Fundamental Knowledge of Virtual Assets (ZKP & PoSt) - Part.2










Zero-Knowledge-Proof?

An encryption scheme in which an individual can prove to the other person, the verifier, that he or she knows the information without disclosing his or her own secret information. It is also called 'ZKP' in English.

In modern society, data personal information is an indispensable condition in digital life. However, as this digital society develops day by day, the risk of exposure to personal information from various threats and hacking is also increasing. 

In July 2011, more than 35 million important personal information was leaked, starting with the real name of the popular platform Nate/Cyworld in Korea information used by all Koreans. It was an incident that caused social issues at the time as the personal information of the majority of the people was leaked.

In order to protect such personal information, it can be said that Zero-knowledge-proof technology is important.

A zero-knowledge-based proof, or ZKP, is simply a form of encryption that can prove identity or specific credentials to a third party without disclosing personal details.

To make it easy to understand the proof of knowledge, let me give you an example. Let's open the scenario that you and a friend named A and B. One day you heard a secret from a friend named A.

A asked you not to tell this secret to anyone. However, a friend named B already claims to know the secret of friend A. And B says he can't tell you the secret honestly because others will hear it.

So to prove if B really knows the secret, you ask B a lot of specific questions about the secret, such as where and when the incident occurred, and if B answers the question correctly, you can reasonably guess that B really knows A's secret.

There are two types of proof of knowledge: interactive and non-interactive. The above type is called interactive. In other words, the attestor and the verifier must communicate (communicate) with each other to prove the statement. Interactive doesn't scale much. This is why non-interactive knowledge proof (ZKP) is more popular.

In non-interactive ZKP, the attestor and verifier do not need to talk to each other for a transaction. Instead, it is done through complex encryption and resolution, so if you start explaining it, you can read this article like an academic paper.

How was the zero-knowledge-proof used?

1. Blockchain technology

Zero-Knowledge-Proof (ZKP) was used in popular private blockchains such as Zcash. Zcash uses the name ZK-Snark. ZK-Snark is non-interactive because information must be verified throughout the blockchain, and it is not practical for many nodes to interact. 

ZKP also identified use cases in Layer 2 expansion solutions for Ehteum, such as Immutable-X or Arbitrum, along with the privacy blockchain. This blockchain binds transactions to be executed in the main chain. Forever knowledge is used to reduce the amount of data contained in transactions, increasing scalability and reducing congestion.


2. Identification

Ownership of identity can be maintained through a Zero-Knowledge-Proof (ZKP). The app can verify that you are "self" through a knowledge-based certification technology without a ID or driver's license. We can provide sufficient information to prove that we are qualified or compliant with certain services.

Therefore, the possibility of fraud can be reduced to protect sensitive identity data. And it will make the process much simpler, such as applying for a visa, lending, leasing contracts, and voting.




What is a Proof-Of-Spacetime?

Next, spatio-temporal proof (PoSt) will be described. To briefly mention the proof of replication (PoRep) before describing the spatio-temporal proof, the proof of replication is a procedure to prove to the FIL coin network that Minor has generated a unique copy of some data on behalf of the network. 

Proof of replication (PoRep) is used in file coin (FIL) systems to generate sealed sectors that prove that storage miners hold client data.

PoSt is a procedure called Proof-of-Spacetime, which proves that Minor has continued to store copies of some of the data he keeps. It is divided into Window Proof-of-Spacetime and Winning Proof-of-Spacetime.

1) Window PoSt

It is a mechanism to monitor promises made by Minor. Each 24-hour period is subdivided into a series of windows. Accordingly, the sector is divided into one subset for each chapter, and within a given rejection, the minor must submit a Window PoSt for the sector in that subset.

2) Winning PoSt

It is a mechanism by which minor is compensated according to contributions to the File Coin (FIL) Miners are elected to create new blocks at each epoch. In this process, the minor must go through spatiotemporal proof for the sector.

Minor, who successfully created the block, is rewarded with a Filecoin (FIL) and may charge a fee to other Filecoin participants to include a message in the block.

Minors who do not perform this task for the required time lose their opportunity to mine the block, but on the contrary, they do not penalize minors who do not.


* What is Epoch?

The reference time required for block generation in the file coin network is set to 30 seconds. Miners elected in each Epoch generate new blocks through Winning PoSt.

As such, there are many technologies in the blockchain market that require stability and detail with various technologies. 

Today, we learned about the key keyword "Forever Knowledge Proof" in the Aleo project described earlier and the key keyword "Time-Space Proof" in File Coin (FIL), one of the key projects of Token Can.



For more information, visit the TENET DS official website: https://tenetds.co.kr/


Comments