The zCloak Network team is pleased to announce a major technical advancement, as we have successfully implemented the generation of STARK zero-knowledge proofs within a browser plugin.
In the above demonstration, we take a simple algorithm as an example to show the related concepts. The algorithm determines whether the user’s age is greater than 20 years old. If it is older than 20, the result is true, otherwise it is false. e.g. Alice is currently 26 years old, the algorithm generates a “true” result and a STARK zero-knowledge proof that the computation is correct. By sending the result of the calculation and the zero-knowledge proof to a third party, the user can prove that he is older than 20 years old without showing his specific age.
How is the above process implemented?
Our technical team successfully compiled the zero-knowledge proof virtual machine based on the Rust programming language into a wasm library so that it can be run inside a browser. This allows any web-based application and various browser plug-in wallets to use our zero-knowledge proof virtual machine for proof generation and verification. Notably, using the zero-knowledge proof virtual machine technique eliminates the need to generate a fixed proof circuit for each algorithm, which greatly reduces the difficulty of developing and increases the efficiency of using zero-knowledge proof algorithms.
The significance of this work lies in the paradigm shift from the existing cloud computing to Cloaked Computation. In the Web 3.0 era, we advocate that users control the sovereignty of their data, but they cannot enjoy the convenience of the Internet era if they do not share their data at all. This creates a dilemma: if you share your data, your privacy will be compromised; if you don’t share your data, you won’t be able to access the services. This is the main reason why the privacy of personal data has been slow to be fully protected.
The zCloak Network project creatively introduces the concept of “Cloaking Space”, which encrypts and stores user data in a storage space under the user’s full control, such as a local browser plug-in or mobile app. With zCloak’s invisible computing technology, the analysis and computation of user data will be performed locally by the user, with zero-knowledge proof to ensure the correctness of the computation, instead of sending the user data to a centralized third-party server. In this way, users can obtain various services without sending their personal data to the Internet platform; government agencies can use their own departmental data for business processing without sharing data with the outside world; banks can prove the business status of enterprises without publishing their account information to the outside world …… It is foreseeable that various data application scenarios that are completely unattainable under the current technical conditions completely unattainable data application scenarios will be unlocked, and a variety of new, fully protected user data privacy Internet applications will arrive rapidly.
On June 10, 2021, the Standing Committee of the National People’s Congress voted to adopt the Data Security Law of the People’s Republic of China, providing a solid legal foundation for data privacy protection. zCloak Network’s invisible computing technology will actively provide effective technical support for this. Through the invisible computing service model of “not sending, but also using” data, we can fundamentally solve the problem of data privacy leakage that is currently plaguing the industry.
About zCloak Network
zCloak Network is a privacy computing service platform developed based on Polka Substrate technology, which uses the original zk-STARK virtual machine technology to generate and verify zero-knowledge proofs for general-purpose computing. The project creatively introduces the concept of “invisible digital space” and “invisible computing”, which allows users to truly control their own data sovereignty in the Web 3.0 era, and to analyze, calculate and prove their data without sending data outside. The project will adopt the “zero-knowledge” approach. In the future, the project will adopt the business model of “zero-knowledge proof as a service” to build a one-stop multi-public chain privacy computing infrastructure.
Posted by:CoinYuppie，Reprinted with attribution to:https://coinyuppie.com/what-happens-when-you-put-zero-knowledge-proofs-in-your-browser-a-quick-look-at-the-zcloak-milestone/
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.