%3CLINGO-SUB%20id%3D%22lingo-sub-1441554%22%20slang%3D%22en-US%22%3EAdvancing%20Privacy%20with%20Zero-Knowledge%20Proof%20Credentials%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1441554%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20everyone%20-%20I'm%20excited%20to%20have%20Daniel%20Buchner%20discuss%20an%20initiative%20we've%20been%20working%20on%20(in%20partnership%20with%20Microsoft%20Research)%20to%20develop%20a%20new%20Zero-Knowledge%20Proof%20scheme%20that%20enhances%20user%20privacy%20and%20security%20for%20digital%20credential%20systems.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%2C%3C%2FP%3E%3CP%3EPamela%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E------%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhile%20decentralized%20identity%20standards%20and%20technologies%20can%20be%20used%20in%20a%20wide%20array%20of%20use%20cases%2C%20ranging%20from%20authentication%20with%20%3CA%20href%3D%22https%3A%2F%2Fw3c.github.io%2Fdid-core%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDecentralized%20Identifiers%3C%2FA%3E%20(DIDs)%20to%20decentralized%20apps%20via%20DID-encrypted%20personal%20datastores%2C%20one%20of%20the%20initial%20use%20cases%20many%20of%20the%20decentralized%20identity%20ecosystem%20are%20focused%20on%20is%20the%20use%20of%20DIDs%20for%20%3CA%20href%3D%22https%3A%2F%2Fwww.w3.org%2FTR%2Fvc-data-model%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EVerifiable%20Credentials%3C%2FA%3E%20(VCs).%20Credentials%20are%20signed%20assertions%20from%20a%20DID%20owner%20(known%20as%20%E2%80%98Issuers%E2%80%99)%20to%20another%20entity%20they%E2%80%99re%20attesting%20some%20fact%20or%20proof%20about%20(known%20as%20%E2%80%98Subjects%E2%80%99).%20At%20the%20Subject%E2%80%99s%20election%2C%20they%20can%20choose%20to%20prove%20the%20facts%20contained%20in%20a%20credential%20by%20submitting%20credential%20proofs%20to%20other%20parties%20who%20can%20independently%20validate%20them%20(known%20as%20%E2%80%98Verifiers%E2%80%99).%20These%20credentials%20can%20stand%20for%20just%20about%20anything%2C%20from%20airplane%20tickets%20to%20diplomas%2C%20but%20the%20core%20concept%20is%20the%20same%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EThe%20Issuer%20signs%20a%20credential%20for%20the%20Subject%20using%20the%20cryptographic%20keys%20associated%20with%20the%20Issuer%E2%80%99s%20DID.%20The%20Subject%20takes%20possession%20of%20Issuer-signed%20credential%20and%20stores%20it%20in%20their%20DID%20Wallet%20for%20use%20with%20Verifiers%20who%20may%20need%20proof%20of%20the%20facts%20the%20Issuer%20is%20attesting%20to.%20The%20Subject%20provides%20the%20signed%20credential%2C%20or%20some%20derived%20proof%20thereof%2C%20to%20a%20Verifier%20who%20validates%20the%20credential%20and%20uses%20the%20data%20it%20presents%20in%20its%20evaluation.%20Credential%20use%20cases%20pose%20privacy%20and%20personal%20safety%20challenges%3CP%3E%3CBR%20%2F%3ETo%20understand%20the%20issues%20that%20arise%20in%20common%20credential%20use%20cases%2C%20let%E2%80%99s%20examine%20a%20real-life%20set%20of%20scenarios%20related%20to%20work%20history%20and%20job%20skills%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3EPublishing%20a%20resume%20on%20a%20career%20networking%20app%20is%20something%20hundreds%20of%20millions%20of%20people%20do%20every%20year.%20This%20represents%20an%20open%20disclosure%20of%20work%20history%20the%20user%20wants%20others%20in%20the%20wider%20business%20community%20to%20be%20aware%20of.%20The%20expectation%20of%20privacy%20for%20this%20information%20is%20inherently%20low%2C%20as%20the%20user%20intends%20for%20this%20information%20to%20be%20widely%20known%20and%20verified%20by%20all%20who%20see%20it.%20For%20this%20use%20case%2C%20we%20need%20a%20credential%20mechanism%20that%20can%20verify%20signed%20statements%20by%20an%20issuer%20that%20are%20verifiable%20by%20observers.