Closed lakshya-dhariwal closed 4 months ago
Hello lakshya-dhariwal,
Thank you for your Grant application! Our team will review and add comments in your issue! In the meantime:
Hi @lakshya-dhariwal That's a great proposal, thank you!
We're curious in getting more information on the design of your solution, as it's not clear to us how you plan to evalute a hash function in FHE. We're also happy to jump into a call. Can you share with us some availabilities at bounty@zama.ai ? Talk soon, Cheers JZ
Hey @zaccherinij Here is some more content to make it clear.
Documentation we are working on - https://fluf-id.gitbook.io/docs https://fluf-id.vercel.app/
how you plan to evaluate a hash function in FHE
How the grant will help us?
We plan on working on an ecosystem of solutions related to FHE and identity. This 2FA system is the first part we are working on. We have already made some progress towards the initial milestones. This grant would not just help out with the development of this project but also serve us in continuing to build FHE solutions.
Contact
I am sharing a calendar link on the provided mail but feel free to connect via telegram as well for faster communication. telegram - @lakshyadhariwal Cheers
Hey @zaccherinij do you have any other questions or concerns?
Hi @lakshya-dhariwal,
Thank you very much for your interest in what we do at Zama, and your proposition for a grant. For now, we will not follow up with your proposition. But we invite you to keep an eye on this repository as we will launch new bounties soon, if you're interested in playing with Zama libs.
Cheers, JZ
Zama Grant Program: Application
On-Chain 2FA system utilizing passkeys and fhEVM
Description:
We propose to develop a comprehensive on-chain 2FA solution that leverages FHE on fhEVM to generate and verify TOTP codes in a privacy-preserving manner. This will allow decentralized applications to implement robust two-factor authentication without relying on centralized services or exposing user secrets. The key innovation lies in using FHE to perform encrypted operations on the user's secret key, enabling on-chain TOTP generation and verification without ever decrypting the key. This enhances security and aligns with the core principles of decentralization and user sovereignty.
Application Flow: