Incognito - Reading.
- Shielding on Incognito work by let you shield cryptocurrencies
- user submit a shielding request to the Bond Smart Contract
- Bond smart contract select trustless custodians
- custodian deposit addresses were provided
- deposit confirm on the cryptonetwork.
- user initiate a shielding transaction on Incognito along with deposit proof, proving that the deposit transaction has been accepted by the cryptonetwork.
- The Privacy Technology that Incognito use for shielding transactions are:
- homomorphic commitment scheme.
- zero knowledge proof (range proofs)
- linkable ring signature
-
The receiver of Alice’s bitcoin is the decentralised group of custodians.
-
“suppose Alice shields bitcoin, sends it to Bob on incognito, and then Bob unshield the same amount”.
Bobs anonymity set is found by calculating the number of all the shielded transaction that were performed for the same amount of the coin