A Closer Look at the Intricate Mechanism of Private Transaction

ZKWispr
3 min readAug 23, 2023

--

In the ever-evolving landscape of blockchain technology, innovation is a constant driving force. Among the latest marvels to grace the realm of digital transactions is ZKWispr — a groundbreaking system that ensures privacy, security, and efficiency. Delving into the intricacies of mechanism, we uncover the elegant dance of cryptographic elements that power this revolutionary platform.

1. Genesis of Keys:

The journey commences with the establishment of a ZKWispr account — a process that initiates with users signing a message. It’s within the digital signature of this message that the seeds of confidentiality are sown. The magical hash of this message is harnessed to generate a pair of private keys: the “spending key” and the “viewing key.” These keys collectively become the guardians of privacy, enabling secure transactions beyond the realm of prying eyes.

2. Etched in Chains:

The subsequent step involves etching the corresponding public keys onto the immutable ledger of the blockchain. Both public keys are meticulously linked to the user’s address, an unalterable testament to the connection between the cryptographic world and real-world identity.

3. The Payer’s Prelude:

As the curtain rises on the transaction stage, a payer steps forward, armed with the recipient’s address, ENS (Ethereum Name Service), or CNS (Crypto Name Service) name. Herein lies the beauty of ZKWispr — an artful fusion of convenience and security. The payer, equipped with this nomenclature, conjures a random value — a key fragment that will unlock the transaction’s clandestine corridors.

4. The Ballet of Concealment:

In this choreography of cryptography, the random value pirouettes with the spending public key, culminating in the formation of a “concealed address.” As the name suggests, this concealed address shrouds the transaction in a cloak of confidentiality. But the symphony doesn’t end here; the viewing public key ascends the stage, gracefully encrypting the delicate random value, fortifying the veil of secrecy.

5. Enigmatic Transaction:

The center stage of this ballet is the ZKWispr contract. Here, the payer orchestrates the transaction, directing funds toward the concealed address. With the flourish of an Announcement event, the address and its encrypted enigma are unveiled, like a grand reveal in a theatrical performance.

6. Recipient’s Pas de Deux:

Enter the recipient — a vigilant spectator of the blockchain ballet. Armed with the viewing private key, they elegantly decrypt the encrypted random value, peering into its core. This decrypted value is then partnered with their spending private key, yielding the concealed private key. The climax ensues as the concealed private key takes center stage, embracing the concealed address revealed in the Announcement event. It’s this cosmic alignment that signals the rightful ownership of the transaction — a mesmerizing duet of keys and addresses.

7. Curtain Call of Possibilities:

With the performance concluded, the recipient emerges victorious, clutching the spending private key — an emblem of their newfound ownership. With this key at their disposal, they can craft the denouement in two distinct acts. In one, they direct funds to another address, a seamless display of autonomy. Alternatively, they can pen a meta-transaction — a script for withdrawal, choreographed by a relayer — an homage to the harmony between innovation and collaboration.

In Summation:

ZKWispr’s mechanism is a grand ballet of cryptographic elements, where private keys waltz with public keys, random values dance with concealed addresses, and the blockchain stage witnesses a seamless fusion of privacy and efficiency. As we applaud the brilliance of ZKWispr’s design, we also laud the paradigm shift it heralds — a reimagining of secure and private transactions in the digital age.

--

--

ZKWispr
ZKWispr

Written by ZKWispr

The First Privacy Transfer Protocol on zkSync.

No responses yet