An Interview with Decentralized Zero Knowledges Rami Akeela, CEO and Weikeng Chen, CTO of DZK
First proposed in a 1985 paper, Zero-knowledge proof (ZKP) methodologies have long been applied in the fields of mathematics, cybersecurity, commercial transactions, and cryptography. Now, blockchain technology is taking a keen interest in ZKP protocols, which may add yet another layer of technological advancement to blockchains evolution. At the center of this particular development stands DZK, a company leveraging ZKP to create a blockchain-based proof platform. DZK is two very bright men: Rami Akeela and Weikeng Chen, both Ph.D. holders with deep expertise in the blockchain space. Blockleaders recently spent an evening chatting to both, to learn more about their work, and why it matters.
At the center of this particular development stands DZK, a company leveraging ZKP to create a blockchain-based proof platform.
DZK is two very bright men: Rami Akeela and Weikeng Chen, both Ph.D. holders with deep expertise in the blockchain space. Blockleaders recently spent an evening chatting to both, to learn more about their work, and why it matters.
This is our conversation:
What prompted you to start DZK?
Weikeng: We built this company because, in recent years, ZKP technology hasnt seen a lot of adoption, particularly in the blockchain area. A big issue with ZKP is that, although the technology is very powerful, it can consume a lot of computation resources. If there are not enough computation resources, then ZKP is basically not practical. Now, we feel we can use hardware and hardware-friendly algorithms to make ZKP practical for the real world. This is what DZK is all about.
Rami: Continuing with this idea, Weikeng is the cryptographer, and Im the hardware engineer. Were applying the lessons that we learned by working in previous industries, including IoT, communication -and more recently, Machine Learning-, and we can actually see the same patterns. To make anything practical, we need to look at the underlying platforms, which include hardware and software. This is what motivates us. We saw what happened before, and we can now see whats going to happen in this industry (blockchain). We decided to start DZK to address these issues.
Lets talk a bit about your backgrounds.
Rami: Im a hardware guy. Ive basically been doing hardware design andengineering for most of my professional life.
I worked on logic level, architecture level, and digital level. I got my Ph.D. from Santa Clara University, and the topic was actually field-programmable gate array (FPGA) acceleration of multiple applications. One of them was ZKP algorithms. So Ive worked in several companies doing hardware design, and about three years ago, I was introduced to blockchain and crypto by someone who was interested in my work. So I started exploring this field, back in 2019, working on FPGA acceleration applied to blockchain. Some basic algorithms, and soon after I started looking at ZKP. I created a start-up on my own to work on this, but then the pandemic happened, so everything sort of stopped.
But Im still committed to this field, I feel theres a lot to be done, and thats why Im currently working on blockchain.
Weikeng: I recently graduated from UC Berkeley with a PhD in computer science. During my time in graduate school, I focused on cryptography, mostly building practical systems for zero-knowledge proof and secure multi-party computation. To make these systems practical, I need cryptography to run fast, so I have always been interested in hardwareacceleration.
My background is mostly using cryptography to build this system, and now is the time for me to look at the hardware side to build this working platform with real-world usability.
Just as a personal curiosity, how did you two meet?
Weikeng: We actually met in Palo Alto, California. I was introduced by someone in the blockchain industry that Rami is doing some very cool stuff about zero-knowledge proofs.
Where do you see the future of blockchain?
Weikeng: My feeling about blockchain is that the technology will likely go in different directions. Firstly, privacy. People are starting to do a lot of financial transactions and playing with NFTs on blockchain, and they are looking for privacy.
Another one is scalability, because there are a lot of applications running on blockchain, the decentralization nature of the system limits its throughput. This is what we want to solve.
I would add that interoperability is another important topic todaydifferent blockchain ecosystems interacting with each other as if they were the same blockchain.
So I see blockchain developing in these three strands. And I think that all three aspects confluence in ZK: privacy, scalability, and interoperability. ZK enables proving things without disclosing secret information, thats privacy. It allows blockchain to verify whether something has been processed correctly, without needing all the validators to check it all, thats for scalability. And lately, we have started to see the needs for one blockchain to interact with many other chains. ZK can also be applied here, to this interoperability.
Rami: I think large corporations are beginning to realize that ZKP is something they can incorporate into their existing platforms and services, because of the unique position of ZKP and blockchain technology. And to capture this interest, and the wave of applications that are coming, one needs to think about how to address issues that will definitely be surfacing soon.
I mean, blockchain is still in its infancy, really, and people got caught in the excitement of developing applications without answering some basic questions first. How will the app play out in terms of processing speed or cost, for example. I think the industry will do well once those foundational questions are addressed. We firmly believe that blockchain and ZKP have a very, very interesting future. We just need to take care of the basics before we move forward. Otherwise, well get stuck at some point. If we try scaling too fast well hit the wall.
Weikeng: Thats a very good point. Actually, for all these directions, privacy, scalability, and interoperability, the problem has always been about computation. Some people might want to use ZKP to generate proof, but the proof generation is way too slow. So the actual hardware infrastructure for the blockchain is a crucial consideration to use ZKP efficiently and realistically.
DZK is collaborating with AMD-Xilinx to architect the field-programmable gate array (FPGA) division in the upcoming ZPrizecompetition. The project seeks to accelerate the Number-theoretic Transform (NTT) operations for zero-knowledge proofs. I wanted to know what this collaboration meant for DZK, both personally and professionally.
Weikeng: I think the blockchain community is starting to realize that they have a strong need to have a robust hardware infrastructure to run ZKP efficiently. The ZPrize is originally focused on CPU and GPU, so we feel it is a good time to promote awareness of FPGA. Were doing this as the next stage of blockchain acceleration. Basically, we want to use this opportunity to push the industry forward.
Rami: AMD is very passionate about this concept too. They believe that ZKP will be the killer app for FPGAs, for several reasons. FPGA will be vital in the processing of ZKP-based apps. The work that were doing with ZPrize, were actually the architects of the FPGA division, and, as Weikeng said, were taking this opportunity to promote awareness of FPGAs to get people to start looking into this.
We got a lot of attention and support from several top ZKP companies and investment firms, including Aleo, Polygon, and Jump Crypto. The prize pool for the NTT FPGA division is $725k, and the prize pool for MSM GPU/FPGA division is $910k. This is the biggest prize for ZKP research and development to date.
So this collaboration is an indication that the industry is a) acknowledging the need to look into this technology, because they believe that this is the next generation of blockchain technology. And b) this is the perfect environment for innovation. If we onboard not only university students, but also companies and developers, we have a great incentive. Its the perfect environment, and its good for us as a company, because it validates that the work were doing is going to be the future and the answer to all the problems we currently have in the ZKP and blockchain communities.
Weikeng: Just to add that our partnership in DZK, that is, a cryptographer and a hardware engineer, has long been needed in the industry, and the prize money in ZPrize also serves to create this sort of novel partnerships between individuals with expertise in seemingly disparate fields, but can come together to foster innovation.
As the last question, if you were to define DZKs mission in one sentence, what would that be?
Weikeng: Make the impossible possible.Rami: Well, I cant top that, really, so well go with Weikengs statement!
Just as we were wrapping up, Rami wanted to make an official announcement.
Rami: DZK has developed a set of end-to-end, FPGA-accelerated privacy algorithms. We have successfully created systems capable of efficiently generating proof built on FPGA servers. This is the first, and so far only, end-to-end FPGA accelerator system for ZKP.
Interesting revelation, and an interesting future for this enterprise.
View original post here:
Privacy, Scalability, and Interoperability are the future of Blockchain for DZK - Block Telegraph
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]