QURAS And Its Privacy Technology

Image for post
Image for post

QURAS utilizes the two leading privacy technologies, ring signatures and zero-knowledge proofs, to give network users options in the way that confidentiality is handled within the transactions. Readers should refer to the Quras technical whitepaper for details on the mechanics of implementation.

Transparent Transactions

Transparent addresses work similarly to what is implemented on Bitcoin. The private key is generated randomly first out of the key pair, and the public key is then derived using Elliptic Curve Cryptography (ECC). QURAS uses a secp256r1 standard for its public key generation, which is enforced by organizations such as the NSA. Although Bitcoin uses the secp256k1 standard for its key pair generation, QURAS uses an alternative as an extra measure of security.

Confidential Transactions

Users can choose between two industry-leading private transaction methods, zk-SNARKs (zero-knowledge proofