The use of this site and the content contained therein is governed by the Terms of Use. When you use this site you acknowledge that you have read the Terms of Use and that you accept and will be bound by the terms hereof and such terms as may be modified from time to time.
All text, graphics, audio, design and other works on the site are the copyrighted works of nasscom unless otherwise indicated. All rights reserved.
Content on the site is for personal use only and may be downloaded provided the material is kept intact and there is no violation of the copyrights, trademarks, and other proprietary rights. Any alteration of the material or use of the material contained in the site for any other purpose is a violation of the copyright of nasscom and / or its affiliates or associates or of its third-party information providers. This material cannot be copied, reproduced, republished, uploaded, posted, transmitted or distributed in any way for non-personal use without obtaining the prior permission from nasscom.
The nasscom Members login is for the reference of only registered nasscom Member Companies.
nasscom reserves the right to modify the terms of use of any service without any liability. nasscom reserves the right to take all measures necessary to prevent access to any service or termination of service if the terms of use are not complied with or are contravened or there is any violation of copyright, trademark or other proprietary right.
From time to time nasscom may supplement these terms of use with additional terms pertaining to specific content (additional terms). Such additional terms are hereby incorporated by reference into these Terms of Use.
Disclaimer
The Company information provided on the nasscom web site is as per data collected by companies. nasscom is not liable on the authenticity of such data.
nasscom has exercised due diligence in checking the correctness and authenticity of the information contained in the site, but nasscom or any of its affiliates or associates or employees shall not be in any way responsible for any loss or damage that may arise to any person from any inadvertent error in the information contained in this site. The information from or through this site is provided "as is" and all warranties express or implied of any kind, regarding any matter pertaining to any service or channel, including without limitation the implied warranties of merchantability, fitness for a particular purpose, and non-infringement are disclaimed. nasscom and its affiliates and associates shall not be liable, at any time, for any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communications line failure, theft or destruction or unauthorised access to, alteration of, or use of information contained on the site. No representations, warranties or guarantees whatsoever are made as to the accuracy, adequacy, reliability, completeness, suitability or applicability of the information to a particular situation.
nasscom or its affiliates or associates or its employees do not provide any judgments or warranty in respect of the authenticity or correctness of the content of other services or sites to which links are provided. A link to another service or site is not an endorsement of any products or services on such site or the site.
The content provided is for information purposes alone and does not substitute for specific advice whether investment, legal, taxation or otherwise. nasscom disclaims all liability for damages caused by use of content on the site.
All responsibility and liability for any damages caused by downloading of any data is disclaimed.
nasscom reserves the right to modify, suspend / cancel, or discontinue any or all sections, or service at any time without notice.
For any grievances under the Information Technology Act 2000, please get in touch with Grievance Officer, Mr. Anirban Mandal at data-query@nasscom.in.
Every technology has some of the flaws which obstructs its rise at a pan-world level. Cryptocurrencies, which were treated as an exception, failed to woo the audience when it came to restoring a high degree of privacy.
Why?
Though they provided a perfect financial model, which is decentralized, secure and censorship resistant, complete privacy was missing because the demand for computational integrity forced nodes to broadcast all the contents of the transactions.
As a result, Kaspersky, an antivirus software company reports that more than 6% of crypto users refrain from using crypto citing privacy concerns. Such an image could deter mainstream adoption because most users want decentralized, trustless, secure, peer-to-peer and private transacting experience. Polygon Supernets are industry-leading technology that allows us to build and power the appchain. The EVM technology powers it and has end-to-end support from all its implementation partners. It extends the POS Mainnet and supports POS Side-Chain with MATIC staked.
But that narrative is on the verge of a reformation under the influence of privacy coins. ZK-Snark will be the technology behind making this a reality. In this blog, we shall dig deep about ZK-Snarks to help those who are planning to adopt privacy coins as their preferred financial choice for making payments.
What are ZK-Snarks?
Zk-Snarks are privacy preserving protocols that can be used to prove to the verifier that the prover has some information without actually revealing the information. Hence the name, ZK-Snark or Zero-Knowledge Succinct Non-Interactive Argument of Knowledge.
Why Such a Name?
Zero Knowledge means that the prover can prove to the verifier without revealing any information.
Succinct means the proof takes just a few milliseconds for verification.
Non-Interactive means just a single message is conveyed from the prover to the verifier.
Argument means since they are very different from traditional proof systems, hence the term argument.
Knowledge means the prover has some knowledge that only the verifier knows in complete. Therefore, completeness of the protocol is necessary for the proof system.
How ZK-Snark Came Into existence?
As we know that zero-knowledge has been in existence ever since 1985 but there was a flaw in the system. In the erstwhile model, the prover and the verifier used to send proofs back and forth.
However, continuous interaction between the prover and verifier could make data exchange heavy. So what ZK-Snark did was exchange information just once to prove that the information is correct.
As a result, the technology became scalable, convenient and cost-effective.
3 Properties of zkSNARKs:
Three main properties of ZK-SNARKs, which are considered below.
Completeness:
It is essential that the proving mechanism should be complete as shown in the above how it works section where John intends to prove without showing complete information that he is a valid traveler.
Therefore, completeness is a prerequisite as evident from the above given example. The computation takes into account all the aspects to prove that John is indeed authorized to travel.
Knowledge soundness:
Knowledge soundness comes from the queries that the verifier has been pre-knowledge about. To put this into perspective in a better way, we can look forward to the Alice and Bob cave example where Alice wants to know whether Bob has the secret key to come out of the other side of the cave and Bob wants to prove to Alice that he knows the secret key without revealing the same.
