ZK & Predicate Proofs

ZK enhances zero trust. Prove what you need while minimizing information disclosure.

Portabl allows you to express and verify complex verifications and attributes as boolean assertions so you can verify what you need without overcollecting data and increasing privacy risk.


Many high-assurance use cases require using PII and risk information in order to make a risk-based decision. But not all. Tap into “proof of KYC,” “proof of residence” and more in lieu of explicit data collection to achieve high assurance in simpler ways.

All of the assurance, none of the risk

We think about proofs as an alternate way to express specific assertions without increasing your own PII risk surface area

An extension of global standards

ZK and predicate proofs extend the global W3C standards for Verifiable Credentials.

Advanced cryptography with off-chain data

Just as Verifiable Credentials don’t put PII on chain, our implementation of ‘proofs’ does not involve putting data on- chain either.

Uncoupling sources, attributes, and underlying risk signals to unlock high assurance without overcollection.

1

Verifications - All proofs start with our underlying KYC and AML verification methods or with credentials issued by participating institutions.

2

Proof Generation - Portabl generates derived attributes and proofs when certain types of verifications are satisfied. For example, completing identity verification may generate a proof that the user is over 18, 21, or 25.

Pink Tick Icon

Flexibly Combine Attributes & Proofs - The encryption and signature methods Portabl uses allows claims to be shared both explicitly and as derived attributes— all you need to do is specify which way you want to consume specific claims.