SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
1
Agenda
― Why Privacy is important in blockchain ?
― Theory and concept around Zero Knowledge proof
― Application of zk-Snarks in public Ethereum Blockchain
― Q & A
1
2
3
4
Importance of
privacy
3
• It is an important human right
• Allow people exercise unique moral
choices
• Enable our societies evolved around is
healthy, and makes it more resilient and
more humane
©copyright 2017
Why privacy matters
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 4
Once data is
embedded in the
blockchain it
cannot be altered
•
•
•
Do you think
Bitcoin is still
anonymous ?
• Wallet address re-use, linking your transactions
together into a single profile.
• IP address re-use.
• Combining inputs from multiple transactions,
• Using mobile wallet, effectively revealing to a third
party your full set of addresses.
Following a bitcoin
transaction
8
©copyright 2017
How to make a private transaction in the blockchain
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 9
©copyright 2017
Application of Zero Knowledge Proof
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 10
Source :
In a Zero-knowledge (ZK) proof we have
2 participants:
• Prover - Peggy
• Verifier - Victor
The prover wants to convince the
verifier that a statement is true without
leaking any extra information.
E.g. the prover wants to convince the
verifier that he has a secret without
revealing it.
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3811
Zero-knowledge proof
©copyright 2017
Zero-knowledge proof
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 12
Properties of ZK proofs:
• Termination: the protocol finishes
after a number of steps.
• Completeness: if the statement is
true then the verifier will be
convinced of this at the end of the
protocol.
• Soundness: if the statement is false
then it is unlikely that the verifier will
be fooled.
• Zero-knowledge: at the end of the
protocol no sensitive information is
leaked to the verifier.
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3813
Zero-knowledge proof
©copyright 2017
zkSNARK
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 14
Zero-knowledge Succinct Non-interactive ARguments of Knowledge
Zero-knowledge: proving existence of a secret without revealing it
Succinct: the communication volume is small
Non-interactive: no interaction
Arguments of Knowledge: proving that one knows the secret
©copyright 2017
Non-Interactive Zero-knowledge Proof (NIZK)
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 15
Peggy Victor
Common Reference String
Source: https://thenounproject.com
Secret s
Proof p
Verify proof p
©copyright 2017
Common Reference String (CRS)
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 16
Initial parameters Trusted Setup
Common Reference String
Destroy the
parameters !
©copyright 2017
Pairing on elliptic curves
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 17Source: https://desmos.com/calculator, https://en.wikipedia.org/wiki/Swiss_passport
𝐸 𝑎,𝑏 = 𝑂 ∪ { 𝑥, 𝑦 ; 𝑦2
= 𝑥3
+ 𝑎𝑥 + 𝑏}
RSA (bit length) EC (bit length) Security level
1248 160 80
2048 224 112
Pairing: mathematical tool used to instantiate a NIZK
Elliptic curve:
Efficiency
Used by
Homomorphic encryption allows to
perform operations on sensitive data
while keeping it encrypted.
Use case: secure cloud computing
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3818
𝐸𝑛𝑐 𝑚 + 𝐸𝑛𝑐 𝑛 = 𝐸𝑛𝑐(𝑚 + 𝑛)
Homomorphic evaluation/
encryption
©copyright ELCA 2017 19
©copyright ELCA 2017 20
©copyright ELCA 2017 21
©copyright ELCA 2017 22
?
?
?
?
Reference: https://www.reddit.com/r/ethereum/comments/712idt/ethereum_testnet_just_verified_a_zcash_transaction/
TEST Contract
Library: Pairing
Pre-compiled EC
operations
©copyright ELCA 2017 23
©copyright ELCA 2017 24
©copyright ELCA 2017 25
©copyright ELCA 2017
―
―
―
―
―
26
Innovations @
ELCA
ELCA is working on innovation projects wich aims to
cover the following domain(s)
• Cloud Security and Searchable Encryption in the
cloud
• ChatBot and Natural Language processing
• BigData
• Blockchain
©copyright 2017
ELCA expertise
Digital & Business
Transformation
Complexity
Reduction
Modernization
Automation
& Standartisation
Time to Market
& Agility
Alignement Business
& IT
Security …
MARKET CHALLENGES
PROJEKT ERFAHRUNG
Consulting
Software
Engineering
Technology
Integration
Application &
Cloud Management
BRANCHEN ERFAHRUNG
Financial
Services
Health &
Pension
Public
Administration
Defense &
Cybersecurity
Transportation &
Logistics
Retail & Other
Industries
(ex. Intern. Org,
Energy etc.)
ANGESAGTE THEMEN
IT Business
Consulting
ECM Enterprise
Content
Management
CIM Customer
Interaction
Management
Big Data &
Analytics
SaaS Service
& Operations
Architecture
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 28
©copyright 2017
Blockchain team
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 29
– Blockchain
– Team
– Industry
– Business
expert
Financial
– Industry
– Business
expert
Insurance
– Industry
– Business
expert
– Public
sector
– Industry
– Business
expert
Healthcare
Dedicated skilled Blockchain experts
©copyright 2017
•
•
•
•
•
•
•
•
•
•
How ELCA can help on Blockchain technology
Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 30
Mr Nagib Aouini Mr Jorge Alvaradp
Head of Cyber Security Lead Blockchain Architect
Nagib.aouini@elca.ch Jorge.alvarado@elca.ch
Tel : 021 613 2136 Tel : 021 613 2111
Confidential do not distribute 31
Dr Sonia Bogos
Crypography Engineer
Sonia.bogos@elca.ch
Tel : 021 613 2111

