SlideShare a Scribd company logo
Zero Knowledge
Zero Knowledge
Zero Knowledge
Proof
Proof
Proof
Muhammad Khubaib.
Muhammad Khubaib.
Muhammad Khubaib. Sadia sarfara
Sadia sarfara
Sadia sarfara
Kamran Shafiq.
Kamran Shafiq.
Kamran Shafiq. Samina Aslam
Samina Aslam
Samina Aslam
Zero knowledge proof.pdf
History
The concept of ZKP was first
introduced by computer scientists
Shafi Goldwasser, Silvio Micali, and
Charles Rackoff in their 1985 paper
The Knowledge Complexity of
Interactive Proof Systems.
Zero knowledge proof.pdf
History
However, the idea of ZKP can be traced back to the
early 1980s, when researchers started investigating
the concept of interactive proof systems.
In 1986, Goldwasser and Micali developed a more
formal definition of ZKP, which they described as
"proofs that can be verified without any knowledge of
the witness, other than the fact that the witness knows
the proof."
History
Since then, ZKP has become an important tool in the
field of cryptography, particularly for applications
such as authentication, digital signatures, and secure
data transfer.
One of the most famous applications of ZKP is in the
field of electronic voting, where it is used to ensure
that votes are counted accurately and without
compromising the privacy of individual voters.
Introduction
A zero-knowledge proof is a cryptographic
protocol that allows one party to prove to another
party that they know a certain piece of
information without revealing that information.
This can be done in a way that the verifier is
convinced of the validity of the proof, but has no
knowledge of the actual information.
Zero knowledge proof.pdf
PROPERTIES
Completeness: If the statement being proven
is true, the verifier will be convinced of this
fact with high probability after interacting
with the prover.
Soundness: If the statement being proven is
false, the prover will not be able to convince
the verifier of its truth, except with negligible
probability.
Properties of ZNP
Properties of ZNP
Zero-knowledge: The protocol does not reveal any
information beyond the fact that the statement being
proven is true. In other words, the verifier does not
learn anything about the prover's knowledge or
secrets beyond the fact that they are capable of
proving the statement.
Properties of ZNP
Resistance to forgery and impersonation: Zero-
knowledge proofs are designed to be secure
against attacks where an adversary attempts to
forge a proof or impersonate the prover.
This property is important in applications where
the security of the protocol depends on the proof
being authentic and not tampered with.
Zero knowledge proof.pdf
Example
Imagine that Alice and Bob are exploring a cave system together.
They come to a fork in the cave where there are two paths, one
leading to the left and the other to the right. Alice claims to know
which path leads to a hidden treasure, but she doesn't want to
reveal the location of the treasure to Bob. Bob is skeptical and
wants proof that Alice actually knows the location of the treasure.
To prove her knowledge without revealing the location of the
treasure, Alice could lead Bob down the path she claims is the
correct one. As they walk, Alice could point out certain rock
formations or other features of the cave that only someone who
had been there before would know. Bob could then take note of
these features and use them to verify later that Alice actually
knew the location of the treasure without revealing the location to
anyone else.
Importance
Zero-Knowledge Proofs have become increasingly
important in modern cryptography because they
offer a way to prove the authenticity of
information or transactions without revealing any
sensitive information.
They are particularly useful in situations where
parties do not trust each other or where there is a
risk of fraud or malicious behavior.
Importance
Key applications in modern cryptography include:
Block-chain Technology: Zero-knowledge proofs are
used in block-chain technology to prove ownership
of digital assets or to verify the validity of a
transaction without revealing any sensitive
information.
This is important for ensuring the security and
privacy of the block-chain network.
Zero knowledge proof.pdf
Zero knowledge proof.pdf
Importance
Password Authentication: Zero-knowledge proofs
can be used to verify the authenticity of a user's
password without actually revealing the password
itself. This is useful for online authentication and
security.
Importance
Data Privacy: Zero-knowledge proofs can be used to
verify that certain data exists or is true without
actually revealing the data itself. This is useful for
maintaining the privacy of sensitive information
such as medical records or financial transactions
Zero knowledge proof.pdf
Future Directions
Internet of Things (IoT): Zero-knowledge proofs
can be used to ensure the privacy and security of
data collected by IoT devices, which are becoming
increasingly prevalent in our daily lives.
Zero knowledge proof.pdf
Future Directions
Machine Learning: Zero-knowledge proofs can be
used to protect the privacy of data used in machine
learning algorithms, which are becoming more
important in fields such as healthcare and finance.
Decentralized Finance (DeFi): Zero-knowledge
proofs are expected to play an important role in
decentralized finance, which is a new form of
finance that uses blockchain technology and smart
contracts to create decentralized, trustless financial
systems.
Zero knowledge proof.pdf

