Op-Ed: ZK proofs are an amazing privacy technology, but they cannot be used for everything.
Imagine a world where your digital footprint is truly your own, where you can prove your identity without revealing a single personal detail, and where your sensitive information remains locked away, yet still usable.
What if there's a way to enhance privacy even further, creating a fortress around our digital identities that's both impenetrable and transparent?
That’s what composable privacy offers. It's time to look beyond the ZK hype and explore a new pathway that combines the best of multiple worlds, offering a solution that's as flexible as it is secure.
Decoding the Privacy Puzzle: Anonymity, Privacy, and Confidentiality
Let’s take a step back and explain the difference between privacy and confidentiality.
Firstly, anonymity means information is known but the participants are not, like blockchain transactions.
Privacy is like having a secret room in your house. You decide who gets in and who doesn't. It's your personal space, your rules. In blockchain, it's your right to control who accesses your personal information.
Confidentiality, however, is more like entrusting your diary to a friend. You expect them to keep your secrets safe from prying eyes. In tech terms, it's about protecting sensitive information from unauthorized access when it's in someone else's hands.
ZK vs FHE
In other words, ZK proofs are great for verifying computations, but the prover must access the private data to generate the proof (so you have to trust them): confidentiality.
On the other hand, FHE is great for encryption, but you’re not able to verify the computation is correct. In other words, it offers privacy.
ZK is used to prove that something is true without revealing any additional information, whereas FHE is used to perform computations on encrypted data without needing to decrypt it.
Let’s break that down.
In essence, ZK shows someone the box without giving them the keys to open it. With FHE, you don’t have to open the box. You can compute with the data inside the box, without ever needing to see it.
Combining the two encryption methods offers the best of both worlds (privacy and verifiability), and they complement each other.
zkFHE Composable Privacy
While the FHE 'black box' is great at keeping secrets, it has a weakness - we can't verify what's happening inside. That's where ZK swoops in, ensuring the computational integrity of the data within FHE.
Composable Privacy: The Future of Digital Security
This dynamic duo of FHE and ZK proofs allows us to deploy ZK solutions in a modular, customizable fashion. Think of it as privacy à la carte, where you can pick and choose the level and type of protection you need. This is what we call composable privacy.
By combining ZK proofs and FHE, it ensures that sensitive data stays encrypted, while also allowing computations to be verified without exposing any private information. This innovative approach leverages the strengths of both cryptographic methods to guarantee privacy and verifiability.
The zkFHE Framework
Airchains multichain zkFHE composable framework, for example, now allows us to build and run on multiple VMs and data availability (DA) layers without a settlement layer (adding another block to the blockchain). A settlement layer refers to a modular blockchain whose primary role is to provide proof verification and dispute resolution for rollups. People building multichain dApps can now use this modular product.
Modularity in Privacy Solutions
To bring it home, picture this: sharing an approved credit score for a rental application without revealing the actual score. It's like telling the landlord "I'm creditworthy" without showing them your bank statements. That's the power of composable privacy in action.
Pick the Right Pieces
We need to evolve from myopic views of what blockchains are.
Existing network congestion can be removed by distinct optimized layers through rollups that offload essential blockchain functions. Better network performance, less gas fees and guaranteed privacy are now all composable.
Open-ended modularity allows for the right solution for each project. Modularity versus monolithic is not the question we need to answer. Tech advancements mean highly bespoke privacy solutions for scalable projects have arrived.
Confidentiality is not a prerequisite for privacy. If you are considering ZK proofs only, you are limited in the privacy systems that you can create. With modular solutions, you get the pieces that make the most sense for your project.