crystal-ballCore Futures

ZK ONE core functionality is implemented through a hybrid on-chain/off-chain pipeline that provides identity verification, data integrity assurance, and permissioned access while preserving user priv

E-Identity Module

Provides decentralized identity lifecycle: creation, validation, storage, and revocation.

Core Mechanics

  • Hash-based immutability: identityHash = SHA-256(normalizedDocument).

  • ZK verification: User proves document validity without revealing raw data.

  • Canonical normalization: prevents hash divergence across devices.

  • IdentityRecord structure:

struct IdentityRecord {
  bytes32 identityHash;
  uint64 timestamp;
  bool isVerified;
  address owner;
}

Flow

flowchart LR
    A[User Document] --> B[Normalize & Hash]
    B --> C[Generate zk-Proof]
    C --> D[Submit to Lisk L2]
    D --> E[IdentityRegistry Contract]
    E --> F[Record Created / Updated]

Identity Verification

A deterministic smart-contract pipeline validates ZK-proofs and ensures stored identities match local cryptographic transformations.

Verification Steps

  1. Validate zk-proof using Verifier.sol.

  2. Validate proof inputs (document hash).

  3. Mark identity as verified.

  4. Emit attestation events for external verifiers.

Flow

Access Control (Permission Framework)

Omega uses a high-performance bitmask permission model for granular resource control.

Permission Mask

Revocation

Implemented using:

  • revocation index per resource

  • time-based expiry

  • O(1) lookups

Flow

Data Verification

Ensures data integrity without storing raw data on-chain.

What Goes On-Chain

Only 32-byte hash + metadata, never documents.

Verification Flow

Secure Sharing

Data sharing uses ephemeral tokens derived from key material and access scope.

Sharing Flow

Last updated