So, what Bob does is enter through door A, goes past the inner secret door named B and comes out of the exit door C. In this way, without revealing any information at all, Bob proves to Alice that he knows the secret pass-key of the inner cave without actually revealing the same.
Zero-Knowledge:
As evident from the above example, Alice doesn’t get the chance to learn from Bob that he knows the code.
Nonetheless, she is indeed convinced that Bob is genuine because he could manage to come out of the cave through another exit.
How does ZK-Snark Works?
With most cryptocurrencies, a basic UTXO model is in place to validate transactions. Due to such a model, there’s excessive relay of data on the chain, which means the validators will check certain conditions like whether the sender has sufficient balance and he/she is using the right private keys to sign the transaction.
Following that, they will validate the queries from the mempool and subsequently it will be mined into the block as a transaction.
With ZK-Snark, everything happens in the same manner but with very little information relayed on-chain. To achieve that, ZK-Snark will convert the information into an equation and the equation can be evaluated on the basis of True or False.
Due to such a method, there’s very little information shared and the transactions, which might have otherwise taken minutes, gets completed in milliseconds.
This is how the computation happens. For example, if John wants to move to the US, the authorities want to get complete information about John without actually revealing any information at all.
Here’s how the entire process shall work out;
How ZK Snark Can Help You with Privacy?
Traditional blockchain infrastructure requires read and write through from a wider data set to validate a transaction. On the contrary, when Zk-Snarks come into play, with minimal data, entries can be validated. But it does create room for exploitation.
To cater to this problem, ZK-Snark proposes a noble solution but with Merkle Hashes that track the movements across all the mediums until reaching the final destination. Which means, the time when the transaction was initiated and with the medium of wallet used must be in equivalence with the amount withdrawn and the same medium of wallet used.
In case, there’s any change in the midway, the Merkle Hashes shall track the transaction and put them back to their original state.
Pros and Cons of ZK-Snark
Pros
They shield sensitive information by hiding them. Hence, it is best for organizations which are wishful of shielding their private data and want to enjoy scalability at the same time.
Cons
The only problem with ZK-Snark is the toxic waste generated, which is the private key. The enterprises which are setting up the ZK-Snark system, if they have access to the private keys, money creation can happen out of thin air.
As a result, it is recommended to destroy the toxic waste or lambda and segregate the privacy preserving keys across random strings, which can be destroyed anytime and the system shall remain resilient to N-1, where N is the total number of trusted parties. Which means, even if 1 party remains true, the network shall sustain itself.
Practical Applications of ZK-Snark
Building SDKs:
Through the use of Zk-Snarks, it is possible to build SDKs that can easily communicate with the side-chains to extract and verify data without actually accessing their sensitive data.
Interoperating with Sidechains
Right now while interacting with the side-chains, you need trusted validators to verify the transactions.
However when Zk-Snarks come into picture, that dependency shall cease and cross-chains swaps and transfers can happen in a truly anonymous and private manner.
Auditing:
ZK-Snarks have started to witness efficacies in auditing where the auditing of the transactions that occur in an organization can be done in a truly private way without exposing them to vulnerabilities in the form of compromise of trade secrets and others.
Due to this trade-off, a third party has no right to censor any data or prevent any events from occurring on top of the blockchain.
Conclusion
The future belongs to scalable, decentralized and robust technological systems that can promise privacy along with a high degree of security. Since Zero Knowledge protocols, Rollups have used blockchain as an underlying layer to secure transactions, they have paved the way for mass adoption of DLT or Decentralized Ledger Technology, which shall be private, safe, decentralized and highly secure.
About The Author
Dr. Ravi Chamria is co-founder CEO of Zeeve Inc, an Enterprise Blockchain company. He has an experience of 18+ years in IT consulting spanning across Fintech, InsureTech, Supply Chain and eCommerce. He is an executive MBA from IIM, Lucknow and a prolific speaker on emerging technologies like Blockchain, IoT and AI/ML.
Passionate About: Blockchain, Supply Chain Management, Digital Lending, Digital Payments, AI/ML, IoT
That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.
Zeeve is an enterprise-grade Blockchain Infrastructure Automation Platform. Join the growing list of clients that trust us with their Blockchain initiatives
Whether you’re planning to buy cryptocurrency in India or simply holding crypto coins for future use, a secure cryptocurrency wallet is a must-have. A digital wallet is a software application that saves and stores public and private keys plus…
The dawn of the decade is all set for a new financial era as the world sees CBDCs (Central Bank Digital Currencies) as a prime agenda in almost all international financial policy conversations. Several nations and international organizations have…
2020 experienced a Bitcoin boom, with bitcoin price in INR surging to 23,61,651 as we rang in the new year. In the duration between January 2020 and December 2020, bitcoin price in INR grew by an impressive 317.2%, according to YCharts. This boost…
The crypto surge that is being witnessed globally is no longer exclusively driven by the Bitcoin craze. We can see the top #2 currency by market cap, Ethereum (ETH), one of the top cryptocurrencies grabbing eyeballs and market share very steadily.…
Blockchain technology is the greatest disruption that took the internet by storm when Bitcoin was launched in 2009. Since then, it has evoked interest and earned the trust of millions. Formally defined, Bitcoin is ‘an electronic payment system based…
भारत जैसे विकासशील देश में बेरोजगारी एक बहुत बड़ी समस्या है।वैसे तो यह समस्या सारे देश में ही है फिर भी अगर CMIE की रिपोर्ट को देखें तो 25.6% अंको के साथ हरियाणा इस सूचि में नंबर एक पर है।इसके बाद राजस्थान और हिमाचल का नाम है।
https://…