Imagine proving you know the combination to a safe without ever revealing the combination or opening the safe. That is the concept. In practice they allow systems to verify claims without revealing underlying data. Applications include private transactions, identity verification, and voting systems.
Comments