_blockchain.pptx_v1.0
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...Blockchain for mere mortals - understand the fundamentals and start building ...
Blockchain for mere mortals - understand the fundamentals and start building ...
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder
 
Blockchain
BlockchainBlockchain
Blockchain
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Demystifying blockchain
Demystifying blockchain   Demystifying blockchain
Demystifying blockchain
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
Evaluation of authentication based elliptic curve cryptography in wireless se...
Evaluation of authentication based elliptic curve cryptography in wireless se...Evaluation of authentication based elliptic curve cryptography in wireless se...
Evaluation of authentication based elliptic curve cryptography in wireless se...
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
 
Blockchain for network engineers
Blockchain for network engineersBlockchain for network engineers
Blockchain for network engineers
 
Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017Silicon Valley Code Camp Blockchain Oct 2017
Silicon Valley Code Camp Blockchain Oct 2017
 

Mehr von BATbern

From Ideation to Production in 7 days: The Scoring Factory at Raiffeisen
From Ideation to Production in 7 days: The Scoring Factory at RaiffeisenFrom Ideation to Production in 7 days: The Scoring Factory at Raiffeisen
From Ideation to Production in 7 days: The Scoring Factory at Raiffeisen
BATbern
 

Mehr von BATbern (20)

BATbern52 Moderation Berner Architekten Treffen zu Data Mesh
BATbern52 Moderation Berner Architekten Treffen zu Data MeshBATbern52 Moderation Berner Architekten Treffen zu Data Mesh
BATbern52 Moderation Berner Architekten Treffen zu Data Mesh
 
BATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data Mesh
 
BATbern52 SBB zu Data Products und Knacknüsse
BATbern52 SBB zu Data Products und KnacknüsseBATbern52 SBB zu Data Products und Knacknüsse
BATbern52 SBB zu Data Products und Knacknüsse
 
BATbern52 Mobiliar zu Skalierte Datenprodukte mit Data Mesh
BATbern52 Mobiliar zu Skalierte Datenprodukte mit Data MeshBATbern52 Mobiliar zu Skalierte Datenprodukte mit Data Mesh
BATbern52 Mobiliar zu Skalierte Datenprodukte mit Data Mesh
 
BATbern52 InnoQ on Data Mesh 2019 2023 2024++
BATbern52 InnoQ on Data Mesh 2019 2023 2024++BATbern52 InnoQ on Data Mesh 2019 2023 2024++
BATbern52 InnoQ on Data Mesh 2019 2023 2024++
 
Embracing Serverless: reengineering a real-estate digital marketplace
Embracing Serverless: reengineering a real-estate digital marketplaceEmbracing Serverless: reengineering a real-estate digital marketplace
Embracing Serverless: reengineering a real-estate digital marketplace
 
Serverless und Event-Driven Architecture
Serverless und Event-Driven ArchitectureServerless und Event-Driven Architecture
Serverless und Event-Driven Architecture
 
Serverless Dev(Ops) in der Praxis
Serverless Dev(Ops) in der PraxisServerless Dev(Ops) in der Praxis
Serverless Dev(Ops) in der Praxis
 
Serverless at Lifestage
Serverless at LifestageServerless at Lifestage
Serverless at Lifestage
 
Keynote Gregor Hohpe - Serverless Architectures
Keynote Gregor Hohpe - Serverless ArchitecturesKeynote Gregor Hohpe - Serverless Architectures
Keynote Gregor Hohpe - Serverless Architectures
 
BATbern51 Serverless?!
BATbern51 Serverless?!BATbern51 Serverless?!
BATbern51 Serverless?!
 
Ein Rückblick anlässlich des 50. BAT aus Sicht eines treuen Partners
Ein Rückblick anlässlich des 50. BAT aus Sicht eines treuen PartnersEin Rückblick anlässlich des 50. BAT aus Sicht eines treuen Partners
Ein Rückblick anlässlich des 50. BAT aus Sicht eines treuen Partners
 
MLOps journey at Swisscom: AI Use Cases, Architecture and Future Vision
MLOps journey at Swisscom: AI Use Cases, Architecture and Future VisionMLOps journey at Swisscom: AI Use Cases, Architecture and Future Vision
MLOps journey at Swisscom: AI Use Cases, Architecture and Future Vision
 
From Ideation to Production in 7 days: The Scoring Factory at Raiffeisen
From Ideation to Production in 7 days: The Scoring Factory at RaiffeisenFrom Ideation to Production in 7 days: The Scoring Factory at Raiffeisen
From Ideation to Production in 7 days: The Scoring Factory at Raiffeisen
 
The Future of Coaching in Sport with AI/ML
The Future of Coaching in Sport with AI/MLThe Future of Coaching in Sport with AI/ML
The Future of Coaching in Sport with AI/ML
 