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOnce%20a%20user%20has%20shared%20their%20career-related%20credentials%2C%20verifiers%20may%20need%20to%20periodically%20check%20the%20current%20status%20of%20work%20history%20credentials%20(e.g.%20an%20employee%20leaves%20one%20job%20for%20another).%20These%20sorts%20of%20status%20checks%20on%20credentials%20are%20often%20programmatically%20run%20at%20intervals%2C%20which%20may%20occur%20when%20the%20user%20is%20not%20actively%20engaged%20in%20an%20app%2C%20outside%20of%20normal%20waking%20hours%2C%20or%20when%20the%20user%20is%20not%20connected%20to%20the%20internet.%20This%20use%20case%20underscores%20the%20need%20for%20a%20feature%20that%20allows%20verifying%20parties%20to%20check%20the%20status%20of%20a%20credential%20without%20requiring%20the%20user%20to%20connect%20to%20the%20site%20and%20perform%20an%20interactive%20task.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESimilarly%2C%20interviewing%20for%20a%20new%20job%20can%20be%20stressful%2C%20and%20in%20many%20cases%20individuals%20do%20so%20while%20currently%20employed.%20While%20a%20user%20may%20not%20care%20if%20observers%20are%20able%20to%20validate%20the%20past%20work%20history%20they%20list%20on%20career%20networking%20sites%2C%20prospective%20employers%20often%20want%20to%20validate%20current%20employment%2C%20which%20likely%20includes%20checking%20the%20active%20status%20of%20the%20current%20employment%20credential%20an%20applicant%20presents.%20If%20the%20prospective%20employer%20is%20a%20competitor%20of%20the%20user's%20current%20employer%2C%20any%20check%20for%20active%20status%20that%20alerted%20the%20company%20to%20their%20employee's%20intentions%20could%20cause%20problems%20for%20the%20applicant.%20As%20such%2C%20we%20need%20a%20credential%20scheme%20that%26nbsp%3B%20allows%20parties%20to%20verify%20active%20status%20of%20a%20credential%20without%20disclosing%20any%20information%20about%20the%20credential%20or%20its%20holder%20to%20the%20issuer.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3ESome%20credential%20schemes%20can%20expose%20users%20to%20privacy%20and%20personal%20safety%20risks%3CP%3E%3CBR%20%2F%3EEquipped%20with%20a%20general%20awareness%20of%20how%20DID-based%20credentials%20are%20issued%20and%20used%2C%20and%20an%20understanding%20of%20the%20privacy%20concerns%20that%20arise%20in%20real-life%20credential%20use%20cases%2C%20it%E2%80%99s%20important%20to%20understand%20that%20credentials%20can%20come%20in%20different%20forms.%20Basic%20credentials%20are%20plaintext%20data%20objects%20that%20include%20one%20or%20more%20%E2%80%98claims%E2%80%99%20an%20Issuer%20signs%20using%20the%20cryptographic%20keys%20linked%20to%20their%20DID.%20The%20same%20credential%20object%20is%20then%20presented%20to%20external%20parties%20who%20can%20see%20all%20the%20properties%20and%20values%20it%20contains.%20Basic%20credential%20schemes%20often%20incorporate%20revocation%20mechanisms%20where%20Verifiers%20%E2%80%98phone%20home%E2%80%99%20to%20Issuers%20to%20check%20the%20status%20of%20a%20specific%20Subject%E2%80%99s%20credential%20(e.g.%20is%20a%20driver%E2%80%99s%20license%20active)%2C%20providing%20Subject-identifying%20data%20in%20the%20process.%20Other%20credential%20schemes%20utilizing%20zero-knowledge%20features%20avoid%20some%20of%20these%20issues%2C%20but%20often%20introduce%20other%20tradeoffs%2C%20like%20requiring%20users%20to%20be%20involved%20in%20interactive%20flows%20to%20prove%20credential%20status.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3EThe%20following%20privacy%20and%20tracking%20issues%20often%20arise%20from%20these%20types%20of%20credential%20schemes%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3EPresenting%20the%20same%20credential%20bytes%20to%20multiple%20verifiers%20enables%20them%20to%20track%20its%20trail%20of%20usage.