An interactive Zero-Knowledge Proof system with an AI Small Language Model verifier — enabling users to prove their identity through a cryptographic challenge-response exchange without ever revealing their credentials.
Overview
An interactive Zero-Knowledge Proof (iZKP) is a cryptographic approach that enables one party — the prover — to prove to another party — the verifier — that they know a piece of information, such as a password or credential, without revealing that information itself.
MyKey's iZKP system pairs this with an AI Small Language Model (SLM) as the verifier, embedded directly on-device. The result is a novel authentication architecture — iZKP-AIV — where the AI verifier engages in a dynamic, iterative challenge-response dialogue with the prover, gaining cryptographic confidence in the user's identity without ever seeing or storing the underlying secret. There is currently no known practical, production-ready implementation of this architecture anywhere in the world.
The cryptographic foundation
iZKP-AIV is built on a family of three-step cryptographic protocols known as Σ-protocols (Sigma Protocols). The Greek letter Σ visualizes the flow of messages between the prover and verifier. Each phase is carefully designed so that the AI verifier gains confidence in the user's identity while learning nothing about the secret itself.
The prover generates a random nonce and uses it to create a cryptographic commitment — a binding, non-interactive promise sent to the AI verifier. This commitment conceals the prover's secret while locking in their position before the challenge is issued.
Secret remains hiddenThe AI verifier sends a random challenge value to the prover. This challenge must be unpredictable and issued only after the commitment is received — preventing any pre-computation or manipulation by a dishonest prover. The AI's adaptive logic dynamically shapes each challenge.
AI-generated, randomizedThe prover computes a response using their secret witness, the original nonce, and the verifier's challenge. The AI verifier then evaluates the commitment, the challenge, and the response together — confirming the prover's identity without ever seeing the underlying credential. Homomorphic encryption ensures the credential elements are never exposed to the SLM verifier at any point.
Credential never exposedHow iZKP-AIV works
Applications
Cryptographic guarantees