The use of this site and the content contained therein is governed by the Terms of Use. When you use this site you acknowledge that you have read the Terms of Use and that you accept and will be bound by the terms hereof and such terms as may be modified from time to time.
All text, graphics, audio, design and other works on the site are the copyrighted works of nasscom unless otherwise indicated. All rights reserved.
Content on the site is for personal use only and may be downloaded provided the material is kept intact and there is no violation of the copyrights, trademarks, and other proprietary rights. Any alteration of the material or use of the material contained in the site for any other purpose is a violation of the copyright of nasscom and / or its affiliates or associates or of its third-party information providers. This material cannot be copied, reproduced, republished, uploaded, posted, transmitted or distributed in any way for non-personal use without obtaining the prior permission from nasscom.
The nasscom Members login is for the reference of only registered nasscom Member Companies.
nasscom reserves the right to modify the terms of use of any service without any liability. nasscom reserves the right to take all measures necessary to prevent access to any service or termination of service if the terms of use are not complied with or are contravened or there is any violation of copyright, trademark or other proprietary right.
From time to time nasscom may supplement these terms of use with additional terms pertaining to specific content (additional terms). Such additional terms are hereby incorporated by reference into these Terms of Use.
Disclaimer
The Company information provided on the nasscom web site is as per data collected by companies. nasscom is not liable on the authenticity of such data.
nasscom has exercised due diligence in checking the correctness and authenticity of the information contained in the site, but nasscom or any of its affiliates or associates or employees shall not be in any way responsible for any loss or damage that may arise to any person from any inadvertent error in the information contained in this site. The information from or through this site is provided "as is" and all warranties express or implied of any kind, regarding any matter pertaining to any service or channel, including without limitation the implied warranties of merchantability, fitness for a particular purpose, and non-infringement are disclaimed. nasscom and its affiliates and associates shall not be liable, at any time, for any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communications line failure, theft or destruction or unauthorised access to, alteration of, or use of information contained on the site. No representations, warranties or guarantees whatsoever are made as to the accuracy, adequacy, reliability, completeness, suitability or applicability of the information to a particular situation.
nasscom or its affiliates or associates or its employees do not provide any judgments or warranty in respect of the authenticity or correctness of the content of other services or sites to which links are provided. A link to another service or site is not an endorsement of any products or services on such site or the site.
The content provided is for information purposes alone and does not substitute for specific advice whether investment, legal, taxation or otherwise. nasscom disclaims all liability for damages caused by use of content on the site.
All responsibility and liability for any damages caused by downloading of any data is disclaimed.
nasscom reserves the right to modify, suspend / cancel, or discontinue any or all sections, or service at any time without notice.
For any grievances under the Information Technology Act 2000, please get in touch with Grievance Officer, Mr. Anirban Mandal at data-query@nasscom.in.
Zero Knowledge Proofs (ZKPs) are gaining traction in today’s tech landscape, particularly in blockchain and Web3 sectors. The rise of Zero Knowledge-based public chains, zkRollups and zk based dApps are notable, but it’s important to remember that ZKPs can also be applied outside of blockchain as well. The primary appeal of ZKPs are enhanced privacy and improved scalability, and they can be applied in a multitude of sectors.
Essentially, ZKPs allow users to access personalized web services while keeping their private information secure, along with the benefit of reduced amount of data that needs to be processed.
In this article, we will explore various practical applications of ZKPs, with or without blockchain, showing how they contribute to the development of more privacy-friendly, scalable and efficient products for businesses across sectors.
What are ZKPs?
ZKPs or Zero-Knowledge Proofs are cryptography primitives that use mathematical computations to provide only the information required to validate a question without revealing the entire information.
Let’s break the core ideas of ZKP with a simple example.
Imagine Alice needs to show Bob she knows a secret passkey without actually telling him what it is. They’re at this circular cave with two doors, A and B, and a secret door C in the middle. The catch? Door C only opens with the passkey. So, Alice goes in through A and if she pops out of B, Bob gets the message – she knows the secret without her saying a word.
The more times she does it, the less likely she’s just guessing. It’s like a trust game, proving she’s in the know, perfect for blockchain stuff where trust is key but secrets are too.
