Skip to content
This repository was archived by the owner on Jul 30, 2025. It is now read-only.

Commit 7e9ac44

Browse files
authored
Replace zkSummit video with overview slides in "How keyless works" (#801)
1 parent 03e8390 commit 7e9ac44

File tree

2 files changed

+10
-2
lines changed

2 files changed

+10
-2
lines changed

apps/nextra/pages/en/build/guides/aptos-keyless/how-keyless-works.mdx

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,11 @@ import { YouTube } from "@components/index";
77

88
Aptos Keyless enables a dApp to **derive** and **access** a blockchain account for a user who successfully signed in to the dApp via an OIDC provider (e.g., Google). Importantly, this blockchain account is **scoped to the dApp**. This means other dApps, who can similarly sign-in the same user, via the same OIDC provider, are not able to access this account and instead get their own account.
99

10-
_But how does this work?_
10+
_But how does this work?_
1111

12-
<YouTube title="Keyless Presentation" id="sKqeGR4BoI0"/>
12+
This article will explain the full keyless flow depicted below, from the user first signing into a dapp, to obtaining her zero-knowledge proof and to, finally, transacting on-chain.
13+
14+
![Keyless overview](/docs/aptos-keyless/keyless-overview.png "Keyless overview")
1315

1416
## Overview
1517

@@ -88,3 +90,9 @@ The previous flow explained how a dApp can obtain a ZKP from the prover service.
8890
**Step 2**: The dApp sends the TXN, the ZKP $\pi$, the ephemeral public key $\mathsf{epk}$, and the ephemeral signature $\sigma_\mathsf{eph}$ to the blockchain validators.
8991

9092
**Step 3**: To check the TXN is validly-signed, the validators perform several steps: (1) check that $\mathsf{epk}$ has not expired, (2) fetch the user’s address $\mathsf{addr}$ from the TXN, (3) verify the ZKP against $(\mathsf{addr}, \mathsf{epk}, \mathsf{GPK})$, and (4) verify the ephemeral signature $\sigma_\mathsf{eph}$ on the TXN against the $\mathsf{epk}$. If all these checks pass, they can safely execute the TXN.
93+
94+
## Want more?
95+
96+
The key ideas behind keyless accounts are also explained in this 20 minute presentation below.<br />
97+
98+
<YouTube title="Keyless Presentation" id="sKqeGR4BoI0"/>
787 KB
Loading

0 commit comments

Comments
 (0)