veda.ng
Essays/Programmable Trust

Programmable Trust

Zero-knowledge proofs verify without revealing. Trusted execution environments create hardware-enforced privacy.

Vedang Vatsa·July 25, 2025·10 min read
Infographic
The Core Thesis

Trust has historically been provided by institutions: banks, courts, notaries, regulators. These institutions verify identity, enforce contracts, and mediate disputes. Each one adds cost, latency, and a point of failure. Programmable trust replaces institutional verification with mathematical proof: cryptographic techniques that allow parties to verify facts about each other without revealing the underlying data and without trusting a third party. The shift is from "show me everything so I can trust you" to "give me a mathematical proof that the relevant fact is true."

The Verification Problem

The internet was built for communication, not verification. TCP/IP, HTTP, and SMTP were designed to move data packets reliably from sender to receiver. They say nothing about whether the sender is who they claim to be, whether the data is true, or whether the transaction is legitimate. Every layer of verification that exists on the internet today, passwords, SSL certificates, KYC checks, credit scores, was retrofitted onto an infrastructure that has no native concept of trust.

$0
Data revealed in a ZKP transaction
Cryptographic property
$28B
TVL in ZK-rollups (late 2025)
95%
Ethereum throughput handled by L2s
Binance Research
$1.8B
Smart contract audit market (2025)
Dataintelo

The consequences are measurable. To open a bank account, you disclose your full name, address, date of birth, social security number, employment history, and sometimes tax returns. To rent an apartment, you provide pay stubs, bank statements, and employer references. To get a mortgage, you expose your complete financial history going back years. Each disclosure creates a data liability: a record that can be breached, leaked, sold, or subpoenaed. The Equifax breach of 2017 exposed the personal data of 147 million Americans precisely because the institutional trust model requires the aggregation of sensitive data in centralized databases.

Programmable trust inverts this model. Instead of disclosing data and trusting the recipient to protect it, you provide a mathematical proof that a specific property of your data is true, without revealing the data itself. The recipient gets higher-confidence verification (mathematics is harder to forge than documents) with zero data liability (they never possess the underlying information).

The gap between these two models is not marginal. It is structural. And the cryptographic primitives that enable programmable trust have moved from theoretical computer science papers to production systems processing billions of dollars in value.

The Four Primitives

Programmable trust is built on four cryptographic primitives, each addressing a different aspect of the verification problem.

Zero-Knowledge Proofs (ZKPs)

A zero-knowledge proof allows one party (the prover) to convince another party (the verifier) that a statement is true, without revealing any information beyond the truth of the statement itself. The concept was formalized by Goldwasser, Micali, and Rackoff in 1985, but practical implementations have only become viable in the last decade.

Practical examples: prove you are over 21 without revealing your date of birth. Prove your bank balance exceeds $100,000 without revealing your actual balance. Prove you hold a valid medical license without revealing your home address. Prove your code executes correctly without revealing the code itself.

zkSNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge) and zkSTARKs are the two dominant implementations. zkSNARKs produce smaller proofs and verify faster, but require a trusted setup ceremony: a one-time process that generates public parameters using secret randomness that must be destroyed. If the secret randomness is compromised, the entire system can be exploited. zkSTARKs avoid this vulnerability entirely: they require no trusted setup and are resistant to quantum computing attacks, but produce larger proofs.

The Ethereum network uses ZK technology at scale through ZK-rollups: Layer 2 scaling solutions that bundle hundreds or thousands of transactions, generate a ZK proof that all transactions are valid, and submit only the proof to the main chain. zkSync, StarkNet, Polygon zkEVM, Scroll, and Linea collectively held over $28 billion in TVL by late 2025 and handled approximately 95% of Ethereum's total transaction throughput. ZK proof generation costs fell by roughly 90% during 2025, driven by GPU acceleration, specialized hardware for cryptographic operations (MSM/NTT), and competitive third-party proving marketplaces like RISC Zero and Succinct.

Trusted Execution Environments (TEEs)

A TEE is a hardware-enforced secure enclave within a processor: a protected area of memory and computation that even the operating system and system administrator cannot access. Data processed inside a TEE is encrypted at rest, in transit, and in use. This is the critical distinction: conventional encryption protects data when stored and when transmitted, but requires decryption for processing. TEEs eliminate this gap.

Intel SGX, AMD SEV, Apple's Secure Enclave, and ARM TrustZone are deployed in billions of devices worldwide. Your iPhone stores biometric data (Face ID, Touch ID) in a Secure Enclave that the main processor cannot access. Even Apple cannot extract this data. AWS Nitro Enclaves extend this model to cloud computing, allowing sensitive workloads to run in isolated environments where even Amazon, the cloud operator, cannot inspect the computation.

