
PoneglyphDB-Inspired Architecture for Identity and Compliance
PoneglyphDB shows how to:
Zakapi takes this pattern and applies it to identity and risk data:
You don’t just “trust the API”. You verify with math over a defined schema, with proofs that can be independently checked.
Zero-Knowledge Cryptography Libraries (the “SQL circuit layer”)
We assemble open ZK toolchains to express identity and risk policies as PoneglyphDB-style circuits:
Circom & SnarkJS / Rapidsnark
What they are:
Circom: a leading open-source language for ZK circuits.
SnarkJS: JS/WASM prover/verifier; Rapidsnark: high-performance C++ prover.
How we use them (PoneglyphDB alignment):
We encode many policies as Circom circuits that mirror SQL predicates and joins:
Age thresholds (WHERE age ≥ 18),
Risk thresholds,
Membership in a “sanctions screened” table,
Combinations of credential tables (joins).
These circuits use custom gadgets analogous to Poneglyph’s range and join gates.
SnarkJS and Rapidsnark generate proofs non-interactively; verifiers can run inside browsers or backend services.
Halo2
What it is:
A Rust implementation of a PLONKish proving system supporting recursion and custom gates.
Our usage:
Halo2 is our backbone for complex, multi-credential proofs that look like multi-table SQL joins and aggregates.
We adopt Ethereum Foundation’s KZG-backed variants, enabling commitment schemes similar to those in PoneglyphDB.
Recursive proofs let us compose multiple identity queries into a single compact proof, much like composing multiple SQL subqueries.
Noir (Aztec)
What it is:
A high-level ZK programming language for writing circuits more like normal code.
Our plans:
We prototype policy templates in Noir that correspond to parameterized SQL queries over identity tables.
This keeps circuits portable across proof systems and makes authoring more accessible to developers comfortable with SQL.
STARK frameworks (Plonky2, Starky, etc.)
Role in the stack:
STARK-based frameworks help with high-throughput, audit-log–style proofs, such as:
“This monthly audit report faithfully summarizes all proof events,”
“These risk metrics are correctly computed from the raw event log.”
They echo the Poneglyph idea of committing to a large dataset and proving aggregate queries, but focused on logs and telemetry.
Security Testing Tools & zkFuzz
We integrate tools like zkFuzz into CI to fuzz-test circuits—similar to stress-testing SQL query circuits in PoneglyphDB—so we catch vulnerabilities and constraint mis-specifications early.
Why open-source ZK matters:
Like PoneglyphDB, Zakapi relies on publicly vetted math and implementations. You can inspect how we encode identity policies into circuits, how we commit to datasets, and how proofs are constructed—no black-box cryptography.
SSI & Wallet Frameworks (the “data and schema layer”)
PoneglyphDB assumes structured tables and schemas. Zakapi provides those schemas via open identity standards:
W3C Verifiable Credentials & DIDs – define the tables and rows of your identity domain.
Hyperledger Aries (wallets and agents) – provide standard protocols for secure issuance and presentation.
Indy / AnonCreds, OIDC, SAML, DIDComm – ensure your “identity tables” are interoperable across ecosystems and legacy systems.
In practice:
A university degree VC is a row in a Degrees table.
A KYC check VC is a row in a KycResults table.
Proofs then act like PoneglyphDB queries:
SELECT EXISTS(...) FROM KycResults WHERE subject = user AND status = 'PASS' AND issued_at > NOW() - 30 days.
Zakapi compiles this into a circuit and produces a non-interactive proof, verifiable by any relying party that understands the schema and holds the commitment.
Integration with Identity Sources & KYC Providers (filling the tables)
Zakapi doesn’t replace existing identity systems—it normalizes them into committed tables:
Government eID (Aadhaar, BankID, SingPass, UAE Pass, eIDAS/EUDI)
Telco-based Mobile Connect
Commercial KYC/AML providers (Onfido, Trulioo, Jumio, ShuftiPro)
Sanctions and PEP screening, credit bureaus, and more
Each integration becomes a table or view in the Zakapi “identity database”:
GovernmentID, BankKYC, SanctionScreening, CreditScoreBand, etc.
These tables feed the PoneglyphDB-style circuits:
joins between providers,
range checks on scores or dates,
group-bys or counts for behavioral rules.
The output is always: reusable, zero-knowledge credentials and proofs, not raw API responses.