
Briefing
The research addresses the fundamental conflict between data utility and user privacy, specifically the challenge of exporting trusted facts from an encrypted Transport-Layer Security (TLS) channel without exposing the underlying data or browsing history. The foundational breakthrough is DiStefano, an efficient, maliciously-secure framework that integrates Two-Party Computation (2PC) directly into the TLS 1.3 handshake to secret-share session keys between the client and a designated verifier. This novel mechanism allows the client to generate private commitments over the encrypted web traffic, which can then be used to construct arbitrary zero-knowledge proofs over the committed data, ensuring data integrity and user privacy simultaneously. The most important implication is the creation of a trustless cryptographic primitive for compliant, privacy-preserving credentialing and data attestation, fundamentally enabling verifiable identity and facts derived from sensitive web interactions to be used on-chain or in regulated environments.

Context
Before this research, exporting trusted information, such as proof of age or accepted purchase details, from an authenticated and encrypted channel secured by TLS was non-trivial and often required compromising user privacy. Prevailing solutions, such as Designated-Commitment TLS (DCTLS) protocols, were often complex, lacked modularity for arbitrary claims, and introduced significant trust assumptions or performance overhead, forcing a difficult trade-off between data utility for third-party verification and the client’s fundamental right to browsing history privacy. This limitation constrained the development of decentralized identity systems that rely on real-world, verified credentials.

Analysis
DiStefano’s core mechanism re-architects the TLS 1.3 handshake into a three-party protocol involving the client, the server, and a designated verifier. The new primitive is a modified TLS handshake where the client and verifier use Two-Party Computation (2PC) to jointly compute and secret-share the cryptographic session keys. This ensures neither the client nor the verifier ever possesses the complete key material, preserving confidentiality. The client then authenticates the server using a Zero-Knowledge Proof of Valid Signatures (ZKPVS) and commits the encrypted server response to the verifier.
By subsequently receiving the verifier’s key share, the client can decrypt the message and generate a zero-knowledge proof (ZKP) over a specific data point within the message (e.g. proving ‘age > 18’), which the verifier can confirm without ever seeing the full encrypted content or the client’s browsing history. This method fundamentally differs by moving the commitment and proof generation inside the encrypted channel flow, rather than attempting to prove facts after decryption.

Parameters
- Online Phase Execution Time ∞ < 1 s (less than one second). This is the time required for the client and verifier to execute the complete online phase of the protocol, demonstrating practicality for real-time web use.
- Online Phase Communication Overhead ∞ ≤ 80 KiB (kilobytes). This is the maximum data transfer required for the client and verifier to complete the online phase, indicating a low bandwidth cost.
- Underlying Cryptographic Primitive ∞ Two-Party Computation (2PC). This technique is used to secret-share the TLS session keys between the client and the verifier, ensuring no single party has the complete decryption key.

Outlook
This framework opens a new avenue for decentralized identity and regulatory compliance by providing a mechanism to bridge trusted off-chain data sources with on-chain verifiable computation. Future research will focus on optimizing the generation of the final zero-knowledge proofs over the committed data, potentially enabling non-interactive, succinct proofs of arbitrary data structures like JSON. In the next 3-5 years, this primitive could be integrated into decentralized identity systems and zero-knowledge rollups, allowing users to privately attest to real-world financial or legal status for on-chain interactions, effectively creating a “private oracle” for web data.

Verdict
DiStefano provides the foundational cryptographic primitive required to securely bridge the private web with verifiable decentralized systems, resolving the core conflict between data utility and user privacy.
