Related Tools
Abstract
In this section, we would like to explain about the cryptgraphic scheme used for other privacy project.
Stealth Address
The Stealth Address
hides the recipient address by creating one time address. Shortly, creating one time address from public key and recovering that private key with using Diffie-Hellman
key exchange, users can hide who exactly receives the assets. The Monero
uses this technology.
Pedersen Commitment
The Pedersen Commitment
hides the transfer amount by commitment scheme. Shortly, using zero testing and generating blind factors, users can prove the amount validity without revealing actual amount. The Monero
uses this technology.
Non Interactive Zero Knowledge Proof
The Non Interactive Zero Knowledge Proof
proves the computation validity without revealing information about the value used with computation. In this section, we describe the zk-SNARKs
. The Zcash
uses this technology. Shortly, the QAP converts computation into polynomials, the Polynomial Commitment proves the validity of polynomials and the Homomorphic Encryption evaluates the polynomials without revealing raw coefficients.