Klassifizierung von Versicherungsschäden – AI und MLOps bei der Mobiliar
Klassifizierung von Versicherungsschäden – AI und MLOps bei der MobiliarKlassifizierung von Versicherungsschäden – AI und MLOps bei der Mobiliar
Klassifizierung von Versicherungsschäden – AI und MLOps bei der Mobiliar
 
BATbern48_ZeroTrust-Konzept und Realität.pdf
BATbern48_ZeroTrust-Konzept und Realität.pdfBATbern48_ZeroTrust-Konzept und Realität.pdf
BATbern48_ZeroTrust-Konzept und Realität.pdf
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
BATbern48_Zero Trust Architektur des ISC-EJPD.pdf
BATbern48_Zero Trust Architektur des ISC-EJPD.pdfBATbern48_Zero Trust Architektur des ISC-EJPD.pdf
BATbern48_Zero Trust Architektur des ISC-EJPD.pdf
 
Why did the shift-left end up in the cloud for Bank Julius Baer?
Why did the shift-left end up in the cloud for Bank Julius Baer?Why did the shift-left end up in the cloud for Bank Julius Baer?
Why did the shift-left end up in the cloud for Bank Julius Baer?
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Bat38 aouini bogosalvarado_zk-snark_blockchain

  • 1. Privacy-preserving techniques using zero knowledge proof in public Ethereum 3 November 2017 ELCA Informatique SA Nagib Aouini, Head of Cyber Security Services Dr Sonia Bogos, Cryptography Engineer Jorge Alvarado, Lead Blockchain architect, ELCA 1
  • 2. Agenda ― Why Privacy is important in blockchain ? ― Theory and concept around Zero Knowledge proof ― Application of zk-SNARKs in public Ethereum Blockchain ― Q & A 1 2 3 4
  • 3. Importance of privacy 3 • Essential human right • Allow people exercise unique moral choices • Enable our societies evolved around is healthy, and makes it more resilient and more humane
  • 4. ©copyright 2017 Why privacy matters Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 4
  • 5. Once data is embedded in the blockchain it cannot be altered • • •
  • 6. Do you think Bitcoin is still anonymous ? • Wallet address re-use, linking your transactions together into a single profile. • IP address re-use. • Combining inputs from multiple transactions, • Using mobile wallet, effectively revealing to a third party your full set of addresses.
  • 8. 8
  • 9. ©copyright 2017 How to make private transaction in the blockchain Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 9
  • 10. ©copyright 2017 Application of Zero Knowledge Proof Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 10 Source :
  • 11. In a Zero-knowledge (ZK) proof we have 2 participants: • Prover - Peggy • Verifier - Victor The prover wants to convince the verifier that a statement is true without leaking any extra information. E.g. the prover wants to convince the verifier that he has a secret without revealing it. Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3811 Zero-knowledge proof
  • 12. ©copyright 2017 Zero-knowledge proof Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 12
  • 13. Properties of ZK proofs: • Termination: the protocol finishes after a number of steps. • Completeness: if the statement is true then the verifier will be convinced of this at the end of the protocol. • Soundness: if the statement is false then it is unlikely that the verifier will be fooled. • Zero-knowledge: at the end of the protocol no sensitive information is leaked to the verifier. Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3813 Zero-knowledge proof
  • 14. ©copyright 2017 zkSNARK Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 14 Zero-knowledge Succinct Non-interactive ARguments of Knowledge Zero-knowledge: proving existence of a secret without revealing it Succinct: the communication volume is small Non-interactive: no interaction Arguments of Knowledge: proving that one knows the secret
  • 15. ©copyright 2017 Non-interactive Zero-knowledge proof (NIZK) Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 15 Peggy Victor Common Reference String Source: https://thenounproject.com Secret s Proof p Verify proof p
  • 16. ©copyright 2017 Common Reference String (CRS) Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 16 Initial parameters Trusted Setup Common Reference String Destroy the parameters !
  • 17. ©copyright 2017 Pairing on elliptic curves Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 17Source: https://desmos.com/calculator, https://en.wikipedia.org/wiki/Swiss_passport 𝐸 𝑎,𝑏 = 𝑂 ∪ { 𝑥, 𝑦 ; 𝑦2 = 𝑥3 + 𝑎𝑥 + 𝑏} RSA (bit length) EC (bit length) Security level 1248 160 80 2048 224 112 Pairing: mathematical tool used to instantiate a NIZK Elliptic curve: Efficiency Used by
