Zero-Knowledge Proofs
Deep Arcane Integration:
groth16 : In Deep Arcane, we’ve implemented the groth16 zk-SNARK to provide a highly efficient way of securing user inputs(prompt). groth16 is a zero-knowledge proof system that ensures user prompts remain private and tamper-proof throughout the process.
Securing User Input: Every time a user interacts with ZkSurfer—whether they’re asking for text or image generation—a zk-proof is automatically generated alongside their prompt. This proof guarantees that the prompt is authentic and has not been altered, all without revealing the actual content of the prompt to the backend or server side.
Generating Proofs with Every Interaction: Each interaction within the chatbot generates a unique zk-proof, ensuring that every exchange is verifiable. The generated proof can be downloaded by user for further verification.
Regardless of whether the output is a text or an image, the generated output at ZkSurfer is inseparable from the zk-proof correspondent to the input provided. This linkage keeps the overall process reliable, as any passerby can check that the output corresponds to the verified prompt on which it was produced.
The groth16 protocol, which uses the bn128 curve,it is fast to verify these proofs. This ensures that Deep Arcane has the possibility to quickly perform many requests while being protected by zk-SNARKs.
Privacy: During interactions with users ZkSurfer maintains user privacy. Entered data remains both reliable and secure through the use of the zk-proof and does not reveal any private details.
Every transaction on Deep Arcane is logged in a correlated zk-proof. This organizes an unchanging and cryptographically safe log of user engagements that can be authenticated without any hindrance. Users and external parties can confirm inputs and outputs as they are unchallenged by the system.
Proof Download for Verification: Individuals can download their zk-proofs without digital access. Users maintain and display these proofs with increased safety and control over their interactions. At any instance, users can check whether their signatures and responses are genuine.
Last updated