Incognito - Reading Assignment

Incognito - Reading.

  1. Shielding on Incognito work by let you shield cryptocurrencies
  • user submit a shielding request to the Bond Smart Contract
  • Bond smart contract select trustless custodians
  • custodian deposit addresses were provided
  • deposit confirm on the cryptonetwork.
  • user initiate a shielding transaction on Incognito along with deposit proof, proving that the deposit transaction has been accepted by the cryptonetwork.
  1. The Privacy Technology that Incognito use for shielding transactions are:
  • homomorphic commitment scheme.
  • zero knowledge proof (range proofs)
  • linkable ring signature
  1. The receiver of Alice’s bitcoin is the decentralised group of custodians.

  2. “suppose Alice shields bitcoin, sends it to Bob on incognito, and then Bob unshield the same amount”.
    Bobs anonymity set is found by calculating the number of all the shielded transaction that were performed for the same amount of the coin

1 Like

1.- By a descentralized group od trustless custodians. These ones use technology to shield tx.
2.- Linkable ring signatures, homomorphic commitment sheme and zero knowledge range proofs.
3.- A descentralized group of trustless custodians.
4.- The number of all the shielding tx which were performed for the same amount of that same coin.

1 Like
  1. The user first sends a request with coin and amount to the Bond SC which returns an address to deposit to. The user sends the funds and the contract then returns a proof of deposit. That proof of deposit is then taken to the Incognito chain where it is treated like a wrapped coin.
  2. Linkable ring signatures that can track double spend blocking the sender, Stealth addresses that block the receiver, and confidential transactions that block the inputs and outputs.
  3. The bond smart contract is the receiver.
  4. Any address that sent BTC to the Bond smart contract.
1 Like
  1. The process of shielding is conducted by a decentralized group of trustless custodians. When a transaction is made, a shielding request is sent to the Bond smart contract. The contract then selects custodians who are completely trustless and uses their address as a deposit address. After this, a new privacy coin is minted with the exact monetary value as the amount sent.

  2. Incognito implements three cryptographic technologies including:

  • linkable ring signature scheme
  • homomorphic commitment scheme
  • zero-knowledge range proofs
  1. The trustless group of custodians will receive Alice’s payment.

  2. It would be the number of shielded transactions that had their amounts deposited to the Bond smart contract.

1 Like
  1. By a decentralized grup of trustless custodians.

  2. linkable ring signature scheme, homomorphic commitment scheme, zero-knowledge range proofs.

  3. A trustless group of custodians.

  4. The number of shield transactions that had their amounts deposited to the Bond smart contract.

1 Like
  1. Both shielding and unshielding processes are carried out via a decentralized group of trustless custodians.

  2. Incognito uses the privacy tech of zkp, homomorphic commitments, and ring signatures for shielded transactions.

  3. A decentralized group of trustless custodians.

  4. Its anonymity set is equal to the number of all the shielding transactions which were performed for the same amount of that same coin.

1 Like
  1. Shielding on Incognito:

Both shielding and unshielding processes are carried out via a decentralized group of trustless custodians. Once shielded, transactions are confidential and untraceable. To provide privacy, we employed the linkable ring signature scheme , homomorphic commitment scheme , and zero-knowledge range proofs.

Second, we presented a solution to scale out a privacy-focused cryptonetwork by implementing sharding on privacy transactions and a new consensus based on proof-of-stake , pBFT , and BLS . Transaction throughput scales out linearly with the number of shards.

In other words, Incognito acts as a privacy layer that can interoperate with various cryptocurrencies new or old.

  1. As mentioned above, Incognito uses “linkable ring signature scheme , homomorphic commitment scheme, and zero-knowledge range proofs”.

  2. If Alice shields BTC with Incognito, the receiver of the BTC will be the “decentralized group of trustless custodians”, as mentioned in 1. .

  3. We suppose that Bob now receives Alice’s shielded BTC, and now unshields that BTC. Then Bob’s anonymity set will be the set of all transactions amongst the trustless custodians whose sum is greater than or equal to the amount of BTC that Bob unshielded, at the time of shielding.
    Presumably this means that the larger the transaction amount, the harder it would be to shield.

1 Like
  1. Shielding on Incognito allows you to make your crypto private through a decentralized group of trustless custodians that employ a number of techniques like linkable ring signatures, commitment schemes, zk-range proofs) to allow untraceability and confidentiality.