For those interested in the nuts and bolts of how ZKPs function and their complex underpinnings, feel free to dive deeper into our detailed blog post where we unwrap the layers of this fascinating subject:
Practical Application of ZKP Across Different Stakeholders
Helping Government In Maintaining Democracy
Though elections have been the greatest testament to validate the dance of democracy, the outcomes have failed to reach its true potential. Why? Because, there’s no true mechanism in place that can validate the exercise of franchise.
That’s why in the past, most of the time the authenticity of the voting has been questioned. And such occurrences add insult to the injury when people waste considerable time waiting in queue to cast their vote.
It is estimated that such practices cost a whopping $1 billion in productivity to the public exchequer.
In this regard, ZKP applications resolve the problem of rigging in voting through a privacy preserving, smart-contract triggered check and balance mechanism. The voters can anonymously cast their votes without revealing their true identity and the cryptography computations ensure that results could be verified on-chain to restore the true essence of democracy.
Estonia has already deployed the POC as a pilot project and it has delivered unprecedented outcomes. Voters could easily vote from the confines of their home and since the ZKP technology is fast and cheap, this could be the beginning of new discovery in making elections truly democratized, verifiable and cheap.
Countering MEV Scam
MEV or Maximum Extractable Value is another major point of failure where applications of ZKPs could solve a major reputation crisis. Why do we say that? Because, the main aim of introducing decentralization was to reestablish transparency, validation and security; however, when certain news inundate social platforms like miners/validators indulging in unethical practices to fraud users, the need for a solution arises.
Sandwich attacks, front-running and back-running transcations have triggered the necessity for a completely anonymous validation with no sharing of information whatsoever.
ZKP applications, though not in equivalence to be called as a magic bullet, nonetheless have provided a completely privatized way to deal with MEV scams. Most exchanges have been using this to protect equity tokens from abuse at the hands of the miners and sequencers in PoW and PoS consensus systems.
Protecting Financial Services Against Data Breaches
Ever since digitization has turned mainstream, it has undoubtedly exposed key vulnerabilities because financial services are heavily centralized which makes them a sitting duck for raids.
For example, in 10 of the biggest data breaches, more than 1 billion customer’s data has been put under attack. The stakes are high with respect to reestablishing trust and finserv like banks have voiced their intention to use next gen cryptographic technologies to protect against financial frauds. In this regard, ZKPs have unequivocally shown an optimistic way forward.
For example, ING, the Global Dutch Bank has been using ZKP Range Proof Functions for processing the mortgage applications. Along with ING, BBVA is also exploring the efficacies of the ZKP applications to help ensure privacy preserving transcations while using the financial services. In this way, they wish to grant true security and protection to its users who have been exploited by the hackers and frauds for sharing their private information. These frauds have taken the shape of card cloning to identify thefts to lure and cheat customers.
Scaling Blockchains For Enterprise Grade Adoption
Imagine a situation where enterprises are using blockchains and suddenly there’s some cryptokitty moment trying to sabotage the network. At that juncture, all the applications which are hosted on blockchains to support enterprise applications would cease to function. That’s the performance hiatus which is widening with time as blockchain adoption turns mainstream.
For example, in one of the surveys conducted, 18.2% sided with ZKPs in terms of providing efficiency, affordability and optimizing performance while using blockchains by enterprises. So, there could be an option where a segment of transactions or light client demands could be moved off-chains and security can be inherited from the main chain and L1’s for promoting even higher TPS and lower latencies while using the network.
That’s the reason the founder of Ethereum Vitalik Buterin said that despite the Ethereum Network unrolling sharding, we still need the ZK-roll ups to scale up to 100,000 TPS. ZK-rollups optimistic and Zero Knowledge proof systems would be the answer to fix the blockchain trilemma which has been delaying adoption in volumes by enterprises.
Facilitating Verifiability of Carbon Credits in Energy Sector
After assessing the possibilities of melting of the polar caps that could ideally put the world in jeopardy, the Kyoto Protocol mandated the use of Carbon Credits for developed and developing countries to restrict the emissions levels. However, the selling of fake carbon credits has been baked so hard into the systems that it is very hard to authenticate trusted vendors in a truly private way. ZKP applications have shown a way out.
