

Introducing ZK-Email A Trusless Bridge Between Web2 Web3
How Email Protocols are Working? Email protocols use DKIM for integrity assurance. This authentication method prevents Email spoofing. DKIM employs an RSA key pair, similar yet distinct from Web3 key algorithms. The Email sender’s server uses a private key to generate a unique digital signature for each Email, which is then attached to the Email’s header. The recipient’s server uses the sender’s public key, available in DNS records, to verify this signature. A matching signature confirms the Email’s authenticity and integrity, thus improving Email security. To enable this, each Email has;- Signature
- Message
- A Public Key

How does it work?

- Users sign a message with sending an Email addresses.
- The signed message, along with its signature and the public key, is sent to a prover.
- The prover verifies the DKIM signature of the Email and then generates a Zero Knowledge proof from this data.
- This ZK proof is verified on the blockchain, establishing the Email-based account identity for use.