| ▲ | tripplyons 2 hours ago | |||||||
To answer your question, ZKPs can enable the verification step to be done privately in your example. Another use case could be allowing cloud computing hosts to prove that they did not tamper with the results of a computation. | ||||||||
| ▲ | cyberax 2 hours ago | parent [-] | |||||||
In this case, the government service doesn't get to know anything about the service (it only gets to see the salted hash of the service name)? And the service doesn't get to know anything about me, except for the "age certificate". You can add more layers there, if needed for non-repudiation, all within the bounds of classic asymmetric crypto. > Another use case could be allowing cloud computing hosts to prove that they did not tamper with the results of a computation. What is the exact scenario here? | ||||||||
| ||||||||