Contenu connexe

Tendances

StarkNet JS
StarkNet JSStarkNet JS
StarkNet JSNeven6
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureJean-Phi N✅
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat ModelPeteLind
 
Alternative Consensus & Enterprise Blockchain
Alternative Consensus & Enterprise BlockchainAlternative Consensus & Enterprise Blockchain
Alternative Consensus & Enterprise BlockchainTobias Disse
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractThanh Nguyen
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101Karthikeyan VK
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanScott Strang
 
Testing in the blockchain
Testing in the blockchainTesting in the blockchain
Testing in the blockchainCraig Risi
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalScott Strang
 
Blockchain and Internet of Things
Blockchain and Internet of ThingsBlockchain and Internet of Things
Blockchain and Internet of ThingsValerie Lampkin
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
 
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...Edureka!
 
Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17Rajesh Kumar
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...SecuRing
 
Blockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerBlockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerGokul Alex
 
Accelerate Blockchain slideshare
Accelerate Blockchain slideshareAccelerate Blockchain slideshare
Accelerate Blockchain slideshareCertus Solutions
 
Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)Altoros
 
Multifactor Authentication on the Blockchain
Multifactor Authentication on the BlockchainMultifactor Authentication on the Blockchain
Multifactor Authentication on the BlockchainReza Ismail
 
Front-End Development for dApps on Tezos
Front-End Development for dApps on TezosFront-End Development for dApps on Tezos
Front-End Development for dApps on TezosNeven6
 

Tendances (20)

StarkNet JS
StarkNet JSStarkNet JS
StarkNet JS
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
Alternative Consensus & Enterprise Blockchain
Alternative Consensus & Enterprise BlockchainAlternative Consensus & Enterprise Blockchain
Alternative Consensus & Enterprise Blockchain
 
Introduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart ContractIntroduction to Ethereum Blockchain & Smart Contract
Introduction to Ethereum Blockchain & Smart Contract
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 
Deja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet SumanDeja vu Security - Blockchain Security Summit - Navneet Suman
Deja vu Security - Blockchain Security Summit - Navneet Suman
 
Encode Club Hackathon
Encode Club Hackathon  Encode Club Hackathon
Encode Club Hackathon
 
Testing in the blockchain
Testing in the blockchainTesting in the blockchain
Testing in the blockchain
 
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay AggarwalDeja vu Security - Blockchain Security Summit - Akshay Aggarwal
Deja vu Security - Blockchain Security Summit - Akshay Aggarwal
 
Blockchain and Internet of Things
Blockchain and Internet of ThingsBlockchain and Internet of Things
Blockchain and Internet of Things
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
 
Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17Presented AITC Blockchain Framework @ NPC 17
Presented AITC Blockchain Framework @ NPC 17
 
