- Data Authenticity: Guarantee data originates from trusted entities.
- Data Integrity: Embed tamper-resistance to prevent unauthorised manipulation or inclusion of bad data.
- Data Transformation: Facilitate trust-minimised transitions of data for compatibility with destination systems.
To explore the “why” behind Verity, read Why Verity?.
A zkTLS-Driven Protocol
Verity implements a zkTLS protocol, combining Zero-Knowledge (ZK) and Multi-Party Computation (MPC) cryptographic primitives. It operates as a decentralised network, with a Prover Node at its core, orchestrated via a developer-centric framework. The goal is to enable developers to create data pipelines that produce cryptographic Data Flow Proofs (DFPs) — cryptographically verifiable Proofs of Data Flow.What is zkTLS?
“zkTLS” (or “MPC-TLS”) cryptographically proves data authenticity for TLS-enabled sources (e.g., APIs). It ensures the data is tamper-resistant and accurately represents the source.
Beyond Cryptographic Primitives
Verity extends zkTLS concepts, covering the entire data journey from source to destination. Conceptually, it operates like a zkRollup for TLS attestations and private data, producing verifiable DFPs. Data Flow Proofs (DFPs) encapsulate the entire pipeline:- Sourcing data from trusted third-party APIs.
- Combining third-party data with private first-party inputs.
- Processing and aggregating data securely.
- Generating verifiable outputs for downstream systems.