articles, resource-center

Grasping Zero-Knowledge Technology: More Than Just Marketing Hype

December 3, 2025
9 min
e
Zero-knowledge proof system architecture showing prover and verifier interaction with cryptographic protocols

Introduction

The term "zero knowledge" has been widely adopted in the blockchain sector, especially in conversations regarding ZK-rollups. The idea of zero knowledge actually existed long before blockchain technology emerged, with its fundamental research released in 1989.

This investigation delves into the true meaning of zero knowledge, assesses if ZK-rollups genuinely have zero knowledge characteristics, and explores the connection between this technology and privacy.

Understanding Zero-Knowledge Principles

Zero-knowledge technology appeared long before the creation of the first blockchain. The groundbreaking paper "The knowledge complexity of interactive proof systems" presented these ideas in 1989, long before the Ethereum community acknowledged ZK's significance for rollup solutions in about 2018.

Grasping zero knowledge necessitates differentiating between various proof types and their unique characteristics.

The idea of zero knowledge functions as a characteristic of proof systems. In blockchain discussions, ZKPs, or zero knowledge proofs, are frequently mentioned, but this term can refer to both proof of statement and proof of knowledge, with each having different functions and unique features.

Validation of Assertion vs Validation of Understanding

Proof of a statement shows that the assertion is valid without disclosing any details about the assertion itself. Instances encompass:

  • demonstrating that a number is a square modulo n
  • that two graphs are not isomorphic
  • that a large number possesses precisely three prime factors

Proof of knowledge, on the other hand, shows that the individual making a claim has particular knowledge regarding the statement. Employing analogous instances, this would entail:

  • demonstrating awareness of a value x for which z is equivalent to x squared modulo n
  • understanding the isomorphism between two graphs
  • possessing the actual factors of a significant number

Every demonstration of knowledge inherently serves as a demonstration of a statement, but the opposite is not the case. When an individual demonstrates knowledge of a value x that fulfills a mathematical relationship, it inherently confirms the existence of that relationship, merging both proof forms into one illustration.

Graph Isomorphism as a Real-World Illustration

The graph isomorphism problem serves as a superb example of these ideas. Two graphs are isomorphic if they are fundamentally the same except for the rearrangement of their labels. A bijective function must be established between the vertices so that edges are present between vertices in one graph if and only if matching edges are present in the other graph.

To prove the statement through graph non-isomorphism, the procedure consists of randomly selecting a permutation and one of two graphs, followed by computing a permuted variant. If the graphs were genuinely isomorphic, identifying the original graph would be infeasible, lowering accuracy to mere random chance with a 50 percent likelihood.

To prove knowledge through graph isomorphism, the prover shows the isomorphism between two graphs. The protocol employs random permutations and challenges to confirm this knowledge without disclosing the actual isomorphism, preserving privacy while demonstrating capability.

Every proof of knowledge is also a proof of statement, but not vice versa.

The Zero Knowledge Attribute

Zero knowledge indicates that a verifier cannot obtain any further information from a prover other than what is disclosed by the proof itself. In the graph isomorphism instance, knowledge proof preserves zero knowledge attributes with honest verifiers, since the prover transmits only commitments without disclosing the specifics of the isomorphism or permutation.

Nevertheless, evidence of graph non-isomorphism does not possess zero-knowledge attributes, as adversarial verifiers can obtain extra information by not adhering to the protocol. They could present arbitrary graphs and identify connections to the original graphs via protocol execution.

Transforming non-zero-knowledge proofs into zero-knowledge can be achieved by having verifiers demonstrate their compliance with protocol regulations. Most practical protocols primarily ensure honest-verifier zero knowledge, which is adequate for non-interactive applications via methods such as the Fiat-Shamir heuristic.

ZK-Rollups and Their True Characteristics

ZK-rollups function like the graph non-isomorphism problem, verifying claims about valid state transitions instead of showing knowledge. These systems perform transactions off-chain and provide proofs to Layer 1 networks such as Ethereum, confirming that off-chain calculations were executed accurately.

Verifiers require access to:

  • proofs
  • new states
  • prior states
  • input values

This clarity contradicts genuine zero knowledge characteristics.

Public vs Private Inputs

ZK-rollups make a distinction between public and private inputs, although "private" in this context does not imply confidentiality. Private inputs are utilized solely by provers in proof generation, whereas public inputs are used by both provers and verifiers.

Public inputs need to be sent to Layer 1, resulting in high costs and necessitating brevity.

Public inputs generally consist of:

  • state roots
  • signatures
  • addresses
  • function parameters
  • contract information
  • storage modifications
  • raised events

This discloses significant details to public viewers. Private inputs comprise Merkle membership proofs and execution traces required for validating correctness.

The rollup structure necessitates that provers possess knowledge of prior states and input values to create validity proofs.

Input Types in ZK-Rollups

Input TypeUsed ByContainsCost
PublicProvers & VerifiersState roots, signatures, addressesHigh (sent to L1)
PrivateProvers onlyMerkle proofs, execution tracesLow (stays off-chain)

The Truth About Privacy in ZK-Rollups

Standard ZK-rollups do not offer any privacy safeguards. When Alice transmits one ETH to Bob via a ZK-rollup, the transaction details are accessible to both prover and verifier.

The system demonstrates the validity of transactions as a proof of statement lacking zero-knowledge attributes, as all data stays publicly accessible or obtainable.

These systems emphasize scalability via brief verification rather than maintaining privacy.

Marketing vs Reality

The "ZK" label in ZK-rollups is mainly for marketing rather than indicating true zero knowledge features.

Authentic Privacy via Client-Side Verification

True privacy necessitates various architectural methods, as seen in systems that handle private data on user devices prior to creating proofs for submission to the network. This generation of client-side proofs facilitates genuine zero knowledge proofs of statements, allowing network operators to confirm proof validity without needing to access execution specifics.

Privacy-focused systems handle transactions discreetly on user devices, generating results that conceal side effects such as note hashes and nullifiers. These components merge into the global state while keeping information confidential, disclosing it only to those involved in the transaction and the designated recipients.

These systems create client-side zero-knowledge proofs for confidential actions, subsequently generating block proofs akin to traditional rollups for network agreement. This two-tier method allows for both privacy and scalability.

Creating Privacy from the Foundation Up

Privacy cannot be added to current transparent systems. Privacy-focused rollups must integrate these factors from the start, necessitating:

  • clear privacy definitions
  • meticulous formulation of statements to prevent unintentional information leakage

Sophisticated privacy systems should manage hybrid public-private state, allowing applications to retain certain private components while making others public for external engagement. This intricacy facilitates advanced applications such as:

  • programmable identity management
  • private DeFi options

These systems signify core architectural advancements instead of gradual enhancements to current transparent networks.

The existing environment has a limited number of authentic privacy-focused Layer 2 solutions that enable client-side processing for real privacy protection.

FAQ

##zero_knowledge_proofs
##zk_rollups
##blockchain_privacy
##zero_knowledge_technology
##cryptographic_protocols
BDS

Pioneering the future of blockchain technology with innovative solutions that empower businesses and individuals worldwide.

+1 929 560 3730 (USA)
+44 2045 771515 (UK)
+372 603 92 65 (Estonia)
Harju maakond, Tallinn, Lasnamäe linnaosa, Katusepapi tn 6-502, 11412, Estonia

Stay Updated

Get the latest blockchain news and updates delivered to your inbox.

© 2025 BDS, part of Idealogic Group. All rights reserved.