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
 
Blockchain and Cryptography - A Primer
Blockchain and Cryptography - A PrimerBlockchain and Cryptography - A Primer
Blockchain and Cryptography - A Primer
 
Accelerate Blockchain slideshare
Accelerate Blockchain slideshareAccelerate Blockchain slideshare
Accelerate Blockchain slideshare
 
Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)
 
Multifactor Authentication on the Blockchain
Multifactor Authentication on the BlockchainMultifactor Authentication on the Blockchain
Multifactor Authentication on the Blockchain
 
Front-End Development for dApps on Tezos
Front-End Development for dApps on TezosFront-End Development for dApps on Tezos
Front-End Development for dApps on Tezos
 

Similaire à Privacy-preserving techniques using zero knowledge proof in public Ethereum

Bat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchainBat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchainBATbern
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsSaad Zaher
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Diego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMDiego Alberto Tamayo
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMDiego Alberto Tamayo
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized SystemIRJET Journal
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesPistoia Alliance
 
Demystifying blockchain
Demystifying blockchain   Demystifying blockchain
Demystifying blockchain Vinod Kashyap
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introductionInitio
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder Ali Al-Sherbaz
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxsheronlewthwaite
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101Peter Ing
 
Blockchain: Recent developments and applications
Blockchain: Recent developments and applicationsBlockchain: Recent developments and applications
Blockchain: Recent developments and applicationsLaurent Féral-Pierssens
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyRiddhiPawar5
 

Similaire à Privacy-preserving techniques using zero knowledge proof in public Ethereum (20)

Bat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchainBat38 aouini bogosalvarado_zk-snark_blockchain
Bat38 aouini bogosalvarado_zk-snark_blockchain
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm Blockchain a-new-disruption-in-financial-servies by ibm
Blockchain a-new-disruption-in-financial-servies by ibm
 
Blockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBMBlockchain a-new-disruption-in-financial-services - IBM
Blockchain a-new-disruption-in-financial-services - IBM
 
Blockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBMBlockchain a-new-disruption-in-financial-servies - IBM
Blockchain a-new-disruption-in-financial-servies - IBM
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
BLOCKCHAIN.pptx
 BLOCKCHAIN.pptx BLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
Demystifying blockchain
Demystifying blockchain   Demystifying blockchain
Demystifying blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
Block chains and crypto currencies - introduction
Block chains and crypto currencies - introductionBlock chains and crypto currencies - introduction
Block chains and crypto currencies - introduction
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder
 
Blockchain
BlockchainBlockchain
Blockchain
 
Impact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docxImpact of Blockchain on IT AuditBlockchain Techn.docx
Impact of Blockchain on IT AuditBlockchain Techn.docx
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
Blockchain: Recent developments and applications
Blockchain: Recent developments and applicationsBlockchain: Recent developments and applications
Blockchain: Recent developments and applications
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 

Dernier

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Dernier (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Privacy-preserving techniques using zero knowledge proof in public Ethereum

