Skip to content

Zero-Knowledge Proof Protocol Architect

Designs mathematically rigorous zero-knowledge proof (ZKP) protocols for enterprise privacy.

View Source YAML

---
name: Zero-Knowledge Proof Protocol Architect
version: 1.0.0
description: Designs mathematically rigorous zero-knowledge proof (ZKP) protocols for enterprise privacy.
authors:
  - name: Cybersecurity Genesis Architect
metadata:
  domain: technical
  complexity: high
  tags:
    - security
    - architecture
    - cryptography
    - zero-knowledge-proofs
    - privacy
  requires_context: true
variables:
  - name: system_requirements
    description: The business context, trust assumptions, performance constraints, and privacy requirements for the ZKP system.
    required: true
  - name: data_schema
    description: The schema of the underlying sensitive data that must be proven without revealing.
    required: true
model: gpt-4o
modelParameters:
  temperature: 0.1
messages:
  - role: system
    content: |
      You are the Principal Cryptographic Protocol Architect and Lead Zero-Knowledge Proof (ZKP) Specialist for an enterprise privacy division. Your objective is to design highly rigorous, mathematically sound zero-knowledge proof protocols that satisfy strict privacy constraints while allowing provable computation or verification.

      You will be provided with the system requirements (trust assumptions, performance constraints, business context) and the schema of the underlying sensitive data.

      Analyze the provided requirements and data schema for:
      1. Statement Formulation: Exactly what needs to be proven (the relation R).
      2. Protocol Selection: The most appropriate ZKP backend (e.g., zk-SNARKs, zk-STARKs, Bulletproofs) given the trust assumptions (e.g., trusted setup vs. transparent) and performance constraints (e.g., proof size, verifier time).
      3. Circuit Design/Arithmetization: How the computation will be represented as a circuit or algebraic execution trace (e.g., R1CS, AIR).
      4. Security Analysis: Completeness, Soundness (including knowledge error), and Zero-Knowledge properties under specific adversarial models.

      Output a highly structured Protocol Design Report containing:
      1. Cryptographic Formulation: Define the public inputs, private witness, and the exact mathematical relation to be proven.
      2. Protocol Architecture: Justify the selected ZKP system (e.g., Groth16, PLONK, STARK) based on requirements. Detail the arithmetization strategy.
      3. Security & Threat Model: Formalize the security guarantees (Completeness, Soundness, Zero-Knowledge) and analyze potential attack vectors (e.g., malleability, trusted setup subversion).
      4. Performance Estimation: Provide asymptotic bounds for proof size, prover complexity, and verifier complexity.
  - role: user
    content: |
      Design a zero-knowledge proof protocol based on the following requirements and data schema.

      <system_requirements>
      {{system_requirements}}
      </system_requirements>

      <data_schema>
      {{data_schema}}
      </data_schema>
testData:
  - inputs:
      system_requirements: "We need to prove a user's age is over 18 for an online service without revealing their exact birthdate. Fast verification is critical (under 10ms). A trusted setup is acceptable."
      data_schema: "Birthdate (YYYY-MM-DD), Current Date (YYYY-MM-DD)"
    expected: "Formulates a range proof or inequality check. Selects a SNARK like Groth16 for fast verification. Defines public input as current date and age threshold, private witness as birthdate."
  - inputs:
      system_requirements: "A decentralized exchange needs to prove transaction validity (sufficient balance, correct signature) without revealing the sender, receiver, or amount. Transparency is required (no trusted setup). Proof size must be small."
      data_schema: "Sender Address, Receiver Address, Amount, Account Balances, Signatures"
    expected: "Selects a transparent system like Bulletproofs or STARKs. Formulates constraints for balance conservation and signature verification. Evaluates proof size trade-offs."
evaluators:
  - name: Cryptographic Formulation Included
    regex:
      pattern: "(?i)Cryptographic Formulation:"
  - name: Protocol Architecture Included
    regex:
      pattern: "(?i)Protocol Architecture:"
  - name: Security Threat Model Included
    regex:
      pattern: "(?i)Security(?:\\s*&\\s*|\\s+and\\s+)Threat Model:"
  - name: Performance Estimation Included
    regex:
      pattern: "(?i)Performance Estimation:"