  • 18. Homomorphic encryption allows to perform operations on sensitive data while keeping it encrypted. Use case: secure cloud computing Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3818 𝐸𝑛𝑐 𝑚 + 𝐸𝑛𝑐 𝑛 = 𝐸𝑛𝑐(𝑚 + 𝑛) Homomorphic evaluation/ encryption
  • 19. ©copyright ELCA 2017 Agenda ― Privacy in Ethereum ― Byzantium ― Zk-SNARKs ― Demo ― ZoKrates ― Conclusions 1 2 3 4 5 6 19
  • 20. ©copyright ELCA 2017 Self-service Business Oriented Ethereum: public but private but public… 20 https://pixabay.com/en/replacement-lamp-lighting-951781/
  • 21. ©copyright ELCA 2017 Self-service Business Oriented Byzantium what? 21 https://pixabay.com/en/replacement-lamp-lighting-951781/
  • 22. ©copyright ELCA 2017 Self-service Business Oriented zk-SNARKs what? 22 https://pixabay.com/en/replacement-lamp-lighting-951781/
  • 23. ©copyright ELCA 2017 23 ? ? ? ? Reference: https://www.reddit.com/r/ethereum/comments/712idt/ethereum_testnet_just_verified_a_zcash_transaction/ TEST Contract Library: Pairing Pre-compiled EC operations How does it work?
  • 24. ©copyright ELCA 2017 24 Demo…
  • 25. ©copyright ELCA 2017 Self-service Business Oriented ZoKrates… what? 25 https://pixabay.com/en/replacement-lamp-lighting-951781/
  • 26. ©copyright ELCA 2017 26 ZoKrates “… ZoKrates allows information to be obscured off the main ethereum blockchain and then uploaded into a smart contract the network can still verify, all without exposing contract information.” It is another type of ethereum smart contract. A custom version of the self-executing code that runs on top of the network, the tool serves as a way to transfer a zk-SNARKs operation onto the blockchain and to verify that that information is valid.
  • 27. ©copyright ELCA 2017 Conclusions ― Privacy is the holy-grail of public blockchains ― zk-SNARKs allows to verify something without knowing the details ― Byzantium fork on Ethereum brings new functionality to facilitate the verifiability of zk-SNARKS ― zk-SNARKs is difficult to grasp and even more difficult to code and automate ― More tooling is needed and ZoKrates attempts to fill the gap 27
  • 28. Innovations @ ELCA ELCA is working on innovation projects which aim to cover the following domains: • Cloud Security and Searchable Encryption in the cloud • ChatBot and Natural Language processing • BigData • Blockchain
  • 29. ©copyright 2017 ELCA expertise Digital & Business Transformation Complexity Reduction Modernization Automation & Standartisation Time to Market & Agility Alignement Business & IT Security … MARKET CHALLENGES PROJEKT ERFAHRUNG Consulting Software Engineering Technology Integration Application & Cloud Management BRANCHEN ERFAHRUNG Financial Services Health & Pension Public Administration Defense & Cybersecurity Transportation & Logistics Retail & Other Industries (ex. Intern. Org, Energy etc.) ANGESAGTE THEMEN IT Business Consulting ECM Enterprise Content Management CIM Customer Interaction Management Big Data & Analytics SaaS Service & Operations Architecture Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 29
  • 30. ©copyright 2017 Blockchain team Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 30 Nagib Aouini : nagib.aouini@elca.ch Blockchain Technical Advisor / Strategist Jorge A. Ethereum Expert Hyperledger Smart Contract Cloud Architect Laurent P Blockchain Java Hyperledger Smart Contract Architect Reto F. Security Architect Blockchain Expert Zurich Head of Division / Senior Consultant Blockchain evangelist > 10 senior manager Sébastien P Lead Architect Dev Team Smart contract > 10 engineers – Blockchain – Team – Industry – Business expert Financial – Industry – Business expert Insurance – Industry – Business expert – Public sector – Industry – Business expert Healthcare Dedicated skilled Blockchain experts
  • 31. ©copyright 2017 • Discuss Blockchain technology • Explore customer business model • Show Blockchain Application demo • Understand Blockchain concepts & elements • Hands on with Blockchain on Ethereum / Hyperledger / Others • Standard demo customization • Define business challenge • Agile iterations incrementally build project functionality • Enterprise integration • Provide Blockchain Dev expert and consulting services Élaboration Construction How ELCA can help on Blockchain technology Blockchain Hands- on Experience Blockchain Provide Expertise and First Project Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 31
  • 32. Mr Nagib Aouini Mr Jorge Alvaradp Head of Cyber Security Lead Blockchain Architect Nagib.aouini@elca.ch Jorge.alvarado@elca.ch Tel : 021 613 2136 Tel : 021 613 2111 Confidential do not distribute 32 Dr Sonia Bogos Crypography Engineer Sonia.bogos@elca.ch Tel : 021 613 2111