More Related Content

PDF
Zero Knowledge Proofs: What they are and how they work
PDF
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
PDF
Blockchain
PDF
Blockchain Scalability - Architectures and Algorithms
PPTX
Digital certificates
PPTX
Blockchain Consensus Protocols
PPTX
RSA ALGORITHM
Zero Knowledge Proofs: What they are and how they work
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Blockchain
Blockchain Scalability - Architectures and Algorithms
Digital certificates
Blockchain Consensus Protocols
RSA ALGORITHM

What's hot (20)

PPTX
Blockchain Technology
PPTX
Blockchain ppt
PDF
Introduction to Homomorphic Encryption
PPT
Cipher techniques
PPTX
Consensus Algorithms.pptx
PDF
Reinforcement Learning In AI Powerpoint Presentation Slide Templates Complete...
PDF
Ethereum in a nutshell
PDF
ECDSA/EdDSA
PPTX
Blockchain
PPTX
Votechain
PDF
Introduction of Deep Learning
PDF
3. The Data Encryption Standard (DES) and Alternatives
PDF
Lecture 1: What is Machine Learning?
PDF
Blockchain Powerpoint Presentation Slides
PDF
Blockchain Study(1) - What is Blockchain?
PPTX
Blockchain
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPTX
Encryption
Blockchain Technology
Blockchain ppt
Introduction to Homomorphic Encryption
Cipher techniques
Consensus Algorithms.pptx
Reinforcement Learning In AI Powerpoint Presentation Slide Templates Complete...
Ethereum in a nutshell
ECDSA/EdDSA
Blockchain
Votechain
Introduction of Deep Learning
3. The Data Encryption Standard (DES) and Alternatives
Lecture 1: What is Machine Learning?
Blockchain Powerpoint Presentation Slides
Blockchain Study(1) - What is Blockchain?
Blockchain
Cryptography
Cryptography and Network Security
Encryption
Ad

Similar to Zero knowledge proof.pdf (20)

PDF
Exploring the role of DSA in Zero Knowledge Proof
PPTX
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
PDF
moncon - The World's Simplest Paywall
PDF
Zero-Knowledge Proofs: Identity Proofing and Authentication
PPT
INTRODUCTION TO ZERO KNOWLEDGE PROOF.ppt
PDF
Zero-Knowledge Proofs in Light of Digital Identity
PDF
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
PDF
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
PPTX
Dissemination of knowledge on Secure Systems Engineering
PPT
Zero knowledge proofsii
PPTX
Blockchain privacy approaches in hyperledger indy
PPT
CHAPTER 12 - Zero-knowledge proof protocols.ppt
PDF
Privacy Preserving Paradigms of Blockchain Technology
PDF
ZKbasicsCheatsheet.pdf shasdhadasdsahdashdhasd
PPTX
lProtocol mainly used in cryptography and network security. .pptx
PDF
Privacy-preserving techniques using zero knowledge proof in public Ethereum
PDF
Texas Bitcoin Conference: Are Privacy Coins Private Enough?
PPTX
What is The zero knowledge Proofs Protocol System
PDF
Zksnarks in english
PDF
Tutorial on Cryptography
Exploring the role of DSA in Zero Knowledge Proof
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
moncon - The World's Simplest Paywall
Zero-Knowledge Proofs: Identity Proofing and Authentication
INTRODUCTION TO ZERO KNOWLEDGE PROOF.ppt
Zero-Knowledge Proofs in Light of Digital Identity
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Dissemination of knowledge on Secure Systems Engineering
Zero knowledge proofsii
Blockchain privacy approaches in hyperledger indy
CHAPTER 12 - Zero-knowledge proof protocols.ppt
Privacy Preserving Paradigms of Blockchain Technology
ZKbasicsCheatsheet.pdf shasdhadasdsahdashdhasd
lProtocol mainly used in cryptography and network security. .pptx
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Texas Bitcoin Conference: Are Privacy Coins Private Enough?
What is The zero knowledge Proofs Protocol System
Zksnarks in english
Tutorial on Cryptography
Ad

Recently uploaded (20)

PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
advance database management system book.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Hazard Identification & Risk Assessment .pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
IGGE1 Understanding the Self1234567891011
PDF
Empowerment Technology for Senior High School Guide
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
202450812 BayCHI UCSC-SV 20250812 v17.pptx
advance database management system book.pdf
Supply Chain Operations Speaking Notes -ICLT Program
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Orientation - ARALprogram of Deped to the Parents.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
LDMMIA Reiki Yoga Finals Review Spring Summer
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Hazard Identification & Risk Assessment .pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
IGGE1 Understanding the Self1234567891011
Empowerment Technology for Senior High School Guide

