Confidential Transactions allow masking the amount and asset type of a transaction in the Liquid network.
Questions tagged [confidential-transactions]
28 questions
9
votes
2 answers
Confidential Transactions on main chain
I have seen discussion of CT being used on the a side chain. What are the chances it will be applied to Bitcoin Core itself?
Jamal Wilson
- 321
- 1
- 5
4
votes
1 answer
Could you open a lightning channel in a confidential transaction?
On an elements sidechain (e.g. liquid) could you open a lightning channel with a confidential transaction.
You could probably open a payment channel but could the channel 'speak' to other channels?
Or is lightning network possible on liquid but only…
Bertram Lund
- 671
- 3
- 7
3
votes
1 answer
Do confidential transactions produce an UTXO
There must be magical cryptographic reason why CT doesn't create an UTXO.
If it did make an UTXO, it'd be trivial to calculate the input + output right?
Bertram Lund
- 671
- 3
- 7
3
votes
1 answer
Question about blinding factors in Confidential Transaction
In the paper about Confidential Transaction, it is said that the blinding factor for the range proof can be deduced with the shared secret using HMAC. But i didn't understand how the receiver can find the 'main' blinding factor, the one which is…
Irogama
- 31
- 1
3
votes
1 answer
Range proof's Confidential Transaction understanding
I've some doubt about Greg Maxwell Confidential transaction and hope someone can help to make it clear.
A commitment using Elliptic Curve math is:
P=xG + aH
where G,H are public value and x,a are private.
My…
Bartok
- 35
- 2
3
votes
1 answer
Sending confidential transaction amount to the receiver
In confidential transaction proposed by Maxwell, instead of transaction amounts we use pedersen commitments to hide the amount and add the range proof to the transaction to prevent overflow. A simple commitment with one input and one output C1 and…
abeikverdi
- 854
- 8
- 21
2
votes
0 answers
zk-SNARKs vs. Zk-STARKs vs. BulletProofs? (Updated)
zk-SNARKs, Zk-STARKs and BulletProofs are three major zero knowledge proofs to provide privacy for the blockchain technology.
If we can compare them,
(1) Bulletproofs and Zk-STARKs require no trusted setup.
Unlike zk-SNARKs that requires a…
Questioner
- 1,151
- 8
- 22
2
votes
1 answer
what are chaff coins in cryptocurrency?
I read in several paper about "chaff coins" but I could not find a clear definition for this phenomenon. Does it refer to a specific coin? Is there any "formal" definition for that ?
Reference: https://arxiv.org/abs/1704.04299
Questioner
- 1,151
- 8
- 22
2
votes
1 answer
Confidential transactions: how can they be verified by the network?
I'm currently trying to understand how confidential transactions would work. I think I was able follow all the explanations about Pedersen commitments and the range checks, but I'm still missing one piece of the puzzle: If the network doesn't know…
Michael Jung
- 123
- 3
2
votes
1 answer
Using confidential transactions with plain-text ouputs
I was reading about Confidential Transactions (CT) and understand the basic idea behind it. But what if CT must be bootstrapped on an existing Blockchain such as in Bitcoin, where the amounts are for now visible in the outputs?
Is it possible to…
Bjarne Magnussen
- 937
- 5
- 16
2
votes
1 answer
How does ring signature help in range proofs in confidential transaction?
Based on Maxwell's proposal of confidential transaction, a ring signature can solve the range proof issue. I can totally follow the pedersen commitment and everything. I don't quite get how ring signature helps in range proofs? Like we wanna know if…
abeikverdi
- 854
- 8
- 21
2
votes
0 answers
Would efficient Bulletproofs for CT increase transaction sizes? By how much?
Ignoring that it would be a hard fork, if Bitcoin implemented confidential transactions using Bulletproofs -- how much would an average transaction increase estimated in bytes?
(Just looking for a simple guesstimate here)
Jonathan Cross
- 1,410
- 10
- 30
1
vote
1 answer
Is a privacy preserving coin mixer possible on Liquid?
My thoughts:
Liquid uses confidential asset and tx. Therefore the asset type and amount is hiding from chain analysis. However the utxo's still carry history. This history could potentially lead chain analysers to form educated guesses of the…
Bertram Lund
- 671
- 3
- 7
1
vote
0 answers
How is this 1 input 2 output tx larger than this 2 input 2 output tx?
I saw the following liquid transaction with one input and two outputs is byte-wise bigger than another liquid transaction with two inputs and two outputs. How is this possible?
One input transaction (2772 vB):…
Bertram Lund
- 671
- 3
- 7
1
vote
1 answer
Can "Confidential Addresses" preserve user privacy?
Can using "Confidential Addresses" be an alternative to zk-SNARKs to provide an acceptable privacy for a user?
And when we talk about "Confidential Transactions", does it mean we are using "Confidential Addresses"?
And if "Confidential Addresses"…
Questioner
- 1,151
- 8
- 22