Personal data protection using Zero-Knowledge proofs
Speaker: Marija Mikic
Team and company: 3327; MVP Workshop
// Personal data
Personal data is any information that relates to an identified or identifiable living individual.
An examples of personal data:
● a name and surname;
● a home address;
● an email address such as name.surname@company.com;
● an identification card number;
● an Internet Protocol (IP) address.
// Blockchain
Blockchain ensures a high level of security, anonymity and integrity of data
and all this without the interference of a third party. One of the areas of use of
blockchain is the protection of personal data.
// Blockchain vs centralized systems
● In a centralized system, users cannot fully control their personal data.
● Blockchain enables complete data control. It is more secure than
centralized systems.
// Zero-Knowledge proofs
Blockchains provide security, but not privacy. A typical type of blockchain is
transparent and not fully anonymized. Zero-Knowledge proofs (ZKP)
ensures privacy for blockchains.
With ZKP we can anonymize not only the transactions but also the sender,
recipient and other details.
// Intro: Zero-Knowledge proofs
ZKP is a cryptographic method by which we can prove that any information
we have without revealing it: proof without knowledge (Zero-Knowledge
proof).
Examples:
The Ali Baba cave Colour-blind friend
// Intro: Zero-Knowledge proofs
In this method, there are two people: the prover and the verifier. The prover can
prove the verifier that the given statement is true, while the prover avoids
conveying any additional information other than the fact that the statement is
indeed true.
// One more ZKP example
Storing hash of passwords in the database:
Users can prove that they know the password entering their password as an
input.
The system compares the hash of input with information stored in the database.
This means the verifier does not know the password but the hash of it.
// ZKP and Personal Data
Protection
In this part, we will present the results of some researches of the team 3327,
which are directly related to this topic:
● DID (Decentralized IDentifiers) and VC (Verifiable Credentials);
● ID card and passport using ZKP;
● Anonymity in MACI (MACI - Minimal Anti-Collusion Infrastructure; Ethereum
project)
// DID and VC
● DID (Decentralized IDentifiers) and VC (Verifiable Credentials) play an important
role in creating and standardizing digital personas.
● The issue with the verifiable credentials is that they reveal the entire identity
document to the other party, even if the requirements are only bound to specific
fields.
● There are suggestions on using zero-knowledge proofs for creating privacy-
keeping verifiable credential presentations.
// ID card and passport using ZKP
It is often the case where we have to show our identity card to prove to someone that
our unique identity number is indeed the valid one. By showing the ID card, we also
show additional private information that the requester did not require.
The reason for this is that multiple private information is located on the same
document, which cannot be separated, as the parts of the document would be
unverifiable without the original document. Extracting verifiable pieces of
information while hiding the unwanted parts is a perfect use case for using zero-
knowledge proofs.
// MACI
The initial idea related to the MACI project came from Vitalik Buterin, the co-founder
of Ethereum.
MACI reduces bribery and disables censored voting. This means that no one can vote
on behalf of another while making it impossible for someone to falsify the outcome
and the number of votes.
// Intro: MACI
● So how exactly does MACI work?
● Who can see how voters voted?
● Is it possible to cancel the vote (if, for example, the voter was blackmailed)?
// Intro: MACI
At MACI, we can distinguish between voters and voting coordinators. Users vote on
the blockchain via MACI smart contracts. It is necessary for voters to sign up first by
sending the public key they wish to vote for a MACI smart contract. Their public key
plays a role in their identity.
// Intro: MACI
// A problem that MACI does not
solve
The downside is that the coordinator can see how someone voted, so if they are
dishonest they can pass on the information. The upside is that the coordinator can't
add an extra vote or change someone's vote.
// Anonymity in MACI
In order to create the perfect voting system we:
● used one more type of encryption and re-randomization;
● allowed two more types of messages;
● defined two more sets;
● proposed a protocol change.
// Anonymity in MACI
In this way, it was shown that it is possible to create a voting system that is
completely resistant to blackmail of any kind, censoring of votes, manipulation of
votes and the outcome of the vote itself, and at the same time complete privacy
and anonymity of voting has been achieved.
Thank you!

