privacy-map

A1

ZK Proof of Validator (ZK-PoV)

Identity & Credentialing Research

Description

An anonymous credential system that allows nodes to prove they are active beacon chain validators without revealing their specific identity or IP address.

Relationships

TargetTypeNote
P3benefitsSevering the IP-to-identity link via ZK credentials.
P4benefitsPrevents Sybil attacks by requiring proof of active stake.
P6benefitsEnables high-trust meshes without exposing validator schedules.
P7hurtsRequires complex ZK proof generation logic in clients.
P1hurtsProof generation time can approach slot time limits on low-end hardware.
A2complementsZK-PoV secures the endpoints of the OHTTP shuffle.
A3benefits fromAnonymous meshes need global rate limiting to prevent DoS.
A8complementsZK credentials can gate access to the mixnet to prevent Sybil flooding.

Open questions

  • Computational overhead of proof generation on consumer hardware.
  • Trusted setup requirements for specific SNARK schemes (e.g. Caulk+).

References

Relationships

Dir Target Type
P3 Identity Unlinkability benefits
P4 Sybil Resistance benefits
P6 BFT Compatibility benefits
P7 Implementation Complexity hurts
P1 Latency Bound hurts
A2 OHTTP-Style Two-Hop Shuffles complements
A3 Rate Limiting Nullifiers (RLN) benefits from
A5 Privacy Pass (RFC 9576) complements
A8 Sphinx-based Mixnets complements