Incognito - Reading Assignment

  1. By converting a cryptocurrency to the Incognito protocol, where privacy features are enabled. 1 asset can be sent to a custodian who then issues its Incognito equivalent on the Incognito network.
  2. Looks basically like Monero
  3. A trustless custodian address
  4. The number of people of have shielded the same amount of bitcoin prior to Bob receiving the amount of bitcoin.
1 Like
  1. How does “shielding” work on Incognito?
    With the help of Bond smart contracts and trustless custodians.

  2. What privacy technology does Incognito use for shielded transactions?
    Linkable ring signatures scheme, homomorphic commitment scheme and zero-knowledge range proofs.

  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
    A custodian´s deposit address.

  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
    Anonimity set is the number of shielded BTCs transactions whose added BTCs are equal or superior to the amount he unshielded.

1 Like

1 - How does “shielding” work on Incognito?

Incognito’s shielding and unshielding processes are carried out via a decentralized group of trustless custodians. Once shielded, transactions are confidential and untraceable. To provide privacy , Incognito employs a linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.

2 - What privacy technology does Incognito use for shielded transactions?

To provide privacy, Incognito employs a linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs. Also, incognito presents a solution to scale out a privacy-focused cryptonetwork by implementing sharding on privacy transactions and a new consensus based on proof-of-stake, pBFT, and BLS. Transaction throughput scales out linearly with the number of shards.

3 - If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?

The trustless custodians’ deposit addresses receives Alices bitcoin transaction.

4 - Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)

Bob’s anonymity set would be equal to the number of all the shielded transactions of the same denomination and same coin.

1 Like
  1. " Both shielding and unshielding processes are carried out via a decentralized group of trustless custodian. Once shielded, transactions are confidential and untraceable. To provide privacy, we employed the linkable ring signature scheme , homomorphic commitment scheme , and zero-knowledge range proofs ."
  2. In point 1
  3. A “Custodian” assigned by the Bonding Contract that exists in the BTC network. This is another user who has bonded collateral to register as a Custodian service provider in exchange for receiving shielding and un-shielding transaction fees.
  4. The amount of transactions in the timespan of shielding and unshielding.
1 Like

#1 - How does “shielding” work on Incognito?
the action is carried out by so called trustless custodionas, they use known techniques such as linkable ring signature scheme , homomorphic commitment scheme , and zero-knowledge range proofs

#2 - What privacy technology does Incognito use for shielded transactions?
mentioned in #1

#3 - If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
a trustless custodian

#4 - Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same
amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)

All BTC inputs of Incognito

1 Like
  1. A shielding process is carried out by a decentralized group of trustless custodians. In order to shield your coins you submit a shielding request to a so called Bond smart contract which then selects the trustless custodians. In short, you will get then a privacy coin (which has the exact value than your coin before, e. g .1 BTC is equal to the generated Incognito coin 1 pBTC) which are completely untraceable and confidential

  2. To achieve shielding Incognito or better to say the trustless custodians uses linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.

  3. At first the Bond smart contract which then select trustless custodians.

  4. In my understanding the anonymity set of Bob is given by all transactions which have the same amount of the generated privacy coin at that time.

1 Like
  1. Shielding works by converting a public coin BTC into a private coin pBTC. This is done by a bridge design between Incongnito and any cryptonetwork and also uses a Bond smart contract. A user submits a shielding request to the contract. This then uses a trustless custodian and uses their address as a deposit address. Once confirmed the user starts a shielding Tx with a deposit proof. once validator verify this by SPV a new privacy coin is minted at a 1 for 1 basis.

  2. Incognito uses linkable ring signatures, zero-knowledge range proofs and homomorphic commitments to shield transactions.

  3. A trustless custodian.

  4. Bobs anonymity set is same as the number of TX’s that have the same value as what Bob has recieved.

1 Like
  1. Shielding works by using a general bridge design that will interface with different networks effectively changing any coin into a privacy coin by using trustless custodians and several privacy techniques .

  2. The privacy techniques it uses are Linkable Ring Signatures, Homomorphic Commitment, and Zero-Knowledge Range Proofs.

  3. The request to shield a transaction will return an address of a Trustless Custodian to which the transaction is sent. This creates “fungible” private tokens that are actually used to carry out the transaction.

4.The anonymity set consists of the total number of shielded transactions for the same amount of the same coin.

