Privacy-Focused
To Connect
the
World
Protocol for Private Data based on MPC, ZKP, 3P-TLS.
Verify your real-world private data without revealing your private details.
ZkProof of
Everything
Pass to
Anywhere
zkPass serves as a seamless gateway between the private data of the Web2 and Web3 ecosystem.
Our Standings
How Does it Work?
How Does it Work?
TLS
Transport Layer Security
zkPass integrates decentralized MPC Nodes into a 3-party Handshake process, improving the standard TLS protocol. It allows users to log in securely and generate ZKPs locally without API access or data source authorization.
01How Does it Work?
MPC
Multi-Party Computation
Randomly selected task nodes supervise the 3-party handshake, obtaining a portion of the mac_key to ensure data integrity and authenticity, prevent scams and tampering, and maintain user privacy. The enc_key only remains with the user, so the nodes cannot access or gather user data, providing additional privacy and security.
02How Does it Work?
ZKP
Zero-Knowledge Proof
Users generate a Zero-Knowledge Proof (ZKP) locally using the response from a TLS-based data source. They can then upload this ZKP on-chain as a unique soul-zkSBT or share it solely with a specified address, providing enhanced privacy options.
03Approach
TransGate is a foundational product that incorporates three key technologies: MPC network, Interactive Zero-knowledge proof system, and 3P-TLS protocol.
The TransGate enables the seamless transfer of private data from the web2 realm to web2 or web3.
Transgate
TransGate SDK
TransGate SDK
SchemaComing Soon
SchemaComing Soon
TransGate is a foundational product that incorporates three key technologies: MPC network, Interactive Zero-knowledge proof system, and 3P-TLS protocol.
The TransGate enables the seamless transfer of private data from the web2 realm to web2 or web3.
The included client-sdk and server-sdk, both low-code integrations, enable businesses to trust the zero-knowledge proofs generated by individual or enterprise users from trusted data sources without compromising privacy, to unlock eligible access or privileges.
Schema is a mapping of specific HTML elements to the certificate generation system. Through schema, users can select target data sources and personalized fields according to business needs, and seamlessly integrate them into the zkPass protocol.
Features
Privacy-Preserving
Users can prove everything without uploading any documents via zkPass.
Compatibility
Seamless compatible with all HTTPS-based web sessions without APIs.
Verifiability
Verify the provenance, authenticity, integrity and validity of private data.
Anti-Cheating
Protects against malicious activities such as identity theft and data tampering.
Memory-Efficiency
Hybrid ZK proof system that enables millisecond ZKP generation in a browser environment.
The Most Efficient
and Affordable
Zero-Knowledge
We have developed and optimized the memory-efficient Hybird ZK proof system including VOLE-ZK and zk-SNARKs algorithm, which allows users to generate zero knowledge in less than 1 second in the browser environment of a PC, process tens of millions of gates per second, and handle large circuits with billions of gates while requiring less than 300M of memory.
Hardware Setup
MacBook Pro 15-inch Mid 2015
16GB DDR3 Memory
2.5GHz Intel Core i7 Processor
AWS c6a.2xlarge Instance
8 virtual CPUs
16GB Memory (GiB)
Snark
4
0s
22000ms
100ms
630m
540,292
Vole23-ZK
Powered by ZKPass
4
1.2s
210ms
60ms
80m
540,292
Snark
10
2.2s
340ms
100ms
130m
1,350,730
Snark
20
3.4s
580ms
160ms
180m
2,701,460
Use Cases
ZKKYC
An decentralized authentication solution that verifies your legal identity without requiring file uploads or the over-disclosure of private information.
Partners
We Work With the Best
Investors
Backed by Leading Investors