A cryptographic method letting you prove something is true without revealing the underlying data.
Analogy
The “Where’s Waldo” analogy: You prove you found Waldo by showing him through a tiny hole in a large sheet covering the page. The verifier sees Waldo exists, but learns nothing about where he is or what else is on the page.
General Examples
- Prove you’re over 21 to a bar without showing your birthdate or address
- Prove you have sufficient funds for a loan without revealing your total balance
- Prove you’re a citizen of an approved country without revealing which one
Project Applications
EdgeChain
ProveYieldAboveThreshold circuit — farmer proves yield > quota without revealing actual harvest amount. The NGO verifies compliance; the farmer keeps their data private.
Msingi
BRACE protocol — device proves it’s registered without revealing which device it is (1/N anonymity). Uses commitment C = H(pk || r) where pk and r remain secret.
How It Works (Simplified)
- Prover has secret data (e.g., actual yield = 450kg)
- Prover generates cryptographic proof: “I know a value > 400kg”
- Verifier checks proof validity without learning 450kg
- Result: Statement verified, data protected