1 Like
  1. How does “shielding” work on Incognito?
  • Incognito as a privacy hub. It is interoperable with other cryptonetworks via [shielding and unshielding processes , which allow cryptocurrencies like BTC and ETH to go incognito and back.
  1. What privacy technology does Incognito use for shielded transactions?
  1. Both shielding and unshielding processes are carried out via a decentralized group of trustless custodians . Once shielded, transactions are confidential and untraceable. To provide privacy Incognito employes the linkable ring signature scheme , homomorphic commitment scheme , and zero-knowledge range proofs .
  1. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
  • A trustless custodians.
  1. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
  • The number of addresses receiving the same amount of that coin that was sent.
1 Like

1. How does “shielding” work on Incognito?
Both shielding and unshielding processes are carried out via a decentralized group of trustless custodians . Once shielded, transactions are confidential and untraceable.

2. What privacy technology does Incognito use for shielded transactions?
Linkable ring signature scheme , homomorphic commitment scheme, and zero-knowledge range proofs.

3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
A trustless custodian.

4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
All shielded transactions for the same amount.

1 Like
  1. How does “shielding” work on Incognito?
    By a decentralized group of trustless custodians who will shiled your “AnyCoin” with a Incognito. They will mint the value of this transaction to an other coin.

  2. What privacy technology does Incognito use for shielded transactions?
    Ring signatures, homomorphic commitment scheme, and zero-knowledge range proofs.

  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
    A decentralized group of trustless custodians.

  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
    The anonymity set is the set of people who shielded the same amount of BTC before Bob unshielded the transaction.

1 Like

1 Like

• They use the linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.
• Sharding and a new consensus based on POS, pBFT and BLS.
• A decentralized group of trustless custodians
• The anonymity set would equal to the number shielded Tx’s for the same coin and amount.

1 Like
  1. Shielding works on Incognito by connecting to a number of crypto-networks. Firstly a user submits a shielding request to the Bond Smart Contract with information about which public coins they want to shield, and the amount. The smart contract then selects trustless custodians for the public coins and provides the user with the custodian’s deposit address. Once the deposit is confirmed on the crypto-network of public coins, the user initiates a shielding transaction along with a deposit proof. Incognito validators then verify the transaction.

  2. The privacy technology Incognito uses for shielded transactions is as follows: a) a linkable ring-signature scheme, b) a homomorphic commitment scheme, and c) zero-knowledge proofs.

  3. If Alice shields BTC with Incognito, the receiver of her BTC transaction is a trustless custodian for BTC public coins.

  4. We could find Bob’s anonymity set by determining how many users sent transactions to the same custodian Alice sent them to, before Bob unshielded the coins.

1 Like
  1. Incognito uses a particular shielding process that allows you to make all the coins…privacy coins. In such a way as to guarantee privacy even to coins that have not been created for that purpose. Both shielding and unshielding processes are carried out via a decentralized group of trustless custodians. To provide privacy, the following is implemented: the linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.
  2. I rewrite them: the linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.
  3. A decentralized group of trustless custodians. As mentioned in answer 1 :slight_smile: .
  4. The anonymity set corresponds to the number of all shielded transactions with the same amount of coin used in the tx between the two.
  1. Via a decentralized group of trustless custodians.
  2. Linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.
  3. The network of trustless custodians.
  4. The anonymity set would be the number of shielded transactions on Incognito in BTC with the same amount.
  1. Shielding works on Incognito by connecting to a number of crypto-networks. Firstly a user submits a shielding request to the Bond Smart Contract with information about which public coins they want to shield, and the amount. The smart contract then selects trustless custodians for the public coins and provides the user with the custodian’s deposit address. Once the deposit is confirmed on the crypto-network of public coins, the user initiates a shielding transaction along with a deposit proof. Incognito validators then verify the transaction.

  2. The privacy technologies Incognito uses for shielded transactions are as follows
    a) a linkable ring-signature scheme
    b) a homomorphic commitment scheme
    c) zero-knowledge proofs

  3. If Alice shields BTC with Incognito, the receiver of her BTC transaction is a trustless custodian for BTC public coins.

  4. We could find Bob’s anonymity set by determining how many users sent transactions to the same custodian Alice sent hers to before Bob unshielded his coins.

  1. Incognito as a privacy hub. It is interoperable with other crypto networks via, which allow cryptocurrencies like BTC and ETH to go incognito and back.
  2. The linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.
  3. The receiver address belongs to a decentralized group of trestles custodians.
  4. The number of addresses receiving the same amount of that coin that was sent.

1:Shielding and unshielding are varied out by a decentralized group of trestles custodians
2: By using zero knowledge range proofs, Ring signatures, homomorphic commitments
3 to a group of decentralized trust-less custodians.
4: The anonymity set is the same as all TRx of the same value

  1. The shielding mechanism operates via a general bridge design that connects Incognito to any number of cryptonetworks, allowing for secure bi-directional transfers of cryptocurrencies whenever privacy is needed.

  2. To provide privacy, we employed the linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.

  3. A decentralized group of trustless custodians.

  4. Its anonymity set is equal to the number of all the shielding transactions which were performed for the same amount of that same coin.