%20Schemes%20that%20try%20to%20remedy%20the%20presentation%20of%20the%20same%20credential%20bytes%20to%20multiple%20Verifiers%20by%20fetching%20unique%20copies%20of%20credentials%20just-in-time%20still%20disclose%20time%20of%20use%20and%20other%20trackable%20metadata%20to%20Issuers.%20Exposing%20raw%20credential%20values%20to%20Verifiers%20can%20needlessly%20expose%20sensitive%20information.%20For%20example%3A%20disclosing%20a%20Subject%E2%80%99s%20specific%20date%20of%20birth%20can%20have%20negative%20effects%2C%20especially%20when%20proving%20their%20age%20is%20greater%20than%20a%20certain%20threshold%20would%20suffice.%3CBR%20%2F%3E%3CBR%20%2F%3E%20Status%20check%20mechanisms%20that%20disclose%20Subject-identifying%20information%20enable%20Issuers%20to%20track%20how%20a%20Subject%20is%20using%20a%20credential.%20This%20is%20often%20the%20case%20in%20credential%20schemes%20that%20%E2%80%98phone%20home%E2%80%99%20to%20check%20on%20credentials%20using%20a%20credential%20ID%20or%20other%20specifically%20identifying%20data.%3CBR%20%2F%3E%3CBR%20%2F%3E%3CP%3EThere%20is%20also%20a%20set%20of%20desirable%20features%20existing%20credential%20schemes%20often%20lack%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3EGenerate%20uncorrelatable%20versions%20of%20a%20credential%20for%20each%20Verifier%2C%20without%20contacting%20the%20Issuer%20%E2%80%93%20a%20credential%20scheme%20should%20enable%20a%20Subject%20to%20generate%20uncorrelatable%20versions%20of%20a%20credential%20that%20doesn%E2%80%99t%20expose%20them%20to%20tracking%20by%20Issuers%20or%20Verifiers.%3CBR%20%2F%3E%3CBR%20%2F%3E%20Empower%20Subjects%20to%20only%20disclose%20the%20minimum%20necessary%20facts%20%E2%80%93%20instead%20of%20disclosing%20all%20the%20data%20a%20credential%20contains%2C%20or%20precise%20data%20values%2C%20a%20scheme%20should%20allow%20Subjects%20to%20prove%20any%20subset%20of%20facts%20a%20credential%20contains%2C%20at%20varying%20levels%20of%20granularity.%20For%20example%3A%20if%20a%20Subject%20has%20a%20credential%20that%20contains%20their%20exact%20age%2C%20among%20other%20things%2C%20the%20Subject%20should%20be%20able%20to%20generate%20a%20proof%20that%20only%20includes%20the%20fact%20that%20they%20over%20a%20certain%20age%2C%20without%20disclosing%20their%20date%20of%20birth.%3CBR%20%2F%3E%3CBR%20%2F%3E%20Enable%20credential%20status%20checks%20that%20don%E2%80%99t%20divulge%20Subject-identifying%20information%20to%20Issuers%20%E2%80%93%20Verifiers%20should%20be%20able%20to%20derive%20the%20status%20of%20a%20credential%20without%20divulging%20to%20the%20Issuer%20any%20information%20about%20the%20Subject%20or%20specific%20credential%20they%E2%80%99re%20checking.%3CBR%20%2F%3E%3CBR%20%2F%3E%20Enable%20Verifiers%20to%20check%20the%20status%20of%20a%20credential%20offline%20%E2%80%93%20Verifiers%20should%20be%20able%20to%20check%20the%20status%20of%20credentials%20based%20on%20proofs%20that%20can%20be%20cached%20for%20use%20when%20disconnected%20from%20the%20internet.%3CBR%20%2F%3E%3CBR%20%2F%3E%20Credential%20status%20checks%20shouldn%E2%80%99t%20require%20manual%20user%20participation%20%E2%80%93%20Subjects%20should%20not%20have%20to%20be%20actively%20connected%20to%20verification%20systems%20for%20Verifiers%20to%20check%20the%20status%20of%20a%20credential.%20For%20example%3A%20if%20a%20bank%20needs%20to%20run%20a%20monthly%20automated%20check%20for%20the%20status%20of%20a%20homeowner%E2%80%99s%20fire%20insurance%20policy%2C%20and%20that%20check%20runs%20at%20odd%20hours%2C%20the%20homeowner%20should%20not%20have%20to%20be%20involved%20in%20any%20way.%20(Some%20schemes%20require%20a%20user%20to%20engage%20software%20on%20their%20device%20to%20facilitate%20status%20checks%20for%20Verifiers%2C%20which%20makes%20many%20valid%20business%20scenarios%20infeasible.)