🇬🇧
Go+ Encyclopedia
English
English
  • 📗Intro
    • Hello, Web3!
    • Recent Security Incidents
  • 👿Vulnerabilities Cases
    • Blockchain Network
      • Eclipse Attack
    • Smart Contract
      • Symmetry Breaking
        • XCarnival
      • Hash Collision
        • Poly Network
      • Flash Loan
        • Cream Finance
      • General NFT
        • ERC721R Bug
        • Sleep Minting
      • Cross-chain Bridge
        • Poly Network
        • Nomad
      • Proxy Contract
        • Audius
    • User Client
      • Clipboard Safety
      • Metamask Demonic Vulnerability
    • Replay Attack
      • Wintermute & OP
    • Phishing
      • Frontend Hijack
        • Premint.xyz
      • Fake User Interface
      • Fake E-mail Address
    • Basic Cryptography
      • Fault Attack
        • ECDSA random numbers
        • Ed25519
    • Zero-knowledge Proof
      • Aliasing Attack
  • 🏝️Miscellaneous
    • Tools
Powered by GitBook
On this page
  • Definition of ZKP Security
  • Soundness
  • Zero-knowledge
  • Completeness
  • Other negatives
  1. Vulnerabilities Cases

Zero-knowledge Proof

Definition of ZKP Security

In a ZKP implementation, three core principles of ZKP should be achieved to fulfil ZKP Security:

Soundness

  • All invalid proofs must always be rejected

  • Valid proofs should not be faked, modified or replayed

Negative Examples

  • Constrains are compromised

  • Proving keys are generated insecurely or sealed in an unsafe way

Zero-knowledge

  • Witness information shouldn't leak in any other place, eg. in a proof

Negative Examples

  • Private variable is published

  • Metedata attack

Completeness

  • All valid proofs must always be accepted

  • All circuits or programmes should be handled correctly

Negative Examples

  • R1CS incorrect generation

  • gadget i/o value mismatch causing gadget combination fails

Other negatives

  • Data leakage through side channels or encodings

  • Any unsafe state(code execution, DoS)

  • Trusted setup hack

  • build and release integrity

  • software dependencies/libraries

PreviousEd25519NextAliasing Attack

Last updated 2 years ago

👿
Page cover image