The ZeroVerify project is organized into distinct phases, each building upon the previous to deliver a fully functional privacy-preserving identity verification system.
Goal: Done by April 13
The ZeroVerify team consists of five Computer Science students working collaboratively on all aspects of the system:
ZeroVerify is fundamentally built on privacy-preserving principles. The system is designed to minimize data collection, storage, and transmission at every layer. Unlike traditional identity verification systems that collect and retain full identity documents, ZeroVerify never persists raw personal identity data after credential issuance. The system stores only non-reversible cryptographic derivatives necessary for preventing duplicate credential issuance.
The core principle of ZeroVerify is data minimization at the protocol level. Users prove specific claims (e.g., "I am a student") without revealing any underlying personal attributes. Verifiers receive only a binary result: valid or invalid. This approach complies with GDPR and CCPA data minimization requirements and aligns with the EU's May 2024 digital identity regulation that explicitly requires zero-knowledge proofs.
Every verification attempt requires explicit user consent. Users review the requested proof type and either approve or deny before any proof is generated. The system provides clear information about what is being requested and what will be disclosed (in this case, only a yes/no confirmation of the claim, with no personal data).
All communications use HTTPS (TLS 1.2+). Server-side data is encrypted using AWS KMS. Credentials are stored locally in the user's browser and never retransmitted. Each proof is bound to a verifier-provided session nonce to prevent replay attacks. The system follows least-privilege principles for IAM roles, and all cryptographic keys are stored securely in AWS Secrets Manager.
ZeroVerify operates transparently with verifiers able to audit the public verification key and verification code. The system provides cryptographic certainty rather than relying on reputation. This transparency allows external security researchers and users to verify the system's privacy guarantees independently.