SLIDE 36 36
The Protocol Alternatives Applied for Transactional Privacy
36
All trans nsact action ion amounts nts are hidden n from public ic view using a commitment mitment to the amount. nt. Enable les s users s to gener erate ate coins ns with no prior trans nsact action ion histor
y which ch can then be spent anonym nymous usly ly witho hout ut disclo losing sing the source ce This design, gn, however ver, , does
es not ensure e transa nsaction ction anon
ymity ty,
, a highly ly desirable able privacy vacy featur ure e for financial ncial trans nsact action ions. This constr struct uction ion works ks only with fixed denom
nated coins ns and hence e
does es not hide transa nsaction ction amount unts
Provi
des a v very y effici cient nt private vate trans nsact action ion system em which ch is capab able le
hiding ng trans nsact action ion values ues, , their ir
ins, , and destinati ination
s. It relie ies on k knowle ledge ge of exponent ent assumptio mptions ns and a trust
sted d setup p process,
- cess, necessitating the user’s
trust st in the correctnes ectness s of this setup up
What Provides vides Confidential idential Transact nsactio ion n
g Maxwel ell Zerocoin
Zerocas
What are Drawb awbac acks ks
We are expertized on all of these cryptographic protocols.
Lenantus antus Protocol
ves the proble lems ms