Gate.io Proof of Reserves Upgrade: Building Better Services with zk-SNARK

2/21/2025, 2:34:41 AM
Intermediate
Blockchain
As a trusted exchange with 13 million users, Gate.io understands the importance of fund security. In May 2020, Gate.io became one of the earliest exchanges to implement Proof of Reserves and has since been a leader in this field. Following the FTX incident, Proof of Reserves has gained significant attention as a solution. Now, Gate.io is pleased to announce a major upgrade to 100% proof of reserves, utilizing zk-SNARK technology to enhance privacy, transparency, and authenticity, further safeguarding user funds.

Proof of Reserves and Merkle Tree

Vitalik Buterin’s article Having a safe CEX: proof of solvency and beyond highlights the challenge centralized exchanges face in verifying user assets and ensuring sufficient reserves to honor user deposits. Therefore, exchanges need a way to prove that they have enough reserve assets to fully repay these assets when requested by users, meaning they need to demonstrate that the value of their reserve assets exceeds the value of user deposits. This proof is known as Proof of Reserves and is called 100% reserve audit proof at Gate.io.

The simplest way to prove deposits is by publishing a list of (username, and balance) pairs. Each user can check if their balance is included in the list, and anyone can verify the complete list to ensure all balances are non-negative and the sum matches the claimed amount by the exchange. However, this compromises privacy. To address this, a slight modification is made: publishing a list of (hash(username, salt), balance) pairs and privately sending each user their salt value. But even this reveals balances and balance changes. To protect privacy, a further innovation is introduced: the Merkle tree.

(Figure 1 Source:https://vitalik.ca/general/2022/11/19/proof_of_solvency.html)

The Merkle tree technique organizes user balance data into a Merkle sum tree. In this tree structure, each node consists of a (balance, hash) pair. The leaf nodes at the bottom represent individual user balances and the salted hash of their usernames. In each higher-level node, the balance is the sum of the two balances below it, and the hash is the hash of the two nodes below it. The Merkle sum proof, similar to a Merkle proof, represents a “branch” of the tree made up of sibling nodes from leaf to root. The exchange provides each user with the Merkle sum proof of their balance, enabling them to verify that their balance is correctly included in the exchange’s total balance.

This design significantly enhances privacy compared to a fully public list. Additionally, privacy leakage can be further minimized by shuffling the “branches” whenever the “root” is published. However, there are still some remaining issues. For example, Charlie learns that someone has 164 ETH, and the balances of two users add up to 70 ETH, among other information (see Figure 1). An attacker who controls multiple accounts could still deduce sensitive information about exchange users.

Limitations of Merkle Tree-based Proof of Reserves

While the Merkle tree-based proof of reserves has been effective in ensuring the security of user assets, there are still some issues with this approach:

  1. Front-end Fraud: The Merkle tree data is stored on the internal servers of the exchange, and the exchange controls the front-end pages that users interact with. The exchange can potentially return fake pages to deceive users, leading to the possibility of front-end fraud.
  2. Malicious Merkle Tree Algorithm Attack: A centralized exchange (CEX) can create fake accounts with negative balances after misappropriating funds. For example, if a user had assets worth $1,000 and the exchange misappropriated $500, the user’s balance displayed on the interface would still show $1,000. If the Merkle tree proof is issued based on $1,000, it would appear that the exchange’s actual assets ($500) are less than the user’s deposited assets ($1,000), indicating insufficient reserve funds. However, by creating a fake account with a balance of -$500, the exchange can make the Merkle tree show that its actual assets ($500) equal the user’s deposited assets (1,000 - 500 = $500), resulting in a normal PoR output.
  3. Potential privacy issues for attackers with multiple accounts.

Zero-Knowledge Proof and zk-SNARK

Zero-knowledge proofs have gained widespread attention in various use cases due to their potential to enhance security, protect user privacy, and support scalability in Layer-2 networks.

Zero-knowledge proofs enable one party to prove to another party that a statement is true without revealing any additional information. They contribute to increased privacy by reducing the amount of shared information between participants and support scalability by allowing proofs to be verified faster without validating the entire dataset.

zk-SNARK (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) is a zero-knowledge proof technology proposed in a joint paper by Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer in 2012. zk-SNARK allows one party to prove to another party that they know a secret without revealing the secret itself, thus proving the correctness of a logical expression without exposing any information. In traditional zero-knowledge proofs, the prover must interact with the verifier multiple times to generate the proof. However, in zk-SNARK, once the parameters (especially the public parameters) and the proof are generated, the verifier can verify the correctness of the proof without needing multiple interactions with the prover.

For example, imagine you have a treasure map that leads to the exact location of the buried treasure. You want to prove to someone that you know the treasure’s location without revealing the contents of the map or the actual location of the treasure. Using zk-SNARK technology, you would create a puzzle piece of the treasure map. You select a small piece of the puzzle (a proof) and show it to the other person, which is enough to convince them that you know how the complete puzzle fits together, i.e., the treasure’s location, without needing to see the entire puzzle. However, to accomplish this, you must obtain some special markings from a reputable printing factory to authenticate your puzzle pieces.

The implementation of zk-SNARKs is based on elliptic curve cryptography and polynomial mathematics. This technique employs mappings to transform inputs into polynomials and utilizes mathematical concepts such as the order of elliptic curves and the discrete logarithm to validate that the constraints on the polynomials are satisfied. It leverages special algorithms for data compression, thereby enabling efficient execution of mathematical computations.