  2. Linkable ring signatures, commitment schemes and zk-range proofs.

  3. A decentralized group of trustless custodians.

  4. Anonymity set is equal to the number of all shielded transactions performed for the same amount of that same coin.

1 Like
  1. Shielding works in incognito because it allows interoperability of existing crypto in different blockchains to go through the process of shielding and unshielding in a privacy hub.
  2. Linkable ring signature scheme, homomorphic commitment scheme, and zero knowledge proofs
  3. A decentralized group of trustless custodians
  4. The anonymity set is the number of transactions of the same exact amount that are also shielded.
1 Like
  1. Incognito as a privacy hub. It is interoperable via other crypto networks, which allow cryptocurrencies like BTC and ETH to go incognito and back. This is carried out via a decentralized group of trustless custodians.
  2. Commitment schemes, zero-knowledge range proofs and linkable ring signatures.
  3. A decentralised group of trustless custodians.
  4. The anonymity set is the set of people who shielded the same amount of BTC before Bob unshielded the transaction.
1 Like
  1. By converting the “public coin” into an incognito privacy coin of the same value.
  1. They use linkable ring signature scheme, homomorphic commitment scheme, and zero-knowledge range proofs.
  1. A trustless custodian
  2. The Anonymity set will be the total sum of all the shielded transactions performed with the same amount on the same coin.
1 Like
  1. How does “shielding” work on Incognito? — shields existing cryptocurrencies via a decentralized group of trestles custodians to make BTC, ETC, etc transactions confidential and untraceable
  2. What privacy technology does Incognito use for shielded transactions? — linkable ring signatures, homomorphic commitment schemes, zk range proofs
  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction? — decentralized group of trestles custodians
  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?) — number of senders who sent that amount of coin
1 Like
  1. How does “shielding” work on Incognito? Shielding is the process of turning cryptocurrencies on other crypto-networks into privacy coins on incognito. The coin maintains its original value and can be transacted confidentially on incognito.

  2. What privacy technology does Incognito use for shielded transactions? A bond smart contract is used to indicate which coins are to be shielded, and the amount. Then a Merkle branch linking the deposit transaction to the block it is time stamped.

  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction? Decentralized trustless custodians.

  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?) The anonymity set is equal to the number of all the shielding transactions which were performed for the same amount of that same coin.

1 Like

1.“Shielding” on Incognito:
Shield coin with ‘Trustless Custodians’ that mint your coin 1:1 fungibility
Shields values of sender and receiever
Can unshield your remainder coins (burn them) and return your remaining amount from the Incognito Trustless Custodians
2.The privacy technology is ring signatures, homomorphic commitment scheme, and zero-knowledge range proofs.
3.The receiver is the ‘Trustless Custodian’.
4.The anonymity set is the number of shielded transaction from that given amount of coins.

1 Like
  1. How does “shielding” work on Incognito?
    Submitting the “real” (unshielded) crypto asset to a trustless custodian, and obtaining the shielded version of the asset.
  2. What privacy technology does Incognito use for shielded transactions?
    Ring signatures, stealth addresses and ZK range proofs.
  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
    A custodian.
  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
    The anonymity set consists of the total number of shielded transactions for the same amount of the same coin.
1 Like

1. How does “shielding” work on Incognito?
After initiating a shielding request, and transferring the coins to be shielded, a proof of deposit is submitted to the incognito network, and a privacy coin is returned.
2. What privacy technology does Incognito use for shielded transactions?
linkable ring signature scheme , homomorphic commitment scheme , and zero-knowledge range proofs
3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
Incognito
4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
In general, anonymity set would be the total number of shielded UXTOs for that coin type.

1 Like
  1. How does “shielding” work on Incognito?
    It lets you convert coins of public blockchains into Incognito coins that keep the same value of the public coin but have privacy features. Then the conversion can be reverted.

  2. What privacy technology does Incognito use for shielded transactions?
    Ring-signatures, homomorphic commitments and zero-knowledge range proofs.

  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
    A ‘trustless custodian’.

  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
    All the previous BTC transactions with the same amount.

1 Like
  1. by wrapping the public coin in the incognito coin
  2. ring signatures, homomorphic commitments and zero-knowledge range proofs
  3. Trustless Custodian
  4. the number of shielded coins of the same amount
1 Like

1.- There are basically shielded equivalents or counterparts of the currency you want to use.

2.- zero knowledge range proofs, homomorphic commitment scheme and linkable ring signatures.

3.- A trustless, decentralized group of custodians.

4.- The anonymity set is the number of TXs of the same coin of the same denomination.

1 Like
  1. How does “shielding” work on Incognito?
    By sending it to effectively a smart contract bridged to multiple blockchains

  2. What privacy technology does Incognito use for shielded transactions?
    They use ring signatures, homomorphic commitments and ZK range proofs

  3. If Alice shields BTC with Incognito, who is the ‘receiver’ of her Bitcoin transaction?
    A smart contract

  4. Suppose Alice shields BTC, sends it to Bob on Incognito, and then Bob un-shields the same amount. How do we find Bob’s anonymity set? (How many people he could have received BTC from?)
    The total number of transactions to the smart contract of the same amount prior to his unshielding. The privacy features appear to shield only your activity with minted privacy coin like pBTC or pETH

1 Like