Use Case
Prove membership, eligibility, or attribute possession on-chain without revealing identity or creating linkable activity. Applies to financial compliance (KYC registry membership), governance (anonymous voting), national identity (selective disclosure from government documents), and community membership (sybil-resistant access).Business Context
Actors: Credential Issuer (bank, government, DAO, university) · Prover / Subject (investor, citizen, voter, community member) · Verifier (smart contract, institution, election system) · Registry Operator (maintains on-chain commitment: Merkle root, attestation registry, membership set) · Auditor / Regulator (entity with scoped disclosure rights: financial regulator, election observer) · Wallet / Proof Agent (client-side proof generation: mobile wallet, browser extension, NFC reader)Additional confidential business context is available in the private IPTF repository.
Validated Deployments
National Identity
ZKPassport - 120+ country passports via NFC + Noir circuits (used in Aztec token sale)Anon Aadhaar - India’s national ID system
Governance
NounsDAO Private Voting - Aztec + Noir storage proofsMACI - Anti-collusion voting (deployed at ETHDam, ETHMexico, ETH Tegucigalpa)
Community / Sybil Resistance
POD2 - 0xPARC credential systemWorld ID - 25M+ registrations via biometric enrollment
Email Identity
zkEmail - DKIM proofs for email wallets on Arbitrum
Problems
Problem 1: Authentication Without Identity Leakage
Current authentication methods (e.g., message signatures) prove key control but expose addresses and create linkability between provers and verifiers. Two distinct but related needs emerge:- Authentication: prover demonstrates membership or attribute possession without revealing identity
- Interaction privacy: prevent on-chain linkability between prover addresses and verifier contracts
Requirements
Requirements
- Must hide: prover identities, links between verifiers and provers, links between prover EOAs
- Public OK: registry roots, verifier contract addresses, compliance attestations
- Auditor access: scoped access to Merkle inclusion proofs, registry updates, or decryption keys where required
- Settlement: proof verification + transaction execution
- Ops: resilience against replay attacks; low-cost proof generation; interop across rollups; proof generation on consumer hardware
Problem 2: Credential Source Diversity
Different domains require different credential sources: government-issued IDs (passports, national IDs), institutional attestations (KYC providers), biometric enrollment, email ownership (DKIM), event attendance, and on-chain history. No single canonical identity system covers all use cases.Requirements
Requirements
Must support:
- Document-based (passport NFC)
- Attestation-based (EAS/VC)
- Biometric-enrollment-based
- Email-based (DKIM)
- Membership-based (Merkle tree)
- TLS-based (web2 data export)
- A single canonical identity system
- Global registry
Problem 3: Sybil Resistance Without Surveillance
Systems that distribute value (governance votes, token distributions) must prevent double-claiming without building a surveillance database. This requires deterministic, scope-bound nullifiers that prevent repeat actions without linking to the underlying identity.Requirements
Requirements
Must prevent:
- Double-claiming
- Double-voting
- Distribution farming
- Unlinkability across different scopes/services
- Revocation of compromised credentials without re-identifying holders
Recommended Approaches
| Credential Source | Primary Approach | Example Deployments |
|---|---|---|
| Institutional KYC registry | Merkle tree membership proofs | ERC-3643 issuances, Semaphore |
| Government ID (passport) | Document ZK proofs (NFC + Noir) | ZKPassport / Aztec token sale |
| Government ID (national) | Document DKIM/signature + ZK | Anon Aadhaar / ETHIndia |
| DKIM signature proofs | zkEmail / Arbitrum wallets | |
| Web2 data source | TLS transcript proofs | TLSNotary |
| Biometric enrollment | Iris/face hash + membership proof | World ID |
| Event/community | POD2 | 0xPARC |
| Multi-party private inputs | Collaborative proving (co-SNARK) | TACEO |
| On-chain attestation | EAS / ONCHAINID / W3C VC | Tokeny, EAS |
Open Questions
Multi-EOA ownership proofs
Multi-EOA ownership proofs
How practical is it to prove ownership of multiple EOAs derived from the same seed without revealing derivation patterns?Should this be handled at the wallet layer (BIP-32 style derivations) or at the protocol layer (aggregated ZK proofs)?
Cross-credential interoperability
Cross-credential interoperability
How to establish cross-credential interoperability? For example, combine a ZKPassport proof with an institutional attestation in a single transaction.
Trust models for biometric enrollment
Trust models for biometric enrollment
What trust models are acceptable for biometric enrollment systems in different regulatory contexts?
Credential revocation without central authority
Credential revocation without central authority
Compliance framework mapping
Compliance framework mapping
How do these building blocks map onto existing and emerging compliance frameworks (EUDI ARF, eIDAS 2.0, MiCA) across jurisdictions?
Standards & Frameworks
Core Standards
- ERC-3643 ONCHAINID - Permissioned token transfers with identity
- EAS (Ethereum Attestation Service) - On-chain attestation infrastructure
- W3C Verifiable Credentials - Standard credential format
- EIP-5564 - Stealth addresses for unlinkability
ZK Frameworks
- Semaphore - Privacy-preserving signaling
- Noir/Barretenberg - ZK proof framework
- Circom/Groth16 - Circuit compiler and proof system
Credential Systems
- ZKPassport - Passport NFC proofs
- Self - Decentralized identity
- Rarimo - Cross-chain identity
- Anon Aadhaar - India national ID proofs
- zkEmail - Email ownership proofs
- TLSNotary - TLS transcript proofs
- POD2 - Programmable object data
- OpenAC - Anonymous credentials
Validated Deployments
- WFP Building Blocks - UN World Food Programme
- OpenCerts - Singapore education credentials
Related Patterns
- Private MTP Auth - Multi-tree proof authentication
- zk-TLS - TLS session proofs
- Verifiable Attestation - On-chain attestation patterns
- vOPRF Nullifiers - Sybil-resistant nullifier generation
- Selective Disclosure - Regulator access patterns
- co-SNARK - Collaborative proof generation
Related Use Cases
- Private Payments - Identity verification for payment systems
- Private Stablecoins - KYC registry integration
- Private Bonds - Investor accreditation verification

