XStar Docs
  • Quick Start
  • What is XStar?
  • FAQ
  • Developers
    • XNAME API
    • XNAME Smart Contracts
  • The Problem - AI Saturation & Targeted Sybil Attacks
  • The Solution - Adaptive Proof of Humanity on Blockchain
    • XNAME Omnichain DNS
    • XHS Adaptive PoH
    • XHS Scoring Algorithm
  • Economy Design
    • XPoints System
    • Human Key
  • Protocol Design
    • Privacy
    • XHS Implementation & Limitations
    • Types of Attacks on Verification Methods
    • ZK Proof Implementation
    • Identity Oracle
  • Omni-chain Functionality
  • Potential Applications
    • Quest and Campaign Platform
    • Attestations
    • Access Control
    • Access Control Use Case - Games
    • Compliance
  • XReward Quest Onboarding Manual
    • 1. Getting Started
    • 2. Create your Space
    • 3. Create a Quest
    • 4. Quest Dashboard
  • Introducing $XNAME
    • Tokenomics
    • Token Release Schedule
  • Help & Support
    • XID Onboarding Tutorial
    • Change Your linked Social Accounts
    • Forgot/Lost your linked wallet?
    • Discord
    • Official Links
    • Partnerships
Powered by GitBook
On this page
  1. Protocol Design

ZK Proof Implementation

PreviousTypes of Attacks on Verification MethodsNextIdentity Oracle

Last updated 11 months ago

In (Stage 3) XSTAR leverages Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) to generate Zero-Knowledge Proofs (ZKPs) that verify the XHS identity & scoring information without revealing any sensitive data.

These ZKPs are executed on the Holder's device through Local Enclave Storage and only disclose anonymized results (yes/no statements).

These results are then presented as Verifiable Proofs (VPs) to the Verifier, who can confirm the identity without accessing the underlying data. This method enhances privacy and security by ensuring that only necessary information is shared, while sensitive data remains protected.

This area will be developed further in stage 3 of XSTARs technical implementation.

|

Reference 1
Reference 2