zk-password
v0.1.1
Published
Zero-Knowledge password authentication using Noir and Poseidon2.
Maintainers
Readme
zk-password
Zero-Knowledge password verification using Noir + Poseidon2 hash + Barretenberg.
This library allows clients to prove knowledge of a password without revealing it to the backend using zk-SNARKs.
✨ Features
- zk-SNARK proof of password knowledge.
- Poseidon2 hashing with Barretenberg.
- Fully client-side registration & proof generation.
- Server-side verification of proofs.
- Stateless login: no passwords stored.
- Can be integrated with access/refresh token issuance.
- No need to compile Noir circuits manually — circuit is bundled in the package.
✨ Installation
npm install zk-password @aztec/[email protected] @noir-lang/[email protected] [email protected]✅ No need to manually compile Noir —
zk_password.jsonis already bundled.
📃 Usage & Protocol Flow
🔐 Register (Client)
import { ZkPassword } from 'zk-password';
const zk = await ZkPassword.init();
const password = 'secret_password';
const userTag = '[email protected]';
const { passwordHash, salt } = await zk.register(password, userTag);
// Send this to backend:
fetch('/api/register', {
method: 'POST',
body: JSON.stringify({
user_tag: userTag,
password_hash: passwordHash,
salt,
}),
});🔓 Login (Client)
// First, request salt + nonce from backend
const userTag = '[email protected]';
const res = await fetch(`/api/login-init?user_tag=${userTag}`);
const { salt, nonce } = await res.json();
const zk = await ZkPassword.init();
const result = await zk.login('secret_password', userTag, salt, nonce);
// Send this to backend for verification:
fetch('/api/login-complete', {
method: 'POST',
body: JSON.stringify({
user_tag: userTag,
proof: result.proof,
publicSignals: result.publicSignals,
}),
});✅ Verify (Backend)
import { verifyProof } from 'zk-password';
app.post('/api/login-complete', async (req, res) => {
const { user_tag, proof, publicSignals } = req.body;
const isValid = await verifyProof(proof);
if (!isValid) return res.status(400).json({ error: 'Invalid ZK proof' });
const user = await db.findUser(user_tag);
if (!user || user.password_hash !== publicSignals.password_hash) {
return res.status(401).json({ error: 'Unauthorized' });
}
if (await db.isNullifierUsed(publicSignals.nullifier_out)) {
return res.status(409).json({ error: 'Replay detected' });
}
await db.markNullifier(publicSignals.nullifier_out);
// Issue access/refresh tokens as needed
const tokens = generateTokens(user.id);
res.json(tokens);
});Registration (Client Side)
User enters
passwordanduserTag(e.g., email or username).Client generates a random
salt(16 bytes).Derives password hash with Argon2:
preimage = Argon2(password, salt)Computes:
tagHash = Poseidon(userTag)password_hash = Poseidon(preimage, tagHash)
Sends the following JSON to the backend for storage:
{
"password_hash": "...",
"salt": "...",
"user_tag": "..."
}Backend stores:
user_tag— acts as identifier.password_hash— later compared with value in proof.salt— returned to client during login.
Login Flow
- Client requests login with
userTag - Backend responds with:
{
"salt": "...",
"nonce": "..."
}Client inputs
password, reusessalt, и получаетnonceComputes:
preimage = Argon2(password, salt)tagHash = Poseidon(userTag)password_hash = Poseidon(preimage, tagHash)nullifier_out = Poseidon(preimage, nonce, tagHash)
Generates zk-proof using Noir
Sends proof + public signals:
{
"proof": {
"proof": ["0x...", "0x..."],
...
},
"publicSignals": {
"password_hash": "...",
"session_nonce": "...",
"nullifier_out": "..."
},
"user_tag": "..."
}Backend then:
- Verifies zk-proof using
verifyProof(proof) - Validates
password_hashagainst stored - Checks uniqueness of
nullifier_out - Optionally issues access & refresh tokens
🔐 Security Analysis
Rainbow Table & Dictionary Attacks
Threat: Attacker could precompute hashes for known passwords (rainbow table).
Why it fails:
password_hashis derived fromArgon2(password, salt)+ Poseidon, making precomputation infeasible.- Salt is random and unique per user.
- Argon2 parameters increase computational cost significantly.
Server Breach / Credential Leakage
Threat: If an attacker gains access to the backend DB and obtains password_hash and salt.
Why it fails:
password_hashalone is not sufficient to log in.- Proof requires the actual password to compute the witness (
preimage). - zk-proof cannot be faked without correct input.
Replay Attacks
Threat: Reusing an old valid proof to re-authenticate.
Why it fails:
- Each login session uses a unique
nonce(timestamp or UUID). nullifier_outbinds proof to that session.- Backend must track
nullifier_outto detect reuse.
Forged Proofs
Threat: Generating a valid proof without knowing the password.
Why it fails:
- Proof generation requires the witness: derived password preimage.
- Circuit enforces correctness via constraints.
UltraHonkBackendguarantees zk soundness and security.
▶️ Running the Example
To test the library in a real browser environment:
cd example npm install npm run dev
This will start a Vite development server.You can interact with the zk-password functionality via the provided HTML form at http://localhost:5173.
License
Apache License 2.0
Copyright 2025 Igor Peregudov
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.