%3CBR%20%2F%3E%3CBR%20%2F%3E%3CP%3ETo%20summarize%2C%20existing%20credential%20schemes%20generally%20exhibit%20the%20following%20profile%20of%20issues%2C%20which%20we%20would%20like%20to%20solve%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EZero-Knowledge%20Proofs%20can%20enhance%20privacy%20and%20personal%20safety%3CP%3E%3CBR%20%2F%3EThe%20privacy%20and%20personal%20safety%20issues%20surrounding%20credential%20schemes%20have%20been%20known%20to%20members%20of%20the%20identity%20community%20for%20decades.%20Many%20past%20initiatives%20and%20groups%20have%20worked%20on%20solutions%20for%20these%20issues%20(including%20Microsoft%E2%80%99s%20U-Prove%20developments%20in%20the%20late%20aughts)%2C%20but%20until%20the%20advent%20of%20cryptocurrencies%20and%20decentralized%20identity%20systems%2C%20there%20was%20not%20a%20pressing%20business%20need%20that%20required%20wide-scale%20deployment%20of%20solutions%20to%20these%20problems.%20In%20the%20years%20since%2C%20countless%20developers%2C%20academics%2C%20and%20organizations%20have%20been%20working%20on%20new%20schemes%20that%20incorporate%20a%20number%20of%20advanced%20cryptographic%20techniques%20to%20overcome%20the%20challenges%20outlined%20in%20the%20sections%20above.%20The%20most%20promising%20of%20these%20techniques%20are%20recent%20innovations%20in%20Zero-Knowledge%20Proofs%20cryptographic%20schemes%2C%20or%20ZKPs%20for%20short.%20ZKP%20schemes%20come%20in%20many%20flavors%2C%20each%20with%20unique%20trade-offs%2C%20features%2C%20and%20performance%20profiles%2C%20which%20can%20be%20tailored%20to%20particular%20use%20cases%20and%20requirements.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EAs%20we%20considered%20the%20wide%20range%20of%20scenarios%20we%20wanted%20to%20tackle%2C%20we%20felt%20we%20could%20make%20contributions%20in%20the%20area%20of%20privacy%20preserving%20credentials%20that%20could%20help%20advance%20the%20ecosystem.%20To%20that%20end%2C%20we%20began%20a%20joint%20initiative%20with%20our%20colleagues%20in%20Microsoft%20Research%20to%20develop%20a%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fdecentralized-identity%2Fsnark-credentials%2Fblob%2Fmaster%2Fwhitepaper.pdf%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EZKP%20credential%20scheme%3C%2FA%3E%20that%20accounts%20for%20the%20range%20of%20features%20and%20use%20cases%20we%20seek%20to%20enable%20(as%20enumerated%20in%20the%20sections%20above).%20The%20following%20are%20notable%20technical%20details%20about%20the%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fdecentralized-identity%2Fsnark-credentials%2Fblob%2Fmaster%2Fwhitepaper.pdf%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Escheme%3C%2FA%3E%20we%E2%80%99ve%20been%20working%20on%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3EThe%20scheme%20is%20based%20on%20a%20transparent%20SNARK%20construction%2C%20%3CA%20href%3D%22https%3A%2F%2Feprint.iacr.org%2F2019%2F550.pdf%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ESpartan%3C%2FA%3E%20(to%20be%20presented%20at%20the%20%3CA%20href%3D%22https%3A%2F%2Fcrypto.iacr.org%2F2020%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3E40th%20Annual%20International%20Cryptology%20Conference%3C%2FA%3E)%2C%20that%20does%20not%20require%20a%20trusted%20setup%20and%20offers%20faster%20prover%20and%20verification%20times%20than%20most%20equivalent%20schemes%2C%20with%20proof%20sizes%20that%20are%20smaller%20(when%20utilized%20for%20this%20purpose)%20than%20all%20schemes%20in%20this%20family%2C%20with%20the%20exception%20of%20Bulletproofs.%20The%20scheme%20supports%20a%20range%20of%20statement%20types%2C%20including%20predicate%20proofs%2C%20range%20checks%2C%20set%20membership%2C%20etc.%20For%20the%20encoding%20of%20zero-knowledge%20claims%2C%20the%20scheme%20employs%20Rank-1%20Constraint%20Satisfiability%20(R1CS).%20Proving%20cost%20scales%20linearly%20with%20the%20number%20of%20R1CS-encoded%20constraints%20included%20in%20a%20program.%20Status%20checks%20can%20be%20proven%20with%20the%20user%20out-of-band%2C%20without%20requiring%20Subject%20interactivity.