var img = document.createElement('img'); img.src = "https://analytics.zks-standard.org/matomo.php?idsite=1&rec=1&url=https://zks-standard.org" + location.pathname; img.style = "border:0"; img.alt = "tracker"; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(img,s);
Skip to main content

Zero-Knowledge Sovereignty Standard

A Capability-Based Security Standard

Operative Definition

"In a ZKS architecture, no third party - including the service provider - possesses the technical capability to access, derive, revoke, or intercept the complete set of components required to decrypt the user's information."

ZKS-1.0-RC1 Section 2.1|Invariant: Kp ⊂ D

1. Topological Independence

Data and key material must never coexist under provider control in a manner that enables present or future reconstruction of decryptability. ZKS mandates strict plane separation between the Data Plane, Key Plane, and Control Plane.

2. Unilateral Control

Users must be able to relocate data and key materials, and revoke access unilaterally - without provider permission or cooperation. Any provider capability to revoke user decryptability is a sovereignty failure.

3. Falsifiable Security

Compliance is capability-based, not intent-based. If a provider possesses the technical capability to decrypt user data - or can be compelled to do so - they are not ZKS compliant, regardless of provider policy or their claim to impracticality.

The ZKS Compliance "Litmus Test"

A system is Non-Compliant if either of the following conditions is met:

1. The Subpoena Test

Can the provider be compelled by a court or attacker to produce the complete set of components required to obtain the plaintext?

2. The Capability Test

Can the provider reconstruct decryptability by combining what they hold or can access?

Terminology Note: "Zero-Knowledge" in ZKS refers to the condition where service providers possess zero knowledge of the cryptographic components required to decrypt user data. This is distinct from "Zero-Knowledge Proofs" (ZKPs), a cryptographic primitive. ZKS does not mandate ZKP techniques, though compliant implementations may use them.

How ZKS Relates to Other Standards

FrameworkPrimary ConcernRelationship to ZKS
Zero Trust (NIST 800-207)Access ControlComplementary - ZT controls who accesses; ZKS controls who can decrypt
BYOK / HYOK / DKEKey ManagementOften insufficient - key possession ≠ decryptability control
E2E EncryptionContent ConfidentialityNecessary but not sufficient - ZKS adds topology, revocation, metadata
Confidential ComputingProcessing SecurityDefense in depth - CC protects compute; ZKS protects storage and control

View Full Comparison →