Content
It is built on the concept of Zerocoin, but takes the encryption technology to a higher level. Zero note uses a cryptographic technology called zk − SNARKS zk-SNARKSzk−SNARKS. The key part of this technology is that the entire network can run without relying on a basic currency, and all transactions can be The zero-knowledge verification method makes the whole system more concise.
Zcoin also supports ordinary transactions that don't need to be unrelated, but it does a supplementary to it with expensive mixed currency transactions. This kind of mixed currency transaction is composed of fixed face value digital currency, and the split and merger of transaction value can only be realized in the basic currency system. The optimization of the zero note system does not require such differentiated work.
The size of the transaction amount is encapsulated in a promise and is no longer visible on the blockchain. Cryptographic evidence ensures the correctness of the split and merge, and users cannot create zero notes out of thin air.
Only understand
Don't understand
There are transaction fees, only know
Record, get the greatest anonymity protection
public
private
- The existence of transactions
- The proof used by miners to verify the key attributes required for the normal operation of the system
- Transaction address
- Transaction value
Transaction sender and receiver
miner
Handling fee
As far as anonymity and privacy are concerned, the completely untraceable transaction system of Zero Bank is its own sect. Because the public ledger does not contain the transaction amount, Zero Notes is immune to side-channel attacks on the currency mixing service
5.2.2 Establish a zero cash system
The reason why the above-mentioned can be achieved is because Zero Bank also needs a "public parameter" to set up this zero-knowledge verification system. What Zero Bank requires is a large public parameter set-its size exceeds 1G 1G1G bytes. It is much larger than the storage size generated when the Zerocoin system establishes trust.
Zero notes require a set of random and secret inputs. If anyone knows these secret inputs, there will be a double consumption problem that cannot be monitored, thereby jeopardizing the security of the entire system
But as of 2015, we do not know how to build this system in a sufficiently reliable manner in actual operation. So far, zk-SNARK has not been actually used. It's just beautiful in theory.