Transact securely and privately on the Ethereum network with Kaleido, utilizing zero-knowledge proofs and advanced cryptography for anonymity. Our platform supports Ethereum tokens—utility, governance, ERC-20 standard—across blockchain platforms, simplifying complex technologies for straightforward, anonymous token transfers.
Our service is ideal for various applications from trading volume optimization on exchanges to managing governance tokens' total supply.
Kaleido makes it easier to do business on Ethereum blockchain applications, and enables confidential and secure peer-to-peer transactions.
Zero Knowledge Token Transfer makes use of the latest technologies around zero-knowledge proofs and advanced cryptography.
Incorporate ERC20 (fungible) tokens for any use case requiring privacy and anonymity.
Transact with members of your network without disclosing the details of token amounts or parties involved.
Transfer tokens with complete privacy using the Zero Knowledge Tokens service. The service is based on the Anonymous Zether implementation by JPMC, which is an extended implementation of the Zether design jointly published by Stanford University and Visa Research.
The service supports transfer of ERC20 tokens with zero knowledge proofs, so that the transaction payload appears to be random bytes to the participants in the blockchain, except for the designated sender and receiver.
Anonymity is achieved by using a group of decoy accounts to mix together with the sender and receiver accounts, so that non-parties of the transfer can not decipher the real impacted accounts.
The design of the user experience is modeled after the "fund - transfer - withdraw" flow. A summary of how this works is as follows:
Zero knowledge proofs, or ZKPs, are a type of cryptographic proof that allows one party (the prover) to prove to another party (the verifier) that a statement is true, without revealing any information about the statement itself.
In a zero knowledge proof, the prover can convince the verifier that a statement is true, without revealing any information about the statement other than the fact that it is true. This is achieved by allowing the prover to interact with the verifier through a series of challenges and responses, without revealing any information about the statement itself. The prover's ability to respond correctly to the verifier's challenges serves as proof that the statement is true, without revealing any information about the statement itself.
Zero knowledge proofs have a number of potential applications, including enabling secure authentication and proving the possession of certain knowledge or information without revealing the actual knowledge or information. They are an important tool in the field of cryptography and are used in blockchain networks to provide security and privacy.
Zero knowledge proofs work by allowing the prover to interact with the verifier through a series of challenges and responses, without revealing any information about the statement being proven.
The prover begins by stating the statement that they wish to prove is true (for example, "I know the secret password"). The verifier then challenges the prover by asking them to perform certain tasks or provide certain information, without revealing the actual statement being proven. The prover responds to the challenges by performing the tasks or providing the required information.
If the prover is able to correctly respond to the challenges, the verifier is convinced that the statement is true, without learning any information about the statement itself. This is because the prover's ability to correctly respond to the challenges demonstrates that they possess the knowledge or information required to prove the statement, without revealing the actual knowledge or information.
Zero knowledge proofs are usually interactive, meaning that the prover and verifier must communicate back and forth in order to complete the proof. They can also be non-interactive, using techniques such as zero-knowledge proofs of knowledge (ZKPOK), which allow the prover to generate a proof that can be verified by the verifier without any further interaction.
There are many different types of zero knowledge proofs, each with its own specific set of challenges and responses. Some common types of zero knowledge proofs include proof of knowledge, proof of identity, and proof of possession.
There are several benefits to using zero knowledge proofs:
Privacy: Zero knowledge proofs allow a prover to prove the truth of a statement without revealing any information about the statement itself, providing a high level of privacy.
Security: Because zero knowledge proofs do not reveal any information about the statement being proven, they can help to prevent against information leaks and other security vulnerabilities.
Efficiency: Zero knowledge proofs can be more efficient than other methods of proving the truth of a statement, as they do not require the transfer of large amounts of data.
Applications: Zero knowledge proofs have a wide range of potential applications, including enabling secure authentication, proving possession of certain knowledge or information without revealing the actual knowledge or information, and enabling secure and private transactions.