Senken’s decentralized carbon marketplace allows end-to-end accountability of authentic carbon credits that solves the innate problem of duplicate carbon credits. Moreover, since the platform uses ZKPs, enterprises can verify the carbon credits they are buying privately and organizations can also post their carbon consumption, emission and saving. Thereby simplification of validation has helped enterprises post all their developments in using green technologies for Net Zero Emission.
Over 100 high quality carbon projects have been associated with Senken because right now the demand to reduce carbon emission stands at a whopping 420 billion metric tonnes; however, the supply-side has been dwarfed at 400-million tonnes because buyers have challenges validating carbon credits due to carbon market crimes which is hurting genuine sellers. Through ZKP applications, the buyers and sellers can interact on the carbon market privately to fill up this gap.
Safeguarding IoTs To Prevent Hacking of Smart-Homes and Cars
As our lives are getting smarter day-by-day to attract even greater conveniences, we have unintentionally exposed key points of failures in the process. How? For example, we boast of smart-homes but data packets traveling from one device to another can be compromised midways. The question to raise here is do we have an evidential proof for the same. As per Kaspersky, IoTs have been going through a rough phase because hackers are trying to sneak into the systems.
They use the WiFi network which acts as a key vulnerable segment acting like sitting ducks for raids as per a statistical data analysis. But, ZKP applications could right up front solve the problem of validating passwords and other details in a completely anonymous way to safeguard users.
Restoring Trust in Supplychain For Interoperability With Partner Networks
Counterfeiting, theft and delays are just the tip of the iceberg when we assess the challenges in the supplychain network. The real problem that supplychain has to go through is inability to transaction freely with the partner network. Why? Because, all the partner networks have different business secrets, operational processes and growth models that they do not want to share with others in the network.
These legacy challenges create barriers around the supplychain network which can impact the growth of the economy. ZKPs can help enterprises share data privately and in a scalable manner. In this way, it can make auditing simple, verifiable and secure. Thereby optimizing the supply chain network to meet its desired outcomes in a truly private, secure and decentralized manner.
Wrapping Up:
Zero-Knowledge proofs undoubtedly provide an extra layer of security and privacy that users are seeking to stay in-control in a highly charged digital world .
Through ZKP applications, security, privacy and scalability all could be there in continuum and with absolute perfection despite the technology being very new to be implemented. It will be interesting to see how ZKP applications further improve the efficiency of sectors across a broad spectrum as they enjoy absolute adoption 2 to 5 years down the line.
If you are looking to build an application that needs to leverage a Zero Knowledge Proof public chain, check out Polygon zkEVM and zkSync.
About The Author
Dr. Ravi Chamria is co-founder CEO of Zeeve Inc, an Enterprise Blockchain company. He has an experience of 18+ years in IT consulting spanning across Fintech, InsureTech, Supply Chain and eCommerce. He is an executive MBA from IIM, Lucknow and a prolific speaker on emerging technologies like Blockchain, IoT and AI/ML.
Passionate About: Blockchain, Supply Chain Management, Digital Lending, Digital Payments, AI/ML, IoT
That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.
Zeeve is an enterprise-grade Blockchain Infrastructure Automation Platform. Join the growing list of clients that trust us with their Blockchain initiatives
As cryptocurrency gains mainstream acceptance in 2024, crypto exchanges are playing an essential role in facilitating digital asset trading, acting as gateways for users to buy, sell, and trade a wide range of cryptocurrencies. More than just…
The cryptocurrency market is booming, and launching your own cryptocurrency exchange platform can be a highly profitable business venture. However, one of the most common questions business owners have is: "How long will it take to create a…
As the cryptocurrency market continues to expand and evolve, businesses venturing into the world of crypto exchanges need to stay competitive by incorporating the right features. A modern crypto exchange is not just about facilitating…
Introductions
Tokenization in blockchain is a transformative process that will enable the representation of real-world assets as digital tokens. This really does represent the approach which is really leading towards better asset management and…
Web3 has been painted as the democratic version of the internet, which empowers users to have control over their personal data. It aims at distributing power among the participants rather than vesting trust in centralized agencies, such as the…
In the bustling world of emerging technologies, blockchain is making a notable comeback as a pillar of trust and transparency. For all the hype cryptocurrencies generated, nothing much happened of them, with the noise causing a decline in the…