-
Notifications
You must be signed in to change notification settings - Fork 14
Vendor mindnetwork #23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
| ## Not a substitute for | ||
| ### Privacy Scope | ||
| - Not a shielded pool or private balance scheme — transfer amounts may remain visible for verifiability. | ||
| - Not a full privacy rail; it hides money flow but not necessarily token types or values. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you expand on that? e.g., specifying what parameters are hidden vs. public
How'd your solution address **Encrypted cross-chain transfers** and stablecoin movement?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, let me address the questions one by one:
Q1: Could you expand on that? e.g., specifying what parameters are hidden vs. public
Answer:
- Money flow or transaction path is hidden (or private).
- Token name and Token balance is visible (or public).
Example: Let us take a example to explain the details: when Alice send 10 TokenA to Bob. - The money flow from Alice to Bob is hidden. Nobody know Bob received token from Alice, as it was send to a stealth address managed by Bob's wallet (but address are totally random from Bob's wallet).
- The TokenA and amount is visible. People will see the stealth address have received 10 TokensA, but nobody knows who owns the stealth address.
Q2: How'd your solution address Encrypted cross-chain transfers and stablecoin movement?
Answer:
- I have explained how it works in a single chain as above, now cross-chain will be same but relying on corss-chain messaging.
- Bob's need the onchain message in order to detect and spend the stealth address. The message could be in same chain or cross-chain, as long as this message is guaranteed by the blockchain consensus.
- for cross chain, we are using cross-chain messaging, like Chainlink CCIP, it will look after cross-chain messaging.
- For example, when Alice in ChainA send TokenA to Bob in ChainB. Alice will generate a messaging and send this message to the stealth address in ChainB, while send TokenA to ChainB. Bob in ChainB will use the message in ChainB to spend TokenA in ChainB.
- Stablecoin is one of the token for cross-chain, it is equivalent to other normal tokens onchain.
- If you would like to know more tech details, can also check out this Doc or this Paper
Let me know if you need any further explanation. @Meyanis95
| - Not a full privacy rail; it hides money flow but not necessarily token types or values. | ||
|
|
||
| ### Performance Scope | ||
| - Not suitable for low-resource or edge environments — FHE computation is resource-intensive compared to standard encryption. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you have throughput benchmarks to share? What are the resources requirements?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, let me explain further for your questions.
For stealth address, we have benchmark written in the paper. You may check out the benchmark performance in the page 10 of this paper.
For general FHE computation, Zama has produced a detailed and updated report over the doc. We are developed over Zama's FHE, so we share the same performance in the node level.
For resource requirement: FHE node require high resource in terms of FHE computation and encryption. HE require less-high resource in computation. For stealth address, you can see PC browser can handle for decryption and encryption, and heavy computation is happened in the node via oracle.
Let me know if you need any further explanation. @Meyanis95
What are you adding?
Description
add mind-network as a vendor
Checklist