Zhixiong Pan
Zhixiong Pan|11月 30, 2025 08:43
The PSE (Privacy and Extension Exploration) team of the Ethereum Foundation has released a paper called OpenAC, which may be the most practical technological breakthrough in the field of digital identity in recent times. It proposes a transparent and lightweight anonymous credential design aimed at resolving the long-standing deadlock between decentralized privacy and Web2 compliance. Its core value lies in providing users with decentralized and anti tracking privacy protection without compromising existing government or institutional infrastructure, such as RSA/ECDSA signatures. The biggest highlight of OpenAC is its extremely high compatibility. Previous privacy schemes often required issuers to change their signature algorithms, which is almost impossible to implement in the real world. OpenAC takes a different approach by serving as an intermediate layer that wraps around existing standard credential formats (such as SD-JWT, mDL mobile driver's license), utilizing zero knowledge proofs to transform traditional, easily traceable digital identities into privacy credentials. This means that in the future, your Ethereum wallet can directly import real-world ID cards and be used without compromising privacy, without waiting for government system upgrades. The current digital identity standards, such as W3C VC, have a fatal flaw: Linkability. When you directly display a certificate signed by the issuer, the signature itself is a unique tracking marker. OpenAC has severed this connection through cryptographic means, achieving 'unlinkability'. You display 'adult' at point A and 'qualified investor' at point B. Although they come from the same ID card, mathematically, these two displays are completely isolated, and no one, including the issuer, can associate them. In order to run this logic on mobile phones, OpenAC is very particular about cryptography selection. It uses Spartan as the underlying proof system, which means it is fully transparent and does not require the "Trusted Setup" that carries backdoor risks like Groth16. This eliminates a major trust hazard, which is a hard indicator for government or financial scenarios that require a high level of security. In terms of performance optimization, OpenAC has solved a pain point: verifying traditional ECDSA signatures in ZK circuits is usually very slow. The team cleverly selected a curve called Tom256, whose scalar domain perfectly matches the base domain of the mainstream NIST P-256 curve. This' native adaptation 'greatly improves the efficiency of verifying standard Web2 signatures in zero knowledge proofs, thereby avoiding expensive non-native field operations. In order to achieve commercial standards in user experience, the paper designed a unique 'Prepare Show' architecture. The system places heavy calculations (such as parsing credentials and verifying signatures) in the offline "preparation phase", which only needs to be run once; The 'display phase' triggered by users at the counter or gate only requires extremely lightweight calculations. According to actual test data, the prover side time (including reset) of the iPhone 17 displayed last time was approximately 130ms, still in the sub second range. This sub second level response can fully meet the needs of daily high-frequency payment or verification. In terms of security, OpenAC has also introduced hardware level device binding. It uses the mobile phone's Secure Enclave to sign a random number for each interaction. This means that even if hackers intercept your ZK proof file at the network layer, as long as they do not physically possess your phone, they cannot pass the verification. This design directly benchmarks and meets the high compliance requirements of the European Union Digital Identity Wallet (EUDI Wallet). Of course, as a science popularization, we need to objectively see what the balance is. Due to the use of Spartan+Hyrax, a transparent proof system (without the need for trusted settings), the total size of a complete proof presentation is approximately 150KB, including about 40KB for the online Show section, which is much larger than the hundreds of bytes in Groth16. This means that it is not suitable for direct verification on the Ethereum mainnet (gas fees will explode), but for off chain verification through Bluetooth, NFC, or HTTPS, or for use on L2, this volume is completely acceptable. In addition, the plan utilizes Hyrax style Pedersen promises to link the two stages of "preparation" and "presentation". This design not only ensures the consistency of data between the two stages, but also retains the flexibility of modularity. The paper points out that although the current implementation is based on the assumption of discrete logarithm, its modular structure allows for future replacement of the commitment layer with lattice based schemes, thereby smoothly upgrading to anti quantum security in the future. In summary, OpenAC is not an academic toy that has been shelved, but rather an engineering solution designed for Mass Adoption. It builds a bridge that allows real trust (government ID, education, asset proof) off chain to enter the decentralized world in a privacy protected manner. For the Ethereum ecosystem, this provides the most practical technical blueprint for RWA (Real Asset on Chain), anti witch attack airdrops, and privacy DAO governance.
Mentioned
Share To

Timeline

HotFlash

APP

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads