Universal Private Helpers

Most ZK projects rebuild the same Merkle trees, hash functions, and proof verifiers from scratch — often with subtle differences and no shared review. UPH consolidates the cryptographic primitives underlying UPP and UPC into a single, consistently maintained package designed for independent audit and broad reuse.

Universal Private Helpers Logo

Who Benefits from UPH

ZK Protocol Builders

Stop reimplementing field arithmetic and Merkle trees. UPH gives you consistent, reviewed primitives so you can focus on your protocol logic.

Solidity Developers

On-chain M31 field arithmetic, Circle STARK verifier, BLS12-381 wrapper, and PLONK verifier — ready to import without writing thousands of lines yourself.

TypeScript Developers

LeanIMT Merkle tree, Poseidon hash, stealth address generation, and note encryption — the full off-chain toolkit for building privacy-preserving clients.

Security Auditors

Consolidating primitives into a single package means one focused audit scope instead of hunting the same logic across multiple repositories.

The UPH Advantage

Today, most ZK projects rebuild the same primitives — Merkle trees, hash wrappers, field arithmetic, proof verifiers — with subtle differences and no shared review. UPH consolidates the primitives from UPP and UPC into a single, consistently maintained package:

Shared Review Surface – One package, one place to scrutinize. Improvements and fixes propagate to every integration.

Consistent Primitives – Same M31 field arithmetic and Merkle tree logic in every implementation. No subtle divergences between projects.

Faster Developmentnpm install @permissionless-technologies/uph instead of writing thousands of lines of Solidity and TypeScript.

Open Infrastructure – AGPL-3.0. Use it, fork it, build on it. We don't build walled gardens.

How UPH Handles Compliance

Privacy and compliance go hand in hand:

Regulators – Every withdrawal passes through an ASP, where compliance checks are performed. Proofs are on-chain and fully verifiable.

Users – Your identity stays private. The ZK proof confirms “someone in the approved set” acted, without revealing who.

Operators – Run your own ASP with your own rules. No permission needed from us.