Developers

/

August 21, 2024

Portkey zkLogin Groth16 Trusted Setup Ceremony: Call for Participants

Portkey invites the community to join the Trusted Setup Ceremony and contribute to the security of Portkey’s zkLogin

Blog Image

We’re excited to announce the launch of the Groth16 Trusted Setup Ceremony for Portkey’s zkLogin!

zkLogin, powered by Zero-Knowledge Proofs (ZKPs) technology, allows for the verification of specific statements without revealing any additional information, safeguarding user privacy. Once integrated into Portkey, zkLogin will enable users to sign up or log in directly through their Google account or Apple ID while maintaining 100% control over these guardians.

This innovative system marks a significant advancement over the previous design, where users relied solely on a trusted verifier to protect their accounts. Now, users can generate ownership proof themselves or utilise a third-party proving service, significantly enhancing both security and privacy.

Even when using a third-party proving service, there’s zero security risk — users trust the service solely to protect their privacy. Portkey utilises the Groth16 zero-knowledge proving system, which requires a trusted setup ceremony. For more details on the Groth16 trusted setup, click here.

The Groth16 Trusted Setup Ceremony is essential for ensuring the integrity and trustworthiness of the cryptographic parameters used by zkLogin within Portkey.

What is Groth16 Trusted Setup?

The Groth16 trusted setup is a multi-party computation (MPC) process that generates cryptographic parameters for zk-SNARKs (zero-knowledge succinct non-interactive arguments of knowledge). These parameters are crucial for the security of zk-SNARK-based systems, such as zkLogin, where JWTs are verified within the cryptographic circuit to ensure secure and private authentication.

Why Participate?

By participating in the Trusted Setup Ceremony, you directly contribute to the security of Portkey’s zkLogin, helping to establish a solid foundation for private, zero-knowledge-based authentication systems. Your involvement will be recognised as a critical contribution to the Portkey project, fostering a more secure and decentralised internet.

Who Can Participate?

We invite developers, cryptographers, privacy advocates, and members of the broader community to join this effort. Whether you’re experienced in cryptography or new to the field, your participation is valuable, and we provide all the necessary guidance and support.

How to Participate

Prerequisites:

  • A computer with internet access that can run npx commands
  • A GitHub account for authentication

Steps to Participate:

  1. Follow our Portkey zkLogin Groth16 Trusted Setup — Contributor Guide to make your contributions. Each contribution will take 30 minutes to 1 hour, and participants will need to wait until their predecessors complete their contributions.
  2. If you encounter any issues or have questions, please reach out to us on our dedicated Discord channel or Telegram group:

Timeline

  • Ceremony Dates: 21st August — 23rd August

The ceremony begins on 21st August and is expected to last 3 days. It may be extended if needed based on demand.

Join us in this pivotal step towards building a more secure and private future with Portkey zkLogin. We look forward to your participation!

𝕏 X | 🎮 Discord | 💬 Telegram | 🏠 Website | 💻 Youtube

Author Image
Portkey
WalletWhy It Stands OutSupported Assets
Coinbase- Publicly-listed on the Nasdaq stock exchange- Holds your assets in a 1:1 ratio and does not repurpose them200+ cryptocurrencies, including BTC, ETH, XRP, and SOL
OKX- Supports 300+ cryptocurrencies and NFTs across multiple networks- Available as a mobile or desktop app, and browser extensionBTC, ETH, XRP, SOL, and 300+ more cryptocurrencies, along with NFTs on Ethereum, Solana, BASE, and more
Crypto.com App- Rewarding if you hold and build a cryptocurrency portfolio over time- Nifty features like Crypto Earn and Recurring Buy help you grow your holding easilyMore than 350 cryptocurrencies, including BTC, ETH, XRP, and SOL
Trust Wallet- Very wide range of assets- Available as a mobile app and browser extensionOver 10 million cryptocurrencies and 600 million NFTs from Bitcoin, Ethereum, Solana, Cosmos, and more
MetaMask- Can be used to complement your main Web3 wallet- Perfect for ownership of Ethereum-based tokens and NFTsAny asset on the Ethereum blockchain
Exodus- Over 100,000 cryptocurrencies supported- Buy any of them within the Exodus walletMore than 100,000 cryptocurrencies and NFTs across 16 blockchains
Ledger Stax- 5,500+ cryptocurrencies and NFTs supported- Certified Secure Element chip to shield it from online attacks5,500+ cryptocurrencies and NFTs
Trezor Safe 5- A compact device at 23g with a 1.54-inch touchscreen- Supports over 1,000 cryptocurrencies, and has a CC EAL6+-certified chipOver 1,000 cryptocurrencies, including BTC, ETH, XRP, and SOL
SafePal S1 Pro- Slim and sleek, with a 1.3-inch colour screen to show your holdings- Can be paired with the SafePal Wallet app and browser extension to grow your portfolio30,000 cryptocurrencies and more across 100+ blockchains
ZKPsMultisig WalletsTEE
StrengthsZKPs provide wallet owners with security and privacy at one goMultisig wallets are hassle-free and secure; easy to implement for any group or organisationTEEs allow Web3 wallets to achieve a similar level of security as hardware wallets
WeaknessesTransacting parties need to interact multiple times. It’s not ideal for non-real-time applications.Transaction costs are higher due to the multiple signatures – and gas fees – needed. Transaction speeds are lower too.Cannot be easily implemented for software-based Web3 wallets as it is operating system-dependent
Wallet TypeHardware WalletBrowser ExtensionMobile App Wallet
Pros- Offers the best security for Web3 digital assets- Many brands and models to choose from- You can conveniently add it to your web browser- It doesn’t take up much storage space on your PC- You can access your assets from anywhere- You can easily transfer assets between apps
Cons- You risk losing your assets when you lose the device- The cost can be prohibitive for some- Susceptible to security breaches if your browser is compromised- Functionality may be limited for some- Vulnerable to similar security breaches as browser extension wallets- You also bear the same risk of losing your assets if you lose your mobile device
Web2 PhishingWeb3 Phishing
MethodPurely reliant on offline or Web2 platforms. For example, phone calls, SMSes, publishing fake websites, etc.Utilises a mix of Web2 and Web3 platforms. For example, hackers impersonating a key opinion leader or deploying malicious smart contracts.
PurposeTo steal cash, personal information, and sensitive data.To steal digital assets and sensitive data, and control Web3 projects.