High Level User Stories

This chapter presents a high-level solution overview of the zkMe Network through long-form User Stories for the following zkMe Protocol Stakeholders:

The Holder (End User and Agent Principal)

The Holder wants to leverage owned off-chain and cross-chain Credentials (e.g., a government-issued ID card) to access permissioned or access-controlled services (e.g., permissioned yield pools) across any ecosystem. In the Agent Economy, the Holder also acts as the Agent Principal, delegating bounded authority to AI agents via the zkMe Vault.

The Holder’s primary goal is to reveal as little Personally Identifiable Information (PII) as possible and remain anonymous to prevent any party, including Issuers, Verifiers, Regulators, or any uninvolved third party, from benefiting from or abusing the link between their identity and their public service consumption patterns. When deploying agents, the Holder’s goal extends to ensuring their agents can execute tasks autonomously without exposing the Holder’s raw credentials or exceeding delegated limits.

Holder Priorities:

Priority
Metric
Description

1

Low PII Data Sharing

Minimize the amount of personal data shared during verification.

2

Low Time to Service

Reduce the average time it takes to onboard to a new permissioned service.

3

Granular Delegation Control

Ability to set, monitor, and instantly revoke specific spending limits and permissions for delegated AI agents.

Example Scenario

Alice holds a government-issued passport credential and wants her AI trading agent to participate in a permissioned DeFi yield pool that requires proof of non-US residency. Rather than sharing her passport with the agent or the protocol, Alice authorizes a time-limited, scope-restricted delegation through her SSI Wallet. The agent can prove Alice’s eligibility to the pool’s smart contract via a zero-knowledge proof, without ever seeing her passport data, her nationality, or any other personal detail beyond the boolean result “eligible: true.”

The Agent (Autonomous Actor)

The Agent is an autonomous AI system that operates on behalf of a human or legal entity principal. It needs to prove its identity, intent, capabilities, and authorization to access services, execute transactions, and interact with other agents or platforms.

The Agent’s primary goal is to act within its delegated authority while maintaining cryptographic proof of accountability to its principal (via the Agent Principal Credential), without ever holding the principal’s raw secrets, API keys, or PII in its own memory.

Agent Priorities:

Priority
Metric
Description

1

Zero Credential Exposure

Execute transactions and API calls without ever holding raw secrets or private keys in memory, relying on TEE enclaves instead.

2

Low Latency to Authorization

Minimize the time between intent formulation and compliant execution across diverse payment rails (e.g., x402, AP2).

3

High Interoperability

Present verifiable credentials (APC, ACC, AIC, ARC) seamlessly across diverse platforms, chains, and jurisdictions.

Example Scenario

A SaaS procurement agent is authorized by a startup’s CFO to evaluate and purchase software subscriptions up to $500/month. When a vendor’s API responds with a 402 Payment Required status, the agent routes the payment through the Agent Trust Gateway. The Gateway verifies the agent’s payment credential (a delegated allowance from the CFO), confirms the amount is within the authorized spending limit, and facilitates the stablecoin transaction inside a TEE enclave. The vendor receives payment confirmation alongside a verifiable proof that the agent is authorized by a real, KYC-verified entity, all without the agent ever accessing the CFO’s private keys or bank account details.

The Verifier (Service Provider)

The Verifier needs to perform user due diligence before onboarding a user to fulfill internal business needs (e.g., targeted service provision), reduce fraud (e.g., remove bots and duplicate accounts), manage jurisdictional restrictions (e.g., block services to residents of certain countries), or fulfill compliance requirements (e.g., enhanced customer due diligence).

In the Agent Economy, the Verifier must also perform Agent Due Diligence (zkKYA). They need to verify an incoming agent’s accountability (APC), safety certification (ACC), declared intent (AIC), and historical reputation (ARC) before granting it access to APIs, financial rails, or platform resources. The Verifier requires a solution that is fully decentralized, cost-effective, and secure against data misuse to comply with global data privacy regulations like GDPR.

Verifier Priorities:

Priority
Metric
Description

1

High Retention Rate

The proportion of users (and agents) who complete the verification process without dropping off.

2

Low Crossover Error Rate

The combined error rate of false-positive and false-negative user/agent verifications.

3

Low Fees per Verification

The cost-effectiveness of the verification service.

4

Instant Agent Underwriting

The ability to instantly verify an agent’s UBO compliance status and reputation score before authorizing a transaction.

Example Scenario

A decentralized exchange receives a trade request from an AI agent it has never seen before. Before executing the trade, the exchange’s smart contract challenges the agent for three proofs:

  1. an Agent Principal Credential proving the agent is accountable to a KYC-verified human,

  2. an Agent Safety Credential confirming the agent has passed a recognized safety audit, and

  3. a nullifier proving this is not a duplicate Sybil identity.

