用語2024年4月20日

Zero Knowledge Proof

Cryptographic method proving knowledge of information without revealing the information itself, powering ZK-rollups, privacy protocols, and verifiable computation.

zero-knowledge-proofzk-rollupcryptographyprivacyscaling

定義

Cryptographic method proving knowledge of information without revealing the information itself, powering ZK-rollups, privacy protocols, and verifiable computation.

Zero Knowledge Proof

In Simple Terms: You prove you know the answer without ever revealing what the answer is. Like proving you are over 21 without showing your ID -- the bouncer just sees "yes, 21+" and nothing else. In crypto, this lets a rollup prove it processed a million transactions correctly without forcing anyone to re-check all million.

A zero-knowledge proof (ZKP) is a cryptographic protocol where one party (the prover) can convince another party (the verifier) that a statement is true without revealing any information beyond the validity of the statement itself. In blockchain contexts, ZKPs enable two transformative capabilities: (1) ZK rollups that compress thousands of transactions into a single compact proof, and (2) privacy-preserving protocols that verify transactions without exposing sender, receiver, or amount.

For traders, ZK technology is not theoretical future stuff -- it is shipping now. zkSync, StarkNet, and Scroll are live mainnet ZK rollups processing millions in daily volume. Polygon is transitioning to a ZK-based architecture. ZK proofs are being integrated into everything from identity verification (Worldcoin) to private DEXes (Penumbra) to verifiable off-chain computation. Understanding ZK capabilities helps you identify which infrastructure tokens have genuine technological moats and which are riding buzzwords. More practically: ZK rollups will eventually dominate L2 scaling, making ZK-ecosystem investments among the highest-conviction infrastructure trades in crypto.

How It Works

A ZKP system must satisfy three properties:

  • Completeness: If the statement is true, an honest prover can convince an honest verifier.
  • Soundness: A dishonest prover cannot convince a verifier of a false statement (except with negligible probability).
  • Zero-knowledge: The verifier learns nothing beyond the truth of the statement.

The two dominant ZKP implementations in crypto are:

zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge): Generate small, fast-to-verify proofs. Require a trusted setup ceremony (a one-time multi-party computation to generate parameters). If the trusted setup is compromised, false proofs can be generated. Used by zkSync, Mina, and early Zcash.

zk-STARKs (Zero-Knowledge Scalable Transparent Argument of Knowledge): Generate larger proofs but require no trusted setup. Resistant to quantum computing attacks. Used by StarkNet. Generally considered more secure but more computationally expensive for provers.

Both types work on the same principle: the prover converts the computation into a polynomial equation, generates a proof that the polynomial evaluates correctly, and the verifier checks the proof with minimal computation (logarithmic or constant time relative to computation size).

Why It Matters for Traders

ZK rollups are the endgame for L2 scaling. ZK rollups achieve instant finality (prove-and-done, no challenge window), stronger security guarantees (mathematical proof vs. economic game theory), and lower data costs (proofs can be smaller than the transaction data posted by Optimistic rollups). While Optimistic rollups have first-mover liquidity advantages, the technology trajectory favors ZK dominance long-term. The L2s that successfully implement performant ZK provers will capture disproportionate market share.

ZK technology creates new trading primitives. Private DEXes where order details are hidden until execution, shielded liquidity pools, verifiable on-chain limit orders, and MEV-resistant trading protocols all become possible with ZKPs. As these primitives mature, they could reshape how on-chain trading works and where volume concentrates. Early adopters and liquidity providers in these protocols may capture significant yield and token incentives.

Trusted setup risk is real but manageable. For SNARK-based systems, the trusted setup ceremony is a single point of failure. If compromised, the entire system's security collapses. Most major SNARK systems use large-scale ceremonies (hundreds of participants) where only one honest participant is required for security. STARK-based systems eliminate this risk entirely. When evaluating ZK tokens or protocols, understand which proving system they use and the specific security assumptions.

Common Mistakes

  1. Assuming ZK means private by default. ZK rollups use validity proofs to scale, not to hide transaction data. Your transactions on zkSync or StarkNet are visible to sequencers and visible in the on-chain state diffs. True transactional privacy requires additional ZK layers (like Aztec or Tornado Cash-style mixers) or privacy-focused chains (Zcash, Monero). Do not confuse scaling ZK with privacy ZK.
  2. Underestimating prover costs. Generating ZK proofs requires significant computation. Early zkEVM implementations struggled with high prover costs and slow proof generation, limiting throughput. While costs are dropping rapidly (Moore's Law for ZK), current ZK rollups may still have higher operational costs than Optimistic rollups, which could translate to higher fees or lower sequencer profitability in the near term.
  3. Treating "ZK" as a monolithic technology. zk-SNARKs and zk-STARKs have fundamentally different security assumptions (trusted setup vs. transparent), proof sizes (small vs. large), verification costs (cheaper vs. more expensive), and quantum resistance (vulnerable vs. resistant). The specific ZK implementation matters enormously for protocol security and long-term viability.

FAQ

Q: Do zero-knowledge proofs make transactions anonymous? A: Not on their own. ZK rollups use validity proofs for scalability, meaning transaction outcomes are verified but the data is still posted to the chain. True anonymity requires additional ZK layers that hide transaction details (sender, receiver, amount) while still proving the transaction is valid. Projects like Aztec and railgun combine ZK scaling with privacy.

Q: Are ZK proofs quantum-resistant? A: zk-STARKs are quantum-resistant because they rely on collision-resistant hash functions, which are believed secure against quantum computers. zk-SNARKs rely on elliptic curve pairings, which are vulnerable to quantum attacks (Shor's algorithm). If scalable quantum computing arrives, SNARK-based systems would need to migrate to post-quantum cryptography.

Q: Which ZK rollup tokens should I pay attention to? A: The major ZK rollup tokens include STRK (StarkNet), ZK (zkSync), and SCR (Scroll). Polygon (MATIC/POL) is transitioning to a ZK-based architecture with Polygon zkEVM and the AggLayer. Each has different technological approaches, ecosystem maturity, and tokenomics. Research each individually rather than treating "ZK tokens" as a basket.

取引を始める準備はできましたか?

The Kingfisherコミュニティに参加して、プロ仕様の取引ツールと洞察にアクセスしましょう。