π₯οΈ
Best Viewed on Desktop
The technical documentation and app previews are optimized for desktop viewing.
β Back to HomeβοΈ
vs Competitors
Comprehensive feature comparison from Paper Table 12 and Related Work Β§11. ZK-Sentinel is the first protocol combining provable coercion resistance with granular regulatory compliance.
| Feature | ZK-Sentinel V11 | 0xbow | Railgun | Aztec* | Tornadoβ |
|---|---|---|---|---|---|
| Core PrivacyShielded deposits/withdrawals | βE2E | βMainnet | βMainnet | β | β |
| Fixed denomination pools | β92 pools | β | Variable | β | β |
| Stealth deposits | β | β | β | β | β |
| ComplianceProof of Innocence (PoI) | βE2E | β | β | β | β |
| Association Set Provider | βRunning | β | β | β | β |
| Selective Disclosure | βE2E | β | β | β | β |
| Range proofs (amount/time) | β | β | β | β | β |
| Audit nonce binding | β | β | β | β | β |
| AdvancedPartial withdrawals | βE2E | β | β | βnative | β |
| Anti-coercion (dual nullifier) | βE2E | β | β | β | β |
| ZKML integration | βHalo2 | β | β | β | β |
| Gasless withdrawals | β | β | β | β | β |
| ArchitectureDefense layers | 9 | 2 | 3 | 2 | 1 |
| ZK circuits | 4 | 1 | 2 | 1 | 1 |
| On-chain verifiers | 5 | 2 | 2 | 1 | 1 |
* Aztec Connect β sunset (ceased operations). β Tornado Cash β sanctioned by OFAC Aug 2022. Source: Table 12, ZK-Sentinel paper.
Related Work Analysis (Paper Β§11)
Zcash (Hopwood et al. 2016)[8]
Pioneered zk-SNARK-based privacy with shielded transactions. No coercion resistance β under duress, users must reveal viewing key and spending key.Monero (CryptoNote v2.0)[9]
Ring signatures + stealth addresses for privacy without trusted setup. Like Zcash, offers no defense against physical coercion.Tornado Cash (Pertsev et al. 2019)[6]
Fixed-denomination deposits/withdrawals using Groth16. Effective for unlinkability but no coercion resistance. Sanctioned by OFAC Aug 2022.Railgun (2022)[7]
Shielded transfers within Ethereum using UTXO-based privacy. Supports arbitrary amounts and tokens but remains vulnerable to physical coercion.Aztec Connect (2023)[19]
Programmable privacy through encrypted smart contracts. Complexity increases attack surface. No explicit anti-coercion. Sunset β ceased operations.0xbow Privacy Pools (2024)[11]
Implements Buterin et al.'s Privacy Pools on mainnet with binary inclusion/exclusion proofs. ZK-Sentinel extends this paradigm adding coercion resistance, selective disclosure, and ZKML.Coercion-Resistant Voting (Juels et al. 2005)[18]
Formalized coercion resistance for elections with 'fake credentials' producing valid-looking but ineffective votes. ZK-Sentinel adapts this concept to financial transactions β the dual nullifier = 'fake credential' that produces a valid but limited withdrawal.Key Differentiators (Paper Β§1.4 Contributions)
1. Dual-Logic ZK Circuit Architecture
First implementation of mathematically indistinguishable real/decoy selection within a zk-SNARK. Arithmetic selector without conditional branching. Formal proof that no information about the selected path leaks (Theorem 2).
2. ZKML for Coercion Detection
First integration of ML coercion detection within a zero-knowledge proof system. EZKL-compiled Halo2 circuits. Automatic behavioral analysis without revealing inputs, model weights, or decisions.
3. Privacy Pools + Selective Compliance
Extends Buterin et al. with PoI via ASPs, partial withdrawals (13,624 constraints) with private change generation, and selective disclosure (22,457 constraints) β amount ranges, time ranges, audit nonce binding.
4. Nine-Layer Defense Model
Defense-in-depth: 4 ZK circuits, 5 on-chain verifiers, 4 multi-denomination pools, gasless withdrawals via cryptographically-bound relayers, 6 privacy infrastructure invariants, and sustainable fee model (89/8/3).
βΉοΈ ZKML β First Application to Financial Privacy (Paper Β§11.4)
Prior ZKML work (Kang et al. 2022) focused on proving inference correctness for classification and regression tasks. ZK-Sentinel represents the first application of ZKML to coercion detection and the first integration with financial privacy protocols.