More Related Content

PDF
Blockchain in HR
PDF
Cryptograpy Exam
PDF
Blockchain in Identity Management - An Overview.pdf
PPTX
Blockchain
PDF
Privacy Preserving Paradigms of Blockchain Technology
PDF
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
PPT
Re-using existing PKIs for online Identity Management
PDF
50+ Frequently Asked Cryptography Interview Questions in 2022
Blockchain in HR
Cryptograpy Exam
Blockchain in Identity Management - An Overview.pdf
Blockchain
Privacy Preserving Paradigms of Blockchain Technology
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Re-using existing PKIs for online Identity Management
50+ Frequently Asked Cryptography Interview Questions in 2022

Similar to [Cryptica 22] Personal data protection using Zero-Knowledge proofs - Marija Mikic (20)

PDF
Self-Sovereign Identity: Lightening Talk at RightsCon
PDF
DWeb and Civil Society: An Introduction For Makers
PDF
Attacking Decentralized Identity.pdf
DOCX
Experiment
PPTX
Secure Identity management blockchain ppt.pptx
PPTX
Identity management in blockchain technology.pptx
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
Cost effective authentic and anonymous
DOCX
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PDF
Blockchain Reputation Management
PDF
Why Blockchain is the Future of Secure Identity Management.pdf
PDF
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
DOCX
Identity based proxy-oriented data uploading and
PPTX
Bitcoin Cryptocurrency
PDF
Digital Identity Wallets: What They Mean For Banks
PDF
3daysblcourseockchainbigdata
PDF
Digital ID Protocol - Presentation 2015-12-04
PPTX
How might cryptocurrencies impact
PDF
Barcelona presentationv6
PPTX
E voting authentication with qr-codes
Self-Sovereign Identity: Lightening Talk at RightsCon
DWeb and Civil Society: An Introduction For Makers
Attacking Decentralized Identity.pdf
Experiment
Secure Identity management blockchain ppt.pptx
Identity management in blockchain technology.pptx
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Blockchain Reputation Management
Why Blockchain is the Future of Secure Identity Management.pdf
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
Identity based proxy-oriented data uploading and
Bitcoin Cryptocurrency
Digital Identity Wallets: What They Mean For Banks
3daysblcourseockchainbigdata
Digital ID Protocol - Presentation 2015-12-04
How might cryptocurrencies impact
Barcelona presentationv6
E voting authentication with qr-codes
Ad

More from DataScienceConferenc1 (20)

PPTX
[DSC Europe 24] Anastasia Shapedko - How Alice, our intelligent personal assi...
PPTX
[DSC Europe 24] Joy Chatterjee - Balancing Personalization and Experimentatio...
PPTX
[DSC Europe 24] Pratul Chakravarty - Personalized Insights and Engagements us...
PPTX
[DSC Europe 24] Domagoj Maric - Modern Web Data Extraction: Techniques, Tools...
PPTX
[DSC Europe 24] Marcin Szymaniuk - The path to Effective Data Migration - Ove...
PPTX
[DSC Europe 24] Fran Mikulicic - Building a Data-Driven Culture: What the C-S...
PPTX
[DSC Europe 24] Sofija Pervulov - Building up the Bosch Semantic Data Lake
PDF
[DSC Europe 24] Dani Ei-Ayyas - Overcoming Loneliness with LLM Dating Assistant
PDF
[DSC Europe 24] Ewelina Kucal & Maciej Dziezyc - How to Encourage Children to...
PPTX
[DSC Europe 24] Nikola Milosevic - VerifAI: Biomedical Generative Question-An...
PPTX
[DSC Europe 24] Josip Saban - Buidling cloud data platforms in enterprises
PPTX
[DSC Europe 24] Sray Agarwal - 2025: year of Ai dilemma - ethics, regulations...
PDF
[DSC Europe 24] Peter Kertys & Maros Buban - Application of AI technologies i...
PPTX
[DSC Europe 24] Orsalia Andreou - Fostering Trust in AI-Driven Finance
PPTX
[DSC Europe 24] Arnault Ioualalen - AI Trustworthiness – A Path Toward Mass A...
PDF
[DSC Europe 24] Nathan Coyle - Open Data for Everybody: Social Action, Peace ...
PPTX
[DSC Europe 24] Miodrag Vladic - Revolutionizing Information Access: All Worl...
PPTX
[DSC Europe 24] Katherine Munro - Where there’s a will, there’s a way: The ma...
PPTX
[DSC Europe 24] Ana Stojkovic Knezevic - How to effectively manage AI/ML proj...
PPTX
[DSC Europe 24] Simun Sunjic & Lovro Matosevic - Empowering Sales with Intell...
[DSC Europe 24] Anastasia Shapedko - How Alice, our intelligent personal assi...
[DSC Europe 24] Joy Chatterjee - Balancing Personalization and Experimentatio...
[DSC Europe 24] Pratul Chakravarty - Personalized Insights and Engagements us...
[DSC Europe 24] Domagoj Maric - Modern Web Data Extraction: Techniques, Tools...
[DSC Europe 24] Marcin Szymaniuk - The path to Effective Data Migration - Ove...
[DSC Europe 24] Fran Mikulicic - Building a Data-Driven Culture: What the C-S...
[DSC Europe 24] Sofija Pervulov - Building up the Bosch Semantic Data Lake
[DSC Europe 24] Dani Ei-Ayyas - Overcoming Loneliness with LLM Dating Assistant
[DSC Europe 24] Ewelina Kucal & Maciej Dziezyc - How to Encourage Children to...
[DSC Europe 24] Nikola Milosevic - VerifAI: Biomedical Generative Question-An...
[DSC Europe 24] Josip Saban - Buidling cloud data platforms in enterprises
[DSC Europe 24] Sray Agarwal - 2025: year of Ai dilemma - ethics, regulations...
[DSC Europe 24] Peter Kertys & Maros Buban - Application of AI technologies i...
[DSC Europe 24] Orsalia Andreou - Fostering Trust in AI-Driven Finance
[DSC Europe 24] Arnault Ioualalen - AI Trustworthiness – A Path Toward Mass A...
[DSC Europe 24] Nathan Coyle - Open Data for Everybody: Social Action, Peace ...
[DSC Europe 24] Miodrag Vladic - Revolutionizing Information Access: All Worl...
[DSC Europe 24] Katherine Munro - Where there’s a will, there’s a way: The ma...
[DSC Europe 24] Ana Stojkovic Knezevic - How to effectively manage AI/ML proj...
[DSC Europe 24] Simun Sunjic & Lovro Matosevic - Empowering Sales with Intell...
Ad