%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFrom%20how%20credentials%20are%20issued%2C%20all%20the%20way%20through%20their%20revocation%2C%20we%20believe%20this%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fdecentralized-identity%2Fsnark-credentials%2Fblob%2Fmaster%2Fwhitepaper.pdf%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Escheme%3C%2FA%3E%20can%20fulfill%20the%20requirements%20we%20have%20laid%20out%20and%20address%20the%20issues%20we%E2%80%99ve%20identified.%20In%20the%20end%2C%20we%20believe%20we%20should%20be%20able%20to%20overcome%20the%20negatives%20we%20listed%20earlier%20and%20produce%20an%20implementation%20that%20exhibits%20the%20following%20profile%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20have%20contributed%20the%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fdecentralized-identity%2Fsnark-credentials%2Fblob%2Fmaster%2Fwhitepaper.pdf%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewhitepaper%20detailing%20our%20ZKP%20credential%20construction%3C%2FA%3E%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fmedium.com%2Fdecentralized-identity%2Fbuilding-interoperable-zkp-credential-systems-70bc20a8a809%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDIF%20ZKP%20credentials%20initiative%3C%2FA%3E%2C%20and%20will%20begin%20development%20of%20an%20open%20source%20reference%20implementation%20in%20DIF%20later%20this%20summer.%20We%E2%80%99d%20like%20to%20thank%20%3CA%20href%3D%22https%3A%2F%2Fidentity.foundation%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDIF%3C%2FA%3E%2C%20the%20wider%20community%2C%20and%20all%20those%20who%20have%20been%20working%20to%20advance%20privacy%20preserving%20credential%20technologies.%20Please%20join%20us%20in%20%3CA%20href%3D%22https%3A%2F%2Fidentity.foundation%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EDIF%3C%2FA%3E%20and%20contribute%20to%20this%20initiative%20%E2%80%93%20it%E2%80%99s%20important%20that%20the%20identity%20community%20gets%20this%20right%2C%20and%20we%20need%20your%20help%20to%20do%20it.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDaniel%20Buchner%3CBR%20%2F%3EDecentralized%20Identity%20%2F%20Microsoft%20Identity%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EImage%2FIcon%20Credits%3A%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.flaticon.com%2Fauthors%2Fprettycons%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eprettycons%3C%2FA%3E%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.flaticon.com%2Fauthors%2Ffreepik%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EFreepik%3C%2FA%3E%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.flaticon.com%2Fauthors%2Fbecris%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EBecris%3C%2FA%3E%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.flaticon.com%2Fauthors%2Fsmashicons%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ESmashicons%3C%2FA%3E%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.flaticon.com%2Fauthors%2Fgeotatah%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EGeotatah%3C%2FA%3E%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.flaticon.com%2Fauthors%2Fmonkik%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMonkik%3C%2FA%3E%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3EDarius%20Dan%20from%20%3CA%20href%3D%22http%3A%2F%2Fwww.flaticon.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ewww.flaticon.com%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1441554%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20began%20a%20joint%20initiative%20to%20develop%20a%20Zero%20Knowledge%20Proof%20credential%20scheme%20that%20accounts%20for%20the%20range%20of%20features%20and%20use%20cases%20we%20seek%20to%20enable.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Hi everyone - I'm excited to have Daniel Buchner discuss an initiative we've been working on (in partnership with Microsoft Research) to develop a new Zero-Knowledge Proof scheme that enhances user privacy and security for digital credential systems.

