A1
ZK Proof of Validator (ZK-PoV)
Identity & Credentialing Research
Description
An anonymous credential system that allows nodes to prove they are active beacon chain validators without revealing their specific identity or IP address.
Relationships
| Target | Type | Note |
|---|---|---|
| P3 | benefits | Severing the IP-to-identity link via ZK credentials. |
| P4 | benefits | Prevents Sybil attacks by requiring proof of active stake. |
| P6 | benefits | Enables high-trust meshes without exposing validator schedules. |
| P7 | hurts | Requires complex ZK proof generation logic in clients. |
| P1 | hurts | Proof generation time can approach slot time limits on low-end hardware. |
| A2 | complements | ZK-PoV secures the endpoints of the OHTTP shuffle. |
| A3 | benefits from | Anonymous meshes need global rate limiting to prevent DoS. |
| A8 | complements | ZK credentials can gate access to the mixnet to prevent Sybil flooding. |
Open questions
- Computational overhead of proof generation on consumer hardware.
- Trusted setup requirements for specific SNARK schemes (e.g. Caulk+).
References
Relationships
| Dir | Target | Type |
|---|---|---|
| → | P3 Identity Unlinkability | benefits |
| → | P4 Sybil Resistance | benefits |
| → | P6 BFT Compatibility | benefits |
| → | P7 Implementation Complexity | hurts |
| → | P1 Latency Bound | hurts |
| → | A2 OHTTP-Style Two-Hop Shuffles | complements |
| → | A3 Rate Limiting Nullifiers (RLN) | benefits from |
| ← | A5 Privacy Pass (RFC 9576) | complements |
| → | A8 Sphinx-based Mixnets | complements |