Recently uploaded (20)

PPTX
Leveraging the power of data for sustainable development
PPTX
Premium Ch 6 Supply, Demand, and Government Policies.pptx
PDF
Call cute girls 😀 Delhi, call now pls cute girls delhi call🔙
PDF
Chapterrrrrrrrrrrrrrrrrrrrrrrrr 2_AP.pdf
PPT
1_Chapter_1_Introduction_to_Auditing.ppt
PPTX
Chapter 2 - Essentials of Economics.pptx
PPTX
Introduction-of-Macroeconomics.pptx.....
PPTX
_Cyber-Futuristic AI Technology Thesis Defense.pptx
PPT
Managerial Accounting Chap 1. Guide to managerial accounting
PDF
Private Equity in Action: Sector-Specific Investments for High Growth”
PPT
Project_finance_introduction in finance.ppt
PPTX
Risk Based Audit - Key to managhe the bussines & Creating the value
PDF
MPEDA Export License Apply Online for Seafood Export License in India.pdf
PPT
Business Process Analysis and Quality Management (PMgt 771) with 2 Credit Housr
PPTX
Case study for Financial statements for Accounts
PPTX
ratio analysis presentation for graduate
PPT
Joints.ppts qxqwcesceecsxwdsxwcdewd2wsew
DOCX
Tiếng anh 7 Friends Plus_ Unit 3 _Final Test.docx
PPT
Management Accounting: A Business Partner
PPTX
BU22CSEN0300556_PPT.pptx presentation about
Leveraging the power of data for sustainable development
Premium Ch 6 Supply, Demand, and Government Policies.pptx
Call cute girls 😀 Delhi, call now pls cute girls delhi call🔙
Chapterrrrrrrrrrrrrrrrrrrrrrrrr 2_AP.pdf
1_Chapter_1_Introduction_to_Auditing.ppt
Chapter 2 - Essentials of Economics.pptx
Introduction-of-Macroeconomics.pptx.....
_Cyber-Futuristic AI Technology Thesis Defense.pptx
Managerial Accounting Chap 1. Guide to managerial accounting
Private Equity in Action: Sector-Specific Investments for High Growth”
Project_finance_introduction in finance.ppt
Risk Based Audit - Key to managhe the bussines & Creating the value
MPEDA Export License Apply Online for Seafood Export License in India.pdf
Business Process Analysis and Quality Management (PMgt 771) with 2 Credit Housr
Case study for Financial statements for Accounts
ratio analysis presentation for graduate
Joints.ppts qxqwcesceecsxwdsxwcdewd2wsew
Tiếng anh 7 Friends Plus_ Unit 3 _Final Test.docx
Management Accounting: A Business Partner
BU22CSEN0300556_PPT.pptx presentation about