 

Cheers,

Pamela

 

------

 

While decentralized identity standards and technologies can be used in a wide array of use cases, ranging from authentication with Decentralized Identifiers (DIDs) to decentralized apps via DID-encrypted personal datastores, one of the initial use cases many of the decentralized identity ecosystem are focused on is the use of DIDs for Verifiable Credentials (VCs). Credentials are signed assertions from a DID owner (known as ‘Issuers’) to another entity they’re attesting some fact or proof about (known as ‘Subjects’). At the Subject’s election, they can choose to prove the facts contained in a credential by submitting credential proofs to other parties who can independently validate them (known as ‘Verifiers’). These credentials can stand for just about anything, from airplane tickets to diplomas, but the core concept is the same:

 

zkp1.png

 

  1. The Issuer signs a credential for the Subject using the cryptographic keys associated with the Issuer’s DID.
  2. The Subject takes possession of Issuer-signed credential and stores it in their DID Wallet for use with Verifiers who may need proof of the facts the Issuer is attesting to.
  3. The Subject provides the signed credential, or some derived proof thereof, to a Verifier who validates the credential and uses the data it presents in its evaluation.

Credential use cases pose privacy and personal safety challenges


To understand the issues that arise in common credential use cases, let’s examine a real-life set of scenarios related to work history and job skills:

Publishing a resume on a career networking app is something hundreds of millions of people do every year. This represents an open disclosure of work history the user wants others in the wider business community to be aware of. The expectation of privacy for this information is inherently low, as the user intends for this information to be widely known and verified by all who see it. For this use case, we need a credential mechanism that can verify signed statements by an issuer that are verifiable by observers.

 

Once a user has shared their career-related credentials, verifiers may need to periodically check the current status of work history credentials (e.g. an employee leaves one job for another). These sorts of status checks on credentials are often programmatically run at intervals, which may occur when the user is not actively engaged in an app, outside of normal waking hours, or when the user is not connected to the internet. This use case underscores the need for a feature that allows verifying parties to check the status of a credential without requiring the user to connect to the site and perform an interactive task.

 

Similarly, interviewing for a new job can be stressful, and in many cases individuals do so while currently employed. While a user may not care if observers are able to validate the past work history they list on career networking sites, prospective employers often want to validate current employment, which likely includes checking the active status of the current employment credential an applicant presents. If the prospective employer is a competitor of the user's current employer, any check for active status that alerted the company to their employee's intentions could cause problems for the applicant. As such, we need a credential scheme that  allows parties to verify active status of a credential without disclosing any information about the credential or its holder to the issuer.

Some credential schemes can expose users to privacy and personal safety risks


Equipped with a general awareness of how DID-based credentials are issued and used, and an understanding of the privacy concerns that arise in real-life credential use cases, it’s important to understand that credentials can come in different forms. Basic credentials are plaintext data objects that include one or more ‘claims’ an Issuer signs using the cryptographic keys linked to their DID. The same credential object is then presented to external parties who can see all the properties and values it contains. Basic credential schemes often incorporate revocation mechanisms where Verifiers ‘phone home’ to Issuers to check the status of a specific Subject’s credential (e.g. is a driver’s license active), providing Subject-identifying data in the process. Other credential schemes utilizing zero-knowledge features avoid some of these issues, but often introduce other tradeoffs, like requiring users to be involved in interactive flows to prove credential status.

The following privacy and tracking issues often arise from these types of credential schemes:

  1. Presenting the same credential bytes to multiple verifiers enables them to track its trail of usage. Schemes that try to remedy the presentation of the same credential bytes to multiple Verifiers by fetching unique copies of credentials just-in-time still disclose time of use and other trackable metadata to Issuers.
  2. Exposing raw credential values to Verifiers can needlessly expose sensitive information. For example: disclosing a Subject’s specific date of birth can have negative effects, especially when proving their age is greater than a certain threshold would suffice.

  3. Status check mechanisms that disclose Subject-identifying information enable Issuers to track how a Subject is using a credential. This is often the case in credential schemes that ‘phone home’ to check on credentials using a credential ID or other specifically identifying data.

