Related Tools

Abstract

In this section, we would like to explain about the cryptgraphic scheme used for other privacy project.

Stealth Address

The Stealth Address hides the recipient address by creating one time address. Shortly, creating one time address from public key and recovering that private key with using Diffie-Hellman key exchange, users can hide who exactly receives the assets. The Monero uses this technology.

Pedersen Commitment

The Pedersen Commitment hides the transfer amount by commitment scheme. Shortly, using zero testing and generating blind factors, users can prove the amount validity without revealing actual amount. The Monero uses this technology.

Non Interactive Zero Knowledge Proof

The Non Interactive Zero Knowledge Proof proves the computation validity without revealing information about the value used with computation. In this section, we describe the zk-SNARKs. The Zcash uses this technology. Shortly, the QAP converts computation into polynomials, the Polynomial Commitment proves the validity of polynomials and the Homomorphic Encryption evaluates the polynomials without revealing raw coefficients.