[Cryptica 22] Personal data protection using Zero-Knowledge proofs - Marija Mikic

  • 1. Personal data protection using Zero-Knowledge proofs Speaker: Marija Mikic Team and company: 3327; MVP Workshop
  • 2. // Personal data Personal data is any information that relates to an identified or identifiable living individual. An examples of personal data: ● a name and surname; ● a home address; ● an email address such as [email protected]; ● an identification card number; ● an Internet Protocol (IP) address.
  • 3. // Blockchain Blockchain ensures a high level of security, anonymity and integrity of data and all this without the interference of a third party. One of the areas of use of blockchain is the protection of personal data.
  • 4. // Blockchain vs centralized systems ● In a centralized system, users cannot fully control their personal data. ● Blockchain enables complete data control. It is more secure than centralized systems.
  • 5. // Zero-Knowledge proofs Blockchains provide security, but not privacy. A typical type of blockchain is transparent and not fully anonymized. Zero-Knowledge proofs (ZKP) ensures privacy for blockchains. With ZKP we can anonymize not only the transactions but also the sender, recipient and other details.
  • 6. // Intro: Zero-Knowledge proofs ZKP is a cryptographic method by which we can prove that any information we have without revealing it: proof without knowledge (Zero-Knowledge proof). Examples: The Ali Baba cave Colour-blind friend
  • 7. // Intro: Zero-Knowledge proofs In this method, there are two people: the prover and the verifier. The prover can prove the verifier that the given statement is true, while the prover avoids conveying any additional information other than the fact that the statement is indeed true.
  • 8. // One more ZKP example Storing hash of passwords in the database: Users can prove that they know the password entering their password as an input. The system compares the hash of input with information stored in the database. This means the verifier does not know the password but the hash of it.
  • 9. // ZKP and Personal Data Protection In this part, we will present the results of some researches of the team 3327, which are directly related to this topic: ● DID (Decentralized IDentifiers) and VC (Verifiable Credentials); ● ID card and passport using ZKP; ● Anonymity in MACI (MACI - Minimal Anti-Collusion Infrastructure; Ethereum project)
  • 10. // DID and VC ● DID (Decentralized IDentifiers) and VC (Verifiable Credentials) play an important role in creating and standardizing digital personas. ● The issue with the verifiable credentials is that they reveal the entire identity document to the other party, even if the requirements are only bound to specific fields. ● There are suggestions on using zero-knowledge proofs for creating privacy- keeping verifiable credential presentations.
  • 11. // ID card and passport using ZKP It is often the case where we have to show our identity card to prove to someone that our unique identity number is indeed the valid one. By showing the ID card, we also show additional private information that the requester did not require. The reason for this is that multiple private information is located on the same document, which cannot be separated, as the parts of the document would be unverifiable without the original document. Extracting verifiable pieces of information while hiding the unwanted parts is a perfect use case for using zero- knowledge proofs.
  • 12. // MACI The initial idea related to the MACI project came from Vitalik Buterin, the co-founder of Ethereum. MACI reduces bribery and disables censored voting. This means that no one can vote on behalf of another while making it impossible for someone to falsify the outcome and the number of votes.
  • 13. // Intro: MACI ● So how exactly does MACI work? ● Who can see how voters voted? ● Is it possible to cancel the vote (if, for example, the voter was blackmailed)?
  • 14. // Intro: MACI At MACI, we can distinguish between voters and voting coordinators. Users vote on the blockchain via MACI smart contracts. It is necessary for voters to sign up first by sending the public key they wish to vote for a MACI smart contract. Their public key plays a role in their identity.
  • 16. // A problem that MACI does not solve The downside is that the coordinator can see how someone voted, so if they are dishonest they can pass on the information. The upside is that the coordinator can't add an extra vote or change someone's vote.
  • 17. // Anonymity in MACI In order to create the perfect voting system we: ● used one more type of encryption and re-randomization; ● allowed two more types of messages; ● defined two more sets; ● proposed a protocol change.
  • 18. // Anonymity in MACI In this way, it was shown that it is possible to create a voting system that is completely resistant to blackmail of any kind, censoring of votes, manipulation of votes and the outcome of the vote itself, and at the same time complete privacy and anonymity of voting has been achieved.