Credencial
Logo

ZK-Access

Own your proofs. Share only what matters.

We use zkEmail and zkPassport as proof sources, turning them into persistent, composable credentials—so you can selectively disclose claims through fresh zk proofs.

How it works

  • We extract verified data —like job offers, sealed bids, age verification, or hackathon wins— from zk proofs.
  • These data are signed and structured into a modular identity that can live on-device or on private-by-default blockchains.
  • Each claim in your identity lets you generate new zk proofs to selectively verify that specific data—without exposing anything else.