The application to programmable trust is direct: competing companies can pool sensitive data inside a TEE, compute joint analytics (fraud detection across multiple banks, for example), and receive only the aggregate results. No party sees the other's raw data. The trust is in the silicon, not in a contract or a handshake.

Multi-Party Computation (MPC)

MPC allows multiple parties to jointly compute a function over their combined inputs without any party learning the other parties' inputs. The theoretical foundation was established by Andrew Yao's "Millionaires' Problem" in 1982: two millionaires want to determine who is wealthier without either revealing their net worth.

Practical application: three hospitals want to determine which has the best treatment outcomes for a specific condition. They cannot share patient data due to HIPAA and GDPR regulations. MPC allows them to compute the answer jointly. Each hospital provides encrypted inputs, the computation produces the correct ranking, and no hospital sees any other hospital's data.

Fireblocks uses MPC for institutional cryptocurrency custody, splitting private keys across multiple parties and geographic locations. Transactions require the coordinated participation of multiple keyholders, and no single party ever possesses the complete key. Chainlink's DECO protocol combines MPC with ZKPs to allow smart contracts to verify data from standard web servers (bank balances, age, employment status) without revealing the underlying data or user credentials. This "selective disclosure" of off-chain facts to the blockchain is one of the most practically important applications of programmable trust.

Fully Homomorphic Encryption (FHE)

FHE represents the most ambitious primitive: performing arbitrary computations on encrypted data without ever decrypting it. First demonstrated as theoretically possible by Craig Gentry in his 2009 Stanford PhD thesis, FHE remained impractically slow for over a decade, with encrypted operations running millions of times slower than their plaintext equivalents.

By 2025, companies like Zama have developed FHE compilers that allow standard code to be converted into FHE-compatible operations, dramatically reducing the engineering complexity. Microsoft SEAL, an open-source library supporting BFV, BGV, and CKKS encryption schemes, provides the mathematical foundation. The technology is transitioning from pure research to early commercial deployment in privacy-preserving machine learning (performing model inference on encrypted patient data without the model provider ever seeing the data) and secure cloud analytics.

FHE remains the least mature of the four primitives, with performance orders of magnitude slower than plaintext computation, but the trajectory is encouraging: performance has been improving at roughly 10x per year, and hardware acceleration through FPGAs and ASICs is an active area of development.

Programmable Trust Primitives

Four cryptographic technologies replacing institutional trust

Zero-Knowledge ProofsZKP
85% mature
Trust basis: Mathematics
Privacy: Full
Speed: Fast verify / slow prove
Deployed: ZK rollups ($28B TVL), identity, DeFi
Trusted Execution Env.TEE
80% mature
Trust basis: Hardware
Privacy: Hardware-enforced
Speed: Near-native
Deployed: Cloud, mobile, 3.5B+ Apple devices
Multi-Party ComputationMPC
65% mature
Trust basis: Protocol
Privacy: Distributed
Speed: Slower (comms overhead)
Deployed: Custody (Fireblocks), joint analytics
Fully Homomorphic Enc.FHE
30% mature
Trust basis: Mathematics
Privacy: Full (compute on encrypted)
Speed: Very slow (improving)
Deployed: Research, early commercial (Zama)

Maturity estimates are directional, based on production deployments and industry adoption. FHE performance improving ~10x annually.

The shift from institutional trust to programmable trust is not about eliminating intermediaries. It is about replacing intermediaries that require data disclosure with mathematical proofs that require none. The trust is stronger: mathematics is harder to corrupt than institutions. And the privacy cost is zero.

The Cost of Code-as-Trust

Programmable trust is not without its own failure modes. When trust is encoded in software, the attack surface shifts from human corruption to code vulnerability. The history of DeFi is a history of this tradeoff.

Between 2020 and 2025, estimated losses from smart contract exploits, bridge hacks, and operational security failures exceeded $12 billion. The year 2025 alone saw an estimated $2.9 to $4 billion in losses, dominated by the Bybit supply-chain attack ($1.4 billion), which compromised signing infrastructure rather than contract code. The Kelp DAO and Drift Protocol exploits in early 2026 further demonstrated that even audited protocols with professional security reviews remain vulnerable to complex, multi-vector attacks.

The smart contract audit market has grown to approximately $1.8 billion (2025), with projections reaching $7.6 billion by 2034. But a recurring pattern in 2025 was that many exploited protocols had previously undergone professional security audits. The lesson is that traditional point-in-time code audits are necessary but insufficient for complex, highly composable DeFi systems. The industry is moving toward continuous, integrated security: real-time monitoring, formal verification, and AI-powered vulnerability detection alongside human expert review.

