Member-only story
Zero Knowledge Proof (ZKP) Protocols — Finding “Wally” Is Just Part Of The Task
Provability without exposing any knowledge or data, is ideal in Digital Identity verification. This is because of how information can easily be copied and stored by computers. Exchanging data poses several risks. It not only exposes additional details of a personally identifiable information (PII), but there is also the possibility it can end up in a bad actor’s hands. People should have the right to prove attributes about themselves without having to expose the actual details. This allows the “blind” approach to sharing data. One technique that can be used is Zero Knowledge Proof (ZKP) like the zk-SNARKS method. ZKP allows data to be verified without revealing that data.
Now you might be wondering who “Wally” is and what this has to do with ZKP or cybersecurity in general. That is an abstract I would like to share to better understand ZKP. In a real world application, you have to take the abstractions from theory and code it into reality. By taking an example like “Wally” we can come up with solutions for implementing a ZKP system. “Wally” is actually a children’s puzzle book that can relate to the theoretical concepts of ZKP by using a fictitious story.