Bringing trust through intuitive email integration

Extensive set of open source SDKs, libraries, and
protocols that enables email-based identity

hero-imagehero-image

Trusted by the best

From next-gen enterprises to established organizations

EthereumFoundationLogoIYKLogoGitcoinPassportLogoZKP2PLogoClaveLogoOpenPassportLogo

How ZK Email Works

ZKEmailWorkingFlow

Works with your existing inbox

Learn More →
Works with your existing inbox-image

Regex and Hashing

Learn More →
Regex and Hashing-image

Zero Knowledge Circuits

Learn More →
Zero Knowledge Circuits-image

Resources

Read our recent blogs, talks and documentations

FAQs

Quick answers to the common questions you might have. Can’t find what you looking for? Read our docs or contact us

We can hide any information or selectively reveal any text, wether that’s the sender, receiver, subject, body etc using Regex. Regex is short for regular expression, this term represents sequence of characters that forms a search pattern, commonly used for string matching within text. It consists of a sequence of characters that define a search pattern, enabling complex searches, substitutions, and string manipulations. For example, in programming and text processing, regex can identify, extract, or replace specific text patterns, such as email addresses, dates, or phone numbers, by defining these patterns through a combination of literal characters and special symbols. In the context of ZK Email it is used to parse email headers and extract relevant information.
ZK Email leverages the principles of Zero Knowledge proofs and serverless execution within the browser to provide a verifiable yet anonymous way to confirm an emails contents and recipents . Zero Knowledge proofs allow provers to prove that they know or possess certain information without revealing the information itself to a verifer. In ZK Email, this technology is used to verify user identity and email content without exposing sensitive data to a server or other users. The serverless architecture means that all proof generation is executed entirely within the user`s browser.
The DKIM email signitures do not contain information we can use to sign other emails, all our code is open source and being audited
We use the existing DKIM Signiture, almost all emails are signed by the sending domain server using an algorithm called DKIM. It can be summarized as this rsa_sign(sha256(from:..., to:..., subject:..., <body hash>,...), private key). Every time an email is sent we can verify the sender, receiver, the subject, the body by checking if the corresponding public key of the email address applied on the DKIM signiture returns the sha256(from:..., to:..., subject:..., <body hash>,...) a hash of the from, to subject, email details which we can check by rehashing
ZK Email Footer Logo
twitter-logoyoutube-logotelegram-logogithub-logo