ZeraLabs logo

Pre-migration documentation. This site reflects the pre-migration state of the protocol. It’s mostly current, but a few edges may not match ZERA at launch. We’re finalizing the new, detailed ZERA docs now. Thanks for your patience.

Security Analysis

Cryptographic Primitives and Post‑Quantum Considerations

Comprehensive security analysis of the zero‑knowledge cash system, covering cryptographic primitives, security guarantees, and quantum resistance.

8.1 Cryptographic Primitives

The system relies on multiple primitives, each with specific security properties and quantum‑resistance characteristics.

Cryptographic PrimitiveMathematical DefinitionSecurity PropertiesQuantum Resistance
Group G (entropy)S0 subset of GDLP hardness, high Renyi entropyVulnerable to Shor
Homomorphic map phi_HS_(i+1) = phi_H(S_i)Structure preservationDepends on group
Pedersen Commitmentg^m · h^rBinding, hiding, homomorphicDLP‑based
ZK Proof System(Prove, Verify)Completeness, soundness, zero‑knowledgeProtocol‑dependent
Oracle SystemTimestamp authority signaturesNon‑repudiation, time orderingSignature‑dependent
Binding & Hiding
The commitment scheme is computationally binding under DLP and perfectly hiding with uniformly random r, forming the basis for private transactions.
Soundness & Simulation
Soundness relies on knowledge‑of‑exponent‑style assumptions; simulation may use trapdoor commitments derived from the oracle/CRS when required.

8.3 Post‑Quantum Considerations

Group‑Theoretic PQ Schemes

Alternatives such as WalnutDSA or IronwoodKAP provide quantum‑resistant constructions that resist Shor‑type attacks.

Code/Lattice‑Based Commitments

Homomorphic commitments with ZK proofs over modular lattices offer quantum‑resistant security without discrete logarithms.

Security Recommendations

  • Use 256‑bit security parameters for current deployments
  • Plan quantum‑resistant options for long‑term security
  • Schedule regular audits of crypto implementations
  • Monitor advances in quantum computing capabilities
  • Prepare migration paths to post‑quantum primitives

Implementation Security

  • Constant‑time cryptographic operations
  • Secure random number generation everywhere
  • Memory protection for sensitive material
  • Formal verification of critical components

Mathematical Components

Mathematical Foundations

Algebra, groups and fields underpinning the protocol

Algebraic Entropy

Entropy, randomness beacons and unpredictability

Perpetual Genesis

Unending ceremony and evolving base points

Homomorphic Evolution

Balance updates that preserve hidden amounts

Commitment Layer

Commitments, openings and security properties

Zero-Knowledge Proofs

Proving validity without revealing data