Therefore, using zk-SNARKs can significantly streamline and enhance privacy in reserve proof protocols. By incorporating all user deposits into a Merkle tree and employing zk-SNARKs to attest that all balances are non-negative and sum up to a claimed value, it’s possible to affirm that an exchange has the capacity to fully cover its liabilities if the publicly disclosed assets on the blockchain exceed this value.

Integrating zk-SNARKs with Merkle trees facilitates the simultaneous verification of data integrity and consistency while preserving the privacy of transactions. Provers can use zk-SNARKs to demonstrate that they possess a Merkle proof meeting specific conditions without revealing the details of the proof. For exchanges, this approach offers a way to prove they have sufficient funds to meet all obligations while safeguarding user privacy.

Gate.io’s Zero-Knowledge Reserve Upgrade

In summary, Gate.io’s zero-knowledge proof technology addresses two key issues with the proof of reserves:

  1. Allowing users to prove ownership of certain assets without revealing any sensitive information
  2. Eliminating the possibility of a malicious Merkle tree algorithm attack by ensuring that the Merkle tree does not contain users with negative net balances, as described in the previous section

Gate.io has upgraded its proof of reserves using zk-SNARK, taking a significant step as a leading exchange in protecting user asset security. With this upgrade, users can view reserve proofs in real-time, and the first batch of supported assets will cover the top 100 by market capitalization. As an industry leader, has open-sourced the code and will continue to drive industry development and explore a more secure and privacy-enhancing encrypted future with this zero-knowledge-proof upgrade.

Further Readings:

Author: Gate learn
Translator: Sonia
Reviewer(s): Wayne Zhang、Edward、Elisa、Ashley 、Joyce BeelenHe、
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Share

Crypto Calendar

Project Updates
Etherex will launch the token REX on August 6.
REX
22.27%
2025-08-06
Rare Dev & Governance Day in Las Vegas
Cardano will host the Rare Dev & Governance Day in Las Vegas, from August 6 to 7, featuring workshops, hackathons and panel discussions focused on technical development and governance topics.
ADA
-3.44%
2025-08-06
Blockchain.Rio in Rio De Janeiro
Stellar will participate in the Blockchain.Rio conference, scheduled to be held in Rio de Janeiro, from August 5 to 7. The program will include keynotes and panel discussions featuring representatives of the Stellar ecosystem in collaboration with partners Cheesecake Labs and NearX.
XLM
-3.18%
2025-08-06
Webinar
Circle has announced a live Executive Insights webinar titled “The GENIUS Act Era Begins”, scheduled for August 7, 2025, at 14:00 UTC. The session will explore the implications of the newly passed GENIUS Act—the first federal regulatory framework for payment stablecoins in the United States. Circle’s Dante Disparte and Corey Then will lead the discussion on how the legislation impacts digital asset innovation, regulatory clarity, and the US’s leadership in global financial infrastructure.
USDC
-0.03%
2025-08-06
AMA on X
Ankr will host an AMA on X on August 7th at 16:00 UTC, focusing on DogeOS’s work in building the application layer for DOGE.
ANKR
-3.23%
2025-08-06

Related Articles

Solana Need L2s And Appchains?
Advanced

Solana Need L2s And Appchains?

Solana faces both opportunities and challenges in its development. Recently, severe network congestion has led to a high transaction failure rate and increased fees. Consequently, some have suggested using Layer 2 and appchain technologies to address this issue. This article explores the feasibility of this strategy.
6/24/2024, 1:39:17 AM
The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline
Beginner

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline

This article explores the development trends, applications, and prospects of cross-chain bridges.
12/27/2023, 7:44:05 AM
Sui: How are users leveraging its speed, security, & scalability?
Intermediate

Sui: How are users leveraging its speed, security, & scalability?

Sui is a PoS L1 blockchain with a novel architecture whose object-centric model enables parallelization of transactions through verifier level scaling. In this research paper the unique features of the Sui blockchain will be introduced, the economic prospects of SUI tokens will be presented, and it will be explained how investors can learn about which dApps are driving the use of the chain through the Sui application campaign.
6/13/2024, 8:23:51 AM
Navigating the Zero Knowledge Landscape
Advanced

Navigating the Zero Knowledge Landscape

This article introduces the technical principles, framework, and applications of Zero-Knowledge (ZK) technology, covering aspects from privacy, identity (ID), decentralized exchanges (DEX), to oracles.
1/4/2024, 4:01:13 PM
What Is Ethereum 2.0? Understanding The Merge
Intermediate

What Is Ethereum 2.0? Understanding The Merge

A change in one of the top cryptocurrencies that might impact the whole ecosystem
1/18/2023, 2:25:24 PM
What is Tronscan and How Can You Use it in 2025?
Beginner

What is Tronscan and How Can You Use it in 2025?

Tronscan is a blockchain explorer that goes beyond the basics, offering wallet management, token tracking, smart contract insights, and governance participation. By 2025, it has evolved with enhanced security features, expanded analytics, cross-chain integration, and improved mobile experience. The platform now includes advanced biometric authentication, real-time transaction monitoring, and a comprehensive DeFi dashboard. Developers benefit from AI-powered smart contract analysis and improved testing environments, while users enjoy a unified multi-chain portfolio view and gesture-based navigation on mobile devices.
5/22/2025, 3:13:17 AM
Start Now
Sign up and get a
$100
Voucher!