There is also a set of desirable features existing credential schemes often lack:

  1. Generate uncorrelatable versions of a credential for each Verifier, without contacting the Issuer – a credential scheme should enable a Subject to generate uncorrelatable versions of a credential that doesn’t expose them to tracking by Issuers or Verifiers.

  2. Empower Subjects to only disclose the minimum necessary facts – instead of disclosing all the data a credential contains, or precise data values, a scheme should allow Subjects to prove any subset of facts a credential contains, at varying levels of granularity. For example: if a Subject has a credential that contains their exact age, among other things, the Subject should be able to generate a proof that only includes the fact that they over a certain age, without disclosing their date of birth.

  3. Enable credential status checks that don’t divulge Subject-identifying information to Issuers – Verifiers should be able to derive the status of a credential without divulging to the Issuer any information about the Subject or specific credential they’re checking.

  4. Enable Verifiers to check the status of a credential offline – Verifiers should be able to check the status of credentials based on proofs that can be cached for use when disconnected from the internet.

  5. Credential status checks shouldn’t require manual user participation – Subjects should not have to be actively connected to verification systems for Verifiers to check the status of a credential. For example: if a bank needs to run a monthly automated check for the status of a homeowner’s fire insurance policy, and that check runs at odd hours, the homeowner should not have to be involved in any way. (Some schemes require a user to engage software on their device to facilitate status checks for Verifiers, which makes many valid business scenarios infeasible.)

To summarize, existing credential schemes generally exhibit the following profile of issues, which we would like to solve:

 

zkp2.JPG

 

Zero-Knowledge Proofs can enhance privacy and personal safety


The privacy and personal safety issues surrounding credential schemes have been known to members of the identity community for decades. Many past initiatives and groups have worked on solutions for these issues (including Microsoft’s U-Prove developments in the late aughts), but until the advent of cryptocurrencies and decentralized identity systems, there was not a pressing business need that required wide-scale deployment of solutions to these problems. In the years since, countless developers, academics, and organizations have been working on new schemes that incorporate a number of advanced cryptographic techniques to overcome the challenges outlined in the sections above. The most promising of these techniques are recent innovations in Zero-Knowledge Proofs cryptographic schemes, or ZKPs for short. ZKP schemes come in many flavors, each with unique trade-offs, features, and performance profiles, which can be tailored to particular use cases and requirements.


As we considered the wide range of scenarios we wanted to tackle, we felt we could make contributions in the area of privacy preserving credentials that could help advance the ecosystem. To that end, we began a joint initiative with our colleagues in Microsoft Research to develop a ZKP credential scheme that accounts for the range of features and use cases we seek to enable (as enumerated in the sections above). The following are notable technical details about the scheme we’ve been working on:

  • The scheme is based on a transparent SNARK construction, Spartan (to be presented at the 40th Annual International Cryptology Conference), that does not require a trusted setup and offers faster prover and verification times than most equivalent schemes, with proof sizes that are smaller (when utilized for this purpose) than all schemes in this family, with the exception of Bulletproofs.
  • The scheme supports a range of statement types, including predicate proofs, range checks, set membership, etc.
  • For the encoding of zero-knowledge claims, the scheme employs Rank-1 Constraint Satisfiability (R1CS).
  • Proving cost scales linearly with the number of R1CS-encoded constraints included in a program.
  • Status checks can be proven with the user out-of-band, without requiring Subject interactivity.

 

From how credentials are issued, all the way through their revocation, we believe this scheme can fulfill the requirements we have laid out and address the issues we’ve identified. In the end, we believe we should be able to overcome the negatives we listed earlier and produce an implementation that exhibits the following profile:

 

zkp3.JPG

 

We have contributed the whitepaper detailing our ZKP credential construction to the DIF ZKP credentials initiative, and will begin development of an open source reference implementation in DIF later this summer. We’d like to thank DIF, the wider community, and all those who have been working to advance privacy preserving credential technologies. Please join us in DIF and contribute to this initiative – it’s important that the identity community gets this right, and we need your help to do it.

 

Daniel Buchner
Decentralized Identity / Microsoft Identity

 

 

Image/Icon Credits:

prettycons from www.flaticon.com

Freepik from www.flaticon.com

Becris from www.flaticon.com

Smashicons from www.flaticon.com

Geotatah from www.flaticon.com

Monkik from www.flaticon.com

Darius Dan from www.flaticon.com