ubuntuSystem Architecture

ZK ONE architecture combines decentralized identity, verifiable computation, and modular permissioning. Below a concise but technical architecture overview.

High-Level Architecture

flowchart TB
    A[Next.js Frontend<br/>Shadcn UI] --> B[Client Crypto Layer<br/>WASM ZK Engine]
    B --> C[Lisk L2 Smart Contracts]
    C --> D[Identity Registry]
    C --> E[Verification Contract]
    C --> F[Access Controller]
    C --> G[Event Logs / Indexer]
    G --> H[Third-Party Verifiers]

Architectural Layers

Frontend Layer (Next.js + Shadcn)

Responsible for:

  • ZK proof generation (WASM)

  • local hashing

  • session-less client operations

  • declarative access UI

Client Crypto Layer

  • zkSNARK prover (Groth16 / Plonk)

  • poseidon hashing for circuits

  • AES-256-GCM for local encryption

  • canonical document normalization

Smart Contract Layer (Lisk L2)

Contracts:

  • IdentityContract – stores identity hashes + verification flags

  • VerificationContract – validates zk-proofs

  • AccessController – bitmask + revocation + expiry logic

4. Off-Chain Indexing

Used for:

  • activity logs

  • attestation tracking

  • third-party verifier dashboards

State Architecture

Data Processing Pipeline

Access Control Architecture

Security Architecture (Condensed)

Last updated