Introduction: A Platform of Decentralized Privacy Coins (Republication) [Part 1]
https://incognito.org/uploads/default/original/1X/9f4e0b7f4b1c57f37363b63eecc24516f56b82d5.jpeg

Introduction: A Platform of Decentralized Privacy Coins (Republication) [Part 1]

By abduraman | abduraman | 8 Mar 2020


From now on, I start a new series. There is a new privacy chain in the field and I will republish the articles about it. I wrote "privacy chain" but let's call it "a privacy platform". While you are reading series, as you discover, it does not shield just itself (like Monero, Zcash etc.) but also your all cryptoassets from curious eyes. Let's give Incognito chain floor.

Today, anyone can send BTC, ETH, and thousands of other cryptocurrencies to another party without going through a financial institution [Nakamoto, 2008Buterin et al., 2014]. For those who value privacy, these cryptocurrencies come with a big tradeoff. Transactions are recorded on public ledgers, displaying amounts involved, inscribing virtual identities of their senders and receivers. Given the choice, Incognito strongly believes that very few people will willingly disclose their crypto financials to the entire world.

The inherent lack of privacy to cryptonetworks today is a real and present threat to the entire crypto space.

Existing solutions like Monero, Zcash, and Grin introduced their own version of cryptocurrencies that focus on privacy, based on CryptoNote [Van Saberhagen, 2013], Zerocash [Sasson et al., 2014], and Mimblewimble [Jedusor, 2016] respectively.

Incognito takes a different approach, based on the premise that people don’t want a new cryptocurrency with privacy. What they really want is privacy for their existing cryptocurrencies: incognito mode for any cryptocurrency.

Incognito is designed so users don’t have to choose between their favorite cryptocurrencies and privacy coins. They can have both. They can hold any cryptocurrency and still be able to use it confidentially whenever they want. Privacy needs to be ubiquitous, inclusive, and accessible.

figure%201

Figure 1. Incognito as a privacy hub. It is interoperable with other cryptonetworks via shielding and unshielding processes, which allow cryptocurrencies like BTC and ETH to go incognito and back.

First, Incognito proposed a solution to shield any cryptocurrency such as BTC, ETH, and USDT. In effect, any cryptocurrency can now be a privacy coin. Both shielding and unshielding processes are carried out via a decentralized group of trustless custodians. Once shielded, transactions are confidential and untraceable. To provide privacy, Incognito employed the linkable ring signature schemehomomorphic commitment scheme, and zero-knowledge range proofs.

Second, Incognito presented a solution to scale out a privacy-focused cryptonetwork by implementing sharding on privacy transactions and a new consensus based on proof-of-stakepBFT, and BLS. Transaction throughput scales out linearly with the number of shards.

Currently, with 8 shards active, Incognito can handle 100 TPS. And with a full deployment of 64 shards, Incognito can handle 800 TPS – a significantly higher number than that of other privacy blockchains, which usually can only handle less than 10 TPS.

Incognito launched its mainnet in November 2019 as a privacy-protecting, high-performance cryptonetwork to deliver incognito mode for other cryptonetworks like Bitcoin and Ethereum. As of February 2020, it has 8 shards powered by over 1,000 validators and has processed over $1.3M worth of crypto confidentially - mainly in BTC, ETH, and USDT.

 

Contents

  1. Introduction: A Platform of Decentralized Privacy Coins

  2. Shielding Cryptocurrencies: Turning Any Cryptocurrency Into a Privacy Coin

  3. Trustless Custodians: A Decentralized Approach to Cryptocurrency Custodianship

  4. Sending Cryptocurrencies Confidentially: Ring Signature, Homomorphic Commitment, and Zero-Knowledge Range Proofs

  5. Privacy at Scale with Sharding

  6. Consensus: A Combination of PoS, pBFT, and BLS

  7. Incognito Software Stack: Navigating the Incognito Source Code

  8. Incognito Performance

  9. Network Incentive: Privacy (PRV)

  10. User-Created Privacy Coins

  11. Use Cases: Privacy Stablecoins, Privacy DEX, Confidential Crypto Payroll, and more

  12. Future Work: Smart Contracts, Confidential Assets, Confidential IP, and more

  13. Conclusions, Acknowledgments, and References

 

* This article is published upon permission of Incognito team. I thank them for their permission.

How do you rate this article?


0

0


abduraman
abduraman

Everything about Crypto World

Send a $0.01 microtip in crypto to the author, and earn yourself as you read!

20% to author / 80% to me.
We pay the tips from our rewards pool.