Web Proofs are signed attestations of TLS transcripts that enable secure integration of Web2 data into blockchain applications. To learn more about them in a high-level context, check out our Verifiable Data report: Web Proofs.
Web Proofs can be implemented using two main architectures: MPC-TLS and Proxy. In both cases, the architecture guarantees the correctness of the TLS transcript to a trusted party - either a Notary or a Proxy Attester. In the MPC-TLS architecture, the Notary gains this guarantee by participating in the TLS connection via Multi-Party Computation. In the Proxy architecture, the Proxy Attester observes the encrypted traffic as an intermediary, ensuring the transcript's integrity.
The core challenge lies in maintaining this guarantee of transcript correctness when transferring it to the blockchain. Both architectures introduce trust considerations, as external, app-specific, Verifiers must trust either the Notary or the Proxy Attester to faithfully represent the guaranteed transcript on-chain. This problem is even more pronounced in Web3 applications with on-chain Verifiers, where the verification process must be trust minimized to maintain the decentralized nature of the blockchain ecosystem.
This post explores three approaches to addressing these trust issues in blockchain use cases, as proposed by the zkP2P, Opacity, and Reclaim teams with special emphasis on the security assumptions of each approach.
This is an analysis of ideas by @0xSachinK from zkP2P - originally presented at zkSummit 11 - on how to leverage TLSNotary for specific Web3 use cases with reasonable security assumptions.
The following required assumptions:
And the additional optional assumption that
zkP2P proposes the following TLSNotary extension.
Protocol for Notaries Joining the Committee:
User Flow:
In such a system, given the security assumptions mentioned above, a user can finalize their transaction instantly (or successfully dispute it) within a reasonable period of time. While this framework was originally proposed by zkP2P for onramp payments the use cases for such extension can be generalized to any marketplace for transferring digital assets.
This is an analysis of the ideas presented by Opacity Network, which proposes an extension to the TLSNotary protocol aimed at solving the collusion problem in decentralized zkTLS implementations. The ideas are described in more detail in the blog post “Opacity Network: Trust but Verify” by EV3 Research and Hersh Patel’s talk at an Archetype workshop.
Building upon TLSNotary, Opacity adds the following key assumptions:
Opacity extends TLSNotary with:
User Prerequisite: Prove Ownership of Web2 Account
Before a client can use the Opacity protocol, they must first prove ownership of their Web2 account. This step is crucial for mapping wallet addresses to Web2 accounts, which helps prevent Sybil attacks and enhances accountability. Here's how it works:
Requirements for Notaries Joining Network:
User Flow:
Slashable Offenses and Non-attributable Faults:
Regarding non-attributable faults, Opacity acknowledges that perfect attribution isn't always possible in cases like connection losses. The protocol addresses this through Web2 identity contracts and verifiable logs to track failure patterns. Governance can analyze these patterns, considering the types of Web2 identities involved, to make informed decisions on potential slashing, with a focus on preventing coordinated attacks that could unfairly generate many failures.
This is an analysis of the decentralized extension of the Reclaim protocol, which aims to provide a decentralized system for proving statements about online data with selective disclosure (without revealing unnecessary information).
Unlike the other two cases in question, the decentralized extension of the Reclaim protocol is not based on TLSN. As a core cryptographic protocol it uses Reclaim Proxy mode protocol which is an orthogonal approach to MPC-TLS. Such an approach was introduced in the original DECO paper and successfully implemented (and open-sourced) by Reclaim. While we won’t analyze the core protocol in detail, we need to consider its security assumptions while analyzing the decentralized extension of the Reclaim protocol.
The analysis is based on the protocol description in the Reclaim whitepaper.
Each of the three protocols - zkP2P, Opacity, and Reclaim - offers a unique approach to implementing Web Proofs in Web3 applications, but each comes with its own set of challenges and security assumptions. All three rely on the tricky assumption of an honest majority, which is vulnerable to Sybil attacks. zkP2P's focus on P2P transactions and markets limits its use cases, while Opacity's requirement of a public-facing account reduces Sybil attack risks but necessitates on-chain commitment of Web2 identity, also constraining its applications. Reclaim, while more use-case agnostic, is based on a different architecture that introduces network assumptions related to secure proxy setup. The table below effectively illustrates these varied assumptions.
While these protocols represent significant strides in bridging Web2 and Web3, the landscape is far from settled. It would be premature to crown a winner or make definitive judgments about which approach will ultimately prevail. The market needs time to mature, and we've yet to see which use cases will truly take off. The race is on, and the finish line is still far on the horizon.
Legend:
● – Required security assumption
○ – Not required security assumption
* Due to the verifiable trace mechanism
** While Reclaim assumes Economic Rationality (ER) directly, using statistical measures demonstrating MQA is strategy proof, both Opacity and zkP2P assume ER indirectly, requiring Notaries to stake tokens proportionally to transaction value which induces ER.
*** The Opacity Network assumes that Notaries have to use SGX as a slashing condition. zkP2P and Reclaim do not require Trusted Execution Enclaves directly however in these protocols use of TEEs is an optional way to harden security.
Special thanks to Sachin from zkP2P and Hersh from Opacity Network for their insightful reviews and valuable comments that contributed to the accuracy of this article.