ZKcash

Welcome to ZKCash

From Zero-Knowledge to Private Money

Empowering instant, borderless, and confidential transactions — verified by mathematics, not by disclosure.

Get Started Read Whitepaper

System Overview

Composable privacy, verifiable by math

Clean white layout with clear roles, assets, and deployment paths.

3.1

Actors

  • Users

    Hold ZKC, create shielded notes, and generate proofs.

  • Relayers (optional)

    Submit transactions on behalf of users to reduce metadata leakage.

  • Provers

    Local or decentralized markets that generate ZK proofs quickly.

  • Validators / Sequencers

    Order transactions and verify proofs (role depends on deployment mode).

3.2

Asset — ZKC

ZKC is the native currency used for fees and network incentives. It represents private money that is verifiable, transferable, and composable.

Fees Incentives Shielded Value
3.3

Deployment Modes (Composable by Design)

Mode A — zkRollup on L1

Deployed as a zk-rollup (e.g., Ethereum). Proofs attest to correct state transitions; data availability lives on L1.

L1 DASuccinct ProofsShared Pool
Mode B — Sovereign Chain

ZKCash as its own PoS/BFT chain with on-chain SNARK verification and light-client bridges to external ecosystems.

PoS/BFTOn-chain VerifyLight-Client Bridges
Both modes share the same shielded pool and transaction circuit design — enabling migration & multi-deployment.

4.0 — Selective Transparency & ZK Receipts

  • 4.1

    Viewing Key Sharing

    Users can share an IVK (incoming viewing key) atau FVK (full viewing key) dengan auditor, bisnis, atau pihak tertentu untuk visibilitas yang terukur dan terkontrol.

    IVK (Inbound only) FVK (Full view) Scoped Access
  • 4.2

    ZK Receipts

    Attestasi ringkas yang “membuktikan fakta tentang pembayaran” tanpa mengekspos detail transaksi.

    • Proof of Payment: “Ada pembayaran ≥ X ke domain D sebelum waktu T.”
    • Ownership/Balance Proofs: “Pemegang mengontrol ≥ Y ZKC.”
    • Counterparty-private invoices: “Invoice #123 settled,” tanpa membocorkan jumlah/alamat.
  • 4.3

    zk-KYC Compatibility (optional)

    Pengguna dapat melampirkan bukti bahwa mereka lolos predikat kebijakan (mis. negatif ke daftar sanksi) tanpa mengungkap identitas.

    Negative-membership Policy predicates No PII

6.0 — Core Features

Built for private, instant, and open value

Zero-Knowledge Privacy

Every transaction is protected by zk-proofs for full verification without revealing sender, receiver, or amount.

  • Privacy by default — transparency by choice.

Fast & Borderless Transactions

Built for efficiency. Send value instantly worldwide with low fees and no intermediaries.

Confidential by Design

User data and balances remain encrypted on-chain. Only you control your information.

Decentralized Money

No central authority, no censorship. Own, send, and store value freely with ZKCash.

Interoperable Future

Designed to integrate with zk-based ecosystems and Layer-2 networks—enabling private DeFi and cross-chain payments.

7.0 — FAQ

Got questions? We’ve got answers.

How does ZKCash keep transactions private but verifiable?
ZK proofs validate correctness without revealing sender, receiver, or amount. By default, details remain hidden; users can selectively disclose via viewing keys or ZK receipts.
What’s the difference between IVK and FVK?
IVK (Incoming Viewing Key) lets someone see inbound transfers only. FVK (Full Viewing Key) provides full read-only history. Both are off-chain sharable and revocable.
What are ZK Receipts?
Compact attestations proving facts about a payment without revealing it. Examples:
  • Proof of Payment: “A payment ≥ X to domain D occurred before time T.”
  • Ownership/Balance: “Holder controls ≥ Y ZKC.”
  • Counterparty-private invoices: “Invoice #123 settled,” amounts/addresses hidden.
What fees and latency should I expect?
Fees cover proving/verification and network inclusion. ZKCash targets low fees and near-instant finality depending on the chosen deployment (zk-rollup or sovereign chain).
How does interoperability work?
On supported chains, ZKCash maintains canonical shielded pools. Cross-chain value flow is modeled as burn on chain A + mint on chain B, verified by proofs and light-client/zk bridges.
Can I prove compliance without revealing identity?
Yes. Optional zk-KYC predicates (e.g., negative membership against sanctions lists) let you attach compliance proofs without exposing personal information.

8.0 — Contract

Official ZKCash Contract

Ticker ZKC
Network Solana
Contract
G7wxcsFTVf6gSWes6yXTcvyn4dmvcTjbnpVKfwSupump Copied!