Zero Knowledge Proofs and Blockchain Privacy
Instructor: Andreas Park
Transaction Processing
{
{
features
consequences
assets ownership by accounts
Transaction Visualization
transactions
decentralized applications
tokens
The
"Mem-Pool"
Key Insight: there is no built-in privacy!
Blockchain has no privacy
Example:
Root problem
Solutions
Blockchain has no privacy
So no privacy. So why is everyone concerned about money laundering and crime?
But KYC for AML/CFT is all abound
How can we have compliance that keeps criminals out?
Basic FINTRAC/FINCEN Rules for Money Services Businesses
\(\Rightarrow\) the rules are "tight"
August 8, 2022: OFAC sanctions Tornado Cash
Zero Knowledge Proofs
Basic Premise
A mechanism that proves to one party (the VERIFIER) that another party (the PROVER) possesses some knowledge, without revealing the knowledge itself or any other information that can be used to re-construct it
This is a probabilistic statement not a math proof
I was born between 1976 and 2000
Range Proofs
Examples
I am an EU citizen
Set Membership
Formal Technology:
WHY?
Computational
Integrity
I performed the computation
you asked me to
Toy example #1 for a zero knowledge proof
Verifier Victor
Prover Peggy
How? Toy Example 2
Toy example #2 for a zero knowledge proof
Privacy solutions
Current Compliance Solutions
Approach | Objective | Problem |
---|---|---|
deposit limits at off-ramps | block illicit funds | blocks some bad actors but frustrates regular people |
sanctioned addresses | block bad actors | whack a mole |
data analytics | risk scoring | significant type I and type II errors |
view-only access | let regulators see transactions | relies on cooperation, including from criminals |
association sets | proof of innocence | slow to detect, concern about criminals sneaking in |
KYC of addresses/whitelisting | verify identify of account | no privacy towards KYC provider _ honeypots |
selective de-anonymization | proof of innocence with stick | currently works only in L2s/rollups |
Decentralized Compliance Networks
Underlying Idea
Compliance violation occurs
Users:
Choose their revokers.
Users have full control over their privacy.
Revokers:
Initiate requests for de-anonymization based on suspicious activity.
Must post verifiable public requests to trigger the process, ensuring transparency.
Can be entities like Chainalysis, TRM Labs, or other trusted individuals decided through the public governance portal.
Guardians:
Vote to approve or deny the de-anonymization request.
Operate with a threshold mechanism (e.g., 6 of 10 must agree to proceed).
Guardians cannot see the transaction details themselves. Only Revoker can see it after receiving threshold permission from Guardians.