Zero knowledge proof.pdf

  • 1. Zero Knowledge Zero Knowledge Zero Knowledge Proof Proof Proof Muhammad Khubaib. Muhammad Khubaib. Muhammad Khubaib. Sadia sarfara Sadia sarfara Sadia sarfara Kamran Shafiq. Kamran Shafiq. Kamran Shafiq. Samina Aslam Samina Aslam Samina Aslam
  • 3. History The concept of ZKP was first introduced by computer scientists Shafi Goldwasser, Silvio Micali, and Charles Rackoff in their 1985 paper The Knowledge Complexity of Interactive Proof Systems.
  • 5. History However, the idea of ZKP can be traced back to the early 1980s, when researchers started investigating the concept of interactive proof systems. In 1986, Goldwasser and Micali developed a more formal definition of ZKP, which they described as "proofs that can be verified without any knowledge of the witness, other than the fact that the witness knows the proof."
  • 6. History Since then, ZKP has become an important tool in the field of cryptography, particularly for applications such as authentication, digital signatures, and secure data transfer. One of the most famous applications of ZKP is in the field of electronic voting, where it is used to ensure that votes are counted accurately and without compromising the privacy of individual voters.
  • 7. Introduction A zero-knowledge proof is a cryptographic protocol that allows one party to prove to another party that they know a certain piece of information without revealing that information. This can be done in a way that the verifier is convinced of the validity of the proof, but has no knowledge of the actual information.
  • 10. Completeness: If the statement being proven is true, the verifier will be convinced of this fact with high probability after interacting with the prover. Soundness: If the statement being proven is false, the prover will not be able to convince the verifier of its truth, except with negligible probability. Properties of ZNP
  • 11. Properties of ZNP Zero-knowledge: The protocol does not reveal any information beyond the fact that the statement being proven is true. In other words, the verifier does not learn anything about the prover's knowledge or secrets beyond the fact that they are capable of proving the statement.
  • 12. Properties of ZNP Resistance to forgery and impersonation: Zero- knowledge proofs are designed to be secure against attacks where an adversary attempts to forge a proof or impersonate the prover. This property is important in applications where the security of the protocol depends on the proof being authentic and not tampered with.
  • 14. Example Imagine that Alice and Bob are exploring a cave system together. They come to a fork in the cave where there are two paths, one leading to the left and the other to the right. Alice claims to know which path leads to a hidden treasure, but she doesn't want to reveal the location of the treasure to Bob. Bob is skeptical and wants proof that Alice actually knows the location of the treasure. To prove her knowledge without revealing the location of the treasure, Alice could lead Bob down the path she claims is the correct one. As they walk, Alice could point out certain rock formations or other features of the cave that only someone who had been there before would know. Bob could then take note of these features and use them to verify later that Alice actually knew the location of the treasure without revealing the location to anyone else.
  • 15. Importance Zero-Knowledge Proofs have become increasingly important in modern cryptography because they offer a way to prove the authenticity of information or transactions without revealing any sensitive information. They are particularly useful in situations where parties do not trust each other or where there is a risk of fraud or malicious behavior.
  • 16. Importance Key applications in modern cryptography include: Block-chain Technology: Zero-knowledge proofs are used in block-chain technology to prove ownership of digital assets or to verify the validity of a transaction without revealing any sensitive information. This is important for ensuring the security and privacy of the block-chain network.
  • 19. Importance Password Authentication: Zero-knowledge proofs can be used to verify the authenticity of a user's password without actually revealing the password itself. This is useful for online authentication and security.
  • 20. Importance Data Privacy: Zero-knowledge proofs can be used to verify that certain data exists or is true without actually revealing the data itself. This is useful for maintaining the privacy of sensitive information such as medical records or financial transactions
  • 22. Future Directions Internet of Things (IoT): Zero-knowledge proofs can be used to ensure the privacy and security of data collected by IoT devices, which are becoming increasingly prevalent in our daily lives.
  • 24. Future Directions Machine Learning: Zero-knowledge proofs can be used to protect the privacy of data used in machine learning algorithms, which are becoming more important in fields such as healthcare and finance.
  • 25. Decentralized Finance (DeFi): Zero-knowledge proofs are expected to play an important role in decentralized finance, which is a new form of finance that uses blockchain technology and smart contracts to create decentralized, trustless financial systems.