Zero Knowledge in Ultimate Digits
This describes the various methods we employ to secure handle users' mobile number changes in Ultimate Digits.
User's real-world mobile number, linked to their crypto wallet via Ultimate Digits, is changed.
Zero-Knowledge Proofs (ZKPs) and Chain of Custody
The user employs a zk-SNARK (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) protocol to produce a proof, which confirms knowledge of both old and new mobile numbers without revealing them.
This ZKP is then hashed using a cryptographic hash function (SHA-256) and stored in the Chain of Custody ledger.
Time-Lock
The change request initiates a smart contract, which puts the change request in a pending state for a predetermined time period (72 hours) using Ethereum's block.timestamp to track the start and end of the locking period.
Notifications
Utilizing Ethereum's event logging functionality, an event is emitted when the change is queued. Our internal service (using oracles listening to these events) then sends out the alerts to users’ Ultimate Digits apps.
Decentralized Reporting
Nodes running the Ultimate Digits protocol continually validate the Chain of Custody against consensus rules. Any discrepancies trigger alerts in the network, potentially leading to transaction rollbacks or other corrective actions.
The user sells the virtual number NFT to a different user.
Zero-Knowledge Proofs (ZKPs) and Chain of Custody
The transfer of an NFT involves a zk-STARK (Zero-Knowledge Scalable Transparent Argument of Knowledge) to prove ownership without disclosing the ownership details.
Post validation, this ZKP is hashed and recorded on the Chain of Custody blockchain.
Time-Lock
A smart contract manages the NFT transfer, enforcing a time-lock using Ethereum's block.timestamp to ensure a verification period.
Notifications
An Ethereum event is emitted upon a queued NFT transfer, prompting our internal service (using oracles listening to these events) to send out the alerts to users’ Ultimate Digits apps.
Decentralized Reporting
Any illicit attempt to double-spend the NFT or breach the protocol is flagged by consensus nodes, ensuring that NFTs remain unique and untampered.
Last updated