Overview of zkTLS: Secure Transmission of Information, the Next ZK Narrative?
Original Title: “zkTLS: Blockchain APIs for any data”
Author: Decentralised.Co
Compiled by: Deep Tide TechFlow
Blockchain Oracles: Blockchain APIs for Public Data
zkTLS: Blockchain APIs for Any Data
Zero-Knowledge Transmission Layer Services (zkTLS) could be a fatal blow to the closed networks of corporate giants. Emerging networks now have the capability to compete with giants like Facebook and Amazon by leveraging zkTLS.
zkTLS allows users to migrate any identity information they have on the internet without permission, providing a powerful way for new networks to utilize existing ones. It enables users to switch freely between different platforms without starting from scratch. Most importantly, it achieves this without compromising data privacy and security.
We see crypto applications creatively utilizing zkTLS.
zkPass allows users to verify their traditional credit scores on-chain. OpacityNetwork enables Uber drivers to transfer their ratings to teleportxyz. It also allows drivers and restaurants to migrate their reviews from DoorDash to NoshDelivery.
Here’s how zkTLS works:
The Transport Layer Security protocol (TLS) protects over 95% of internet connections. It represents the "s" in "https" in most URLs. TLS connections ensure:
- The interaction between the server (like your bank) and the client (like your phone) is trustworthy.
- Data is confidential.
- Data integrity is strong.
zkTLS introduces a third-party verifier to validate the security of communication between the client and server without compromising security. There are two main methods to achieve verification:
Proxy-based: A proxy server acts as an intermediary, monitoring encrypted communication and partially decrypting it to verify the client's credentials.
Multiparty Computation (MPC) based: The client and verifier interact with the server, allowing the verifier to prove the authenticity of the message while the server remains unaware of the verifier's existence.
To maintain privacy, the client uses zero-knowledge proofs to demonstrate specific facts about the data without revealing the actual information.
For example, a proof can demonstrate that their bank balance exceeded $1000 on a specific date, rather than the exact amount. Or, I can prove that my wallet belongs to a verified Indian citizen without disclosing other details like my name or date of birth.
These proofs can be recorded on the blockchain, where they exist permanently for access and verification by other applications.
Controlling user data gives internet giants power, enabling them to create networks based on personalized experiences that lock users in. zkTLS breaks down the walls that trap billions today, creating a more open and decentralized future.