The Cost of Code-as-Trust

Annual losses from smart contract exploits and DeFi hacks ($B)

2020
$0.1B
2021
$1.3B
$1.3B
2022
$3.8B
$3.8B
2023
$1.7B
$1.7B
2024
$2.2B
$2.2B
2025
$3.5B
$3.5B

2025 breakdown: Bybit supply-chain attack ($1.4B), Kelp DAO exploit, Drift Protocol hack. DeFi accounted for ~63% of all incidents. The smart contract audit market reached $1.8B.

Sources: SlowMist, Halborn, CryptoRank. 2025 estimates range $2.9-4B depending on methodology. Includes bridge exploits and operational security failures.

The Application Stack

Programmable trust enables transaction types that are structurally impossible with institutional trust, because they require verification without disclosure.

Private identity verification. A credential issuer (government, university, employer) signs a verifiable credential conforming to the W3C Verifiable Credentials specification. The holder stores it in a digital wallet. When verification is needed, the holder generates a ZKP proving a specific property (age, degree, employment status) without revealing the credential itself. No central database is queried. No personal data is transmitted. The EU's eIDAS 2.0 regulation mandates that all 27 Member States provide compliant EUDI Wallets to citizens by December 31, 2026, with regulated private services required to accept them by late 2027. This is the first sovereign mandate for selective-disclosure identity at continental scale: 450 million citizens with ZKP-compatible digital wallets.

Confidential DeFi. Current DeFi protocols operate on public blockchains where all transaction data is visible. Aztec and Aleo are building privacy-preserving DeFi protocols where transaction amounts, sender/receiver identities, and asset types are hidden behind ZKPs while maintaining the verifiability that DeFi requires. This addresses a fundamental barrier to institutional DeFi adoption: no hedge fund will execute a $50 million trade on a ledger where every competitor can see its positions in real time.

Regulatory compliance without disclosure. A financial institution can prove to a regulator that it meets capital adequacy requirements, conducts proper KYC/AML screening, and follows sanctions protocols, all using ZKPs, without revealing the underlying customer data. The regulator gets the assurance it needs. The customers retain their privacy. The institution reduces its data liability. Chainlink's DECO protocol is specifically designed for this use case: proving attestations about off-chain data to on-chain systems.

Supply chain verification. A manufacturer can prove its supply chain meets environmental or labor standards (through TEE-secured audit data) without revealing supplier identities, contract terms, or production volumes: information that competitors could exploit.

Cross-border payments. The correspondent banking system processes roughly $28 trillion in annual cross-border payment flows through a chain of intermediaries, each adding cost and delay. Stablecoin transfers with ZKP identity attestations could reduce settlement from days to seconds while maintaining regulatory compliance, without requiring the sender's full financial history to traverse multiple jurisdictions.

Programmable Trust Application Domains

From data exposure to proof-based verification

Private identity (KYC)75%
Now: Full document disclosureZKP: prove age/status without data
Confidential DeFi55%
Now: All transactions publicAztec/Aleo: hidden amounts and parties
Regulatory compliance40%
Now: Full audit accessZKP attestations: prove compliance, no data
Supply chain audit50%
Now: Supplier data exposedTEE-secured audit with aggregate only
Medical referrals35%
Now: Full patient recordVC: prove relevant diagnosis only
Cross-border payments60%
Now: Correspondent banking ($28T)Stablecoin + ZKP identity attestation

Readiness estimates are directional, based on production deployments and regulatory progress. Private identity is most mature due to EU eIDAS 2.0 mandate.

The Regulatory Catalyst

The EU's eIDAS 2.0 regulation represents a paradigm shift in how governments approach digital identity. Rather than building centralized identity databases (the model that produced Equifax-scale breaches), eIDAS 2.0 mandates a decentralized, user-controlled architecture where citizens store credentials in personal wallets and selectively disclose specific properties through cryptographic proofs.

The technical architecture of the EUDI Wallet is designed around the principles of programmable trust. The wallet supports W3C Verifiable Credentials, enabling interoperability across issuers and verifiers. It implements selective disclosure, allowing users to prove specific claims (age verification, nationality, professional qualifications) without revealing unnecessary data. It includes support for Qualified Electronic Signatures (QES), creating legally binding digital signatures from a smartphone.

The regulatory mandate creates a forcing function for adoption that purely market-driven approaches have lacked. When banks, telecoms, and healthcare providers are legally required to accept ZKP-based identity attestations, the infrastructure investment follows. The EU's 450 million citizens represent the first continental-scale deployment of programmable trust principles in a regulated context.