  • 1. 1
  • 2. Agenda ― Why Privacy is important in blockchain ? ― Theory and concept around Zero Knowledge proof ― Application of zk-Snarks in public Ethereum Blockchain ― Q & A 1 2 3 4
  • 3. Importance of privacy 3 • It is an important human right • Allow people exercise unique moral choices • Enable our societies evolved around is healthy, and makes it more resilient and more humane
  • 4. ©copyright 2017 Why privacy matters Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 4
  • 5. Once data is embedded in the blockchain it cannot be altered • • •
  • 6. Do you think Bitcoin is still anonymous ? • Wallet address re-use, linking your transactions together into a single profile. • IP address re-use. • Combining inputs from multiple transactions, • Using mobile wallet, effectively revealing to a third party your full set of addresses.
  • 8. 8
  • 9. ©copyright 2017 How to make a private transaction in the blockchain Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 9
  • 10. ©copyright 2017 Application of Zero Knowledge Proof Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 10 Source :
  • 11. In a Zero-knowledge (ZK) proof we have 2 participants: • Prover - Peggy • Verifier - Victor The prover wants to convince the verifier that a statement is true without leaking any extra information. E.g. the prover wants to convince the verifier that he has a secret without revealing it. Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3811 Zero-knowledge proof
  • 12. ©copyright 2017 Zero-knowledge proof Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 12
  • 13. Properties of ZK proofs: • Termination: the protocol finishes after a number of steps. • Completeness: if the statement is true then the verifier will be convinced of this at the end of the protocol. • Soundness: if the statement is false then it is unlikely that the verifier will be fooled. • Zero-knowledge: at the end of the protocol no sensitive information is leaked to the verifier. Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3813 Zero-knowledge proof
  • 14. ©copyright 2017 zkSNARK Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 14 Zero-knowledge Succinct Non-interactive ARguments of Knowledge Zero-knowledge: proving existence of a secret without revealing it Succinct: the communication volume is small Non-interactive: no interaction Arguments of Knowledge: proving that one knows the secret
  • 15. ©copyright 2017 Non-Interactive Zero-knowledge Proof (NIZK) Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 15 Peggy Victor Common Reference String Source: https://thenounproject.com Secret s Proof p Verify proof p
  • 16. ©copyright 2017 Common Reference String (CRS) Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 16 Initial parameters Trusted Setup Common Reference String Destroy the parameters !
  • 17. ©copyright 2017 Pairing on elliptic curves Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 17Source: https://desmos.com/calculator, https://en.wikipedia.org/wiki/Swiss_passport 𝐸 𝑎,𝑏 = 𝑂 ∪ { 𝑥, 𝑦 ; 𝑦2 = 𝑥3 + 𝑎𝑥 + 𝑏} RSA (bit length) EC (bit length) Security level 1248 160 80 2048 224 112 Pairing: mathematical tool used to instantiate a NIZK Elliptic curve: Efficiency Used by
  • 18. Homomorphic encryption allows to perform operations on sensitive data while keeping it encrypted. Use case: secure cloud computing Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT3818 𝐸𝑛𝑐 𝑚 + 𝐸𝑛𝑐 𝑛 = 𝐸𝑛𝑐(𝑚 + 𝑛) Homomorphic evaluation/ encryption
  • 22. ©copyright ELCA 2017 22 ? ? ? ? Reference: https://www.reddit.com/r/ethereum/comments/712idt/ethereum_testnet_just_verified_a_zcash_transaction/ TEST Contract Library: Pairing Pre-compiled EC operations
  • 27. Innovations @ ELCA ELCA is working on innovation projects wich aims to cover the following domain(s) • Cloud Security and Searchable Encryption in the cloud • ChatBot and Natural Language processing • BigData • Blockchain
  • 28. ©copyright 2017 ELCA expertise Digital & Business Transformation Complexity Reduction Modernization Automation & Standartisation Time to Market & Agility Alignement Business & IT Security … MARKET CHALLENGES PROJEKT ERFAHRUNG Consulting Software Engineering Technology Integration Application & Cloud Management BRANCHEN ERFAHRUNG Financial Services Health & Pension Public Administration Defense & Cybersecurity Transportation & Logistics Retail & Other Industries (ex. Intern. Org, Energy etc.) ANGESAGTE THEMEN IT Business Consulting ECM Enterprise Content Management CIM Customer Interaction Management Big Data & Analytics SaaS Service & Operations Architecture Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 28
  • 29. ©copyright 2017 Blockchain team Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 29 – Blockchain – Team – Industry – Business expert Financial – Industry – Business expert Insurance – Industry – Business expert – Public sector – Industry – Business expert Healthcare Dedicated skilled Blockchain experts
  • 30. ©copyright 2017 • • • • • • • • • • How ELCA can help on Blockchain technology Privacy-preserving techniques using zero knowledge proof in public Ethereum - Nov 3 - BAT38 30
  • 31. Mr Nagib Aouini Mr Jorge Alvaradp Head of Cyber Security Lead Blockchain Architect Nagib.aouini@elca.ch Jorge.alvarado@elca.ch Tel : 021 613 2136 Tel : 021 613 2111 Confidential do not distribute 31 Dr Sonia Bogos Crypography Engineer Sonia.bogos@elca.ch Tel : 021 613 2111