The agent constructs all three proofs automatically via the Agent Trust Gateway and submits them alongside the trade transaction. The exchange verifies the proofs on-chain in a single transaction, grants access, and executes the trade, all within seconds and without any human intervention on either side.

The Regulator

The Regulator aims to protect Holders within its jurisdiction from accessing unregistered financial services to shield them from non-transparent risks. In the context of autonomous finance, the Regulator seeks to ensure that machine-to-machine transactions do not become a black box for money laundering or market manipulation.

The Regulator requires the ability to recover the real identity of a Holder, or the Ultimate Beneficial Owner (UBO) behind an autonomous AI agent, in case formal bad actor proceedings are initiated against them. They rely on immutable audit trails and cryptographic bindings (like the APC) to maintain market integrity.

Regulator Priorities:

Priority
Metric
Description

1

UBO Traceability

The ability to recover the real identity behind any wallet or agent when formal legal proceedings are initiated, via the cryptographic binding in the Agent Principal Credential.

2

Immutable Audit Trail

Tamper-proof, cryptographically anchored records of all verification events, agent authorizations, and delegation changes.

3

Jurisdictional Enforcement

The ability to enforce geographic and regulatory restrictions on service access without relying on centralized gatekeepers or mass surveillance.

Example Scenario

A financial regulator receives a suspicious activity report involving a series of high-frequency trades executed by an AI agent across multiple DeFi protocols. Using the immutable audit trail recorded on-chain, the regulator traces the agent’s Agent Principal Credential back to its UBO. The APC’s cryptographic binding, combined with the zkMe FHE-protected biometric anchor, allows the regulator to initiate a formal identity recovery process through the appropriate legal channel, without compromising the privacy of any uninvolved users in the system.

The Credential Issuer

The Credential Issuer is responsible for generating and distributing verifiable credentials to Holders and Agents. It represents the starting point of the credential lifecycle within the zkMe Protocol. In the Agent Economy, Issuers expand beyond traditional KYC providers to include third-party AI auditors, reputation scoring oracles, and intent verification networks.

A Credential Issuer can operate in two models:

Issuer Model
Description

Centralized Issuer

A trusted entity (e.g., a government agency, financial institution, or accredited AI safety auditor) that directly issues Credentials recognized as reliable and compliant.

Decentralized Issuer

A programmatic bridge to an external trusted entity that is not natively part of the zkMe Protocol, enabling automatic Credential issuance without a new centralized intermediary (e.g., aggregating on-chain agent behavior into an ARC score).

Issuer Priorities:

Priority
Metric
Description

1

Credential Integrity

Ensure every issued credential is cryptographically tamper-proof and bound to a verified identity or audited agent.

2

Data Minimization

Issue credentials containing only the minimum attributes required for downstream verification, reducing liability in case of breach.

3

Revocation Responsiveness

The ability to instantly revoke compromised or fraudulent credentials, propagating revocation across all delegate copies and chains.

Example Scenario

An AI safety auditing firm completes a behavioral assessment of a new trading agent. The firm acts as a Decentralized Issuer, generating an Agent Capability Credential (ACC) that attests to the agent’s safety score, tested failure modes, and maximum recommended transaction limits. The credential is signed with the firm’s BabyJubJub key and anchored to the on-chain State Contract. If the agent later exhibits anomalous behavior and the firm revokes the ACC, every Verifier that checks the agent’s credential will immediately see the revocation reflected in the State Contract, preventing the agent from accessing any further permissioned services.

Stakeholder Interaction Summary

The five stakeholders form an interconnected trust network. The following table summarizes the primary interactions between each pair:

Interaction
Description

Holder to Agent

The Holder delegates bounded authority to the Agent via the zkMe Vault, specifying scope, spending limits, and TTL. The Agent operates autonomously within these constraints.

Holder to Verifier

The Holder (or their Agent) presents zero-knowledge proofs to the Verifier to gain access to permissioned services. The Verifier learns only the boolean verification result.

Agent to Verifier

The Agent presents its credential stack (APC, ACC, AIC, ARC) to the Verifier for Agent Due Diligence. The Verifier evaluates the proofs and grants or denies access in real time.

Verifier to Regulator

The Verifier maintains on-chain audit trails that the Regulator can query. In formal proceedings, the Regulator can initiate UBO recovery via the APC's cryptographic binding.

Credential Issuer to Holder/Agent

The Issuer generates and distributes verifiable credentials. For Holders, this includes identity credentials (zkKYC). For Agents, this includes capability, safety, and reputation credentials.

Credential Issuer to Verifier

The Issuer’s on-chain State Contract serves as the trust anchor. Verifiers check credential validity, non-revocation, and issuer authority against this contract during proof verification.

The Issuer’s critical role is to ensure that issued Credentials are cryptographically secure, privacy-preserving, and verifiable while adhering to data minimization principles.

Last updated