The Regulatory Path to Programmable Identity

EU eIDAS 2.0 mandates selective disclosure wallets for 450M citizens

2014
eIDAS 1.0: EU electronic identification framework
2017
W3C publishes DID Core specification (draft)
2022
W3C Verifiable Credentials v2.0 recommendation
2024
eIDAS 2.0 regulation enters into force
2026
EU Member States must provide EUDI Wallets (Dec 31)
2027
Regulated services must accept EUDI Wallets

Sources: EU Official Journal (eIDAS 2.0), W3C (VC/DID specs). EUDI Wallet supports selective disclosure (ZKP-compatible), qualified electronic signatures, and cross-border interoperability.

The Trust Stack

The trajectory is toward a layered trust stack that combines all four primitives into a unified verification infrastructure.

Layer 1: Hardware trust. TEEs provide the physical security boundary. Data enters and exits encrypted. Processing occurs inside tamper-proof enclaves. Intel SGX, AMD SEV, Apple Secure Enclave, and AWS Nitro Enclaves establish the foundation.

Layer 2: Cryptographic verification. ZKPs provide mathematical proof of facts. No data is revealed. No third party is required. FHE enables computation on encrypted data for use cases requiring full data privacy throughout the processing pipeline.

Layer 3: Protocol coordination. MPC allows multiple parties to compute joint results without sharing inputs. Cross-chain bridges, sequencers, and data availability layers coordinate state across multiple verification systems.

Layer 4: Application logic. Smart contracts, identity wallets, DeFi protocols, and supply chain systems built on top of the trust stack, inheriting its privacy and verification properties.

The Trust Stack

Four layers replacing institutional verification

L4Application Logic

Inherits trust properties from lower layers

Smart contractsIdentity walletsDeFi protocolsSupply chain
L3Protocol Coordination

Multi-party computation without input disclosure

MPCCross-chain bridgesSequencersDA layers
L2Cryptographic Verification

Mathematical proof of facts, zero data revealed

ZKPszkSNARKs/STARKsDigital signaturesFHE
L1Hardware Trust

Physical security boundary, tamper-proof enclaves

Intel SGXAMD SEVApple Secure EnclaveARM TrustZone

Architecture is directional. Each layer adds trust guarantees. Applications at L4 inherit privacy and verification properties from all lower layers.

The collective effect is transformative: transactions that currently require extensive data disclosure (mortgage applications, insurance claims, medical referrals, background checks, cross-border payments) can be restructured around proof rather than exposure. The applicant does not reveal their entire financial history. They prove specific properties of it, mathematically, and the verifier has higher confidence in the proof than they would in a stack of disclosed documents, because mathematics is harder to forge than paper.

Institutional vs. Programmable Trust

The structural advantages of mathematical verification

DimensionInstitutionalProgrammableAdvantage
Verification speedDays to weeksMilliseconds to seconds10,000x+
Data disclosedFull financial/personal historyZero (ZKP) to minimal100% reduction
Corruption riskHuman (bribery, error, bias)Code (bugs, exploits)Different risk profile
AvailabilityBusiness hours / jurisdiction24/7/365 (100% uptime)5-7x more hours
Cost per verification$50-5,000 (lawyer, notary)$0.004-0.10 (L2 tx)1,000-50,000x cheaper
Cross-borderTreaties, extradition, conflict of lawsBorderless by defaultNo jurisdictional friction

L2 transaction costs from L2Beat (late 2025). Institutional costs estimated from legal/notary fee schedules. Uptime from Ethereum 10-year track record.

Key Takeaway

Programmable trust replaces institutional verification (banks, courts, notaries) with mathematical proof. Four primitives enable this: Zero-Knowledge Proofs (verify facts without revealing data, $28B TVL in ZK-rollups), Trusted Execution Environments (hardware-enforced enclaves in billions of devices), Multi-Party Computation (joint computation without input disclosure, used by Fireblocks and Chainlink DECO), and Fully Homomorphic Encryption (compute on encrypted data, early commercial via Zama and Microsoft SEAL). The EU's eIDAS 2.0 mandates ZKP-compatible digital identity wallets for 450 million citizens by December 2026, the first sovereign-scale deployment of programmable trust. The cost of code-as-trust is real: $12B+ lost to smart contract exploits since 2020, driving the audit market to $1.8B. But the structural advantages (millisecond verification, zero data disclosure, 24/7 availability, borderless operation) represent an irreversible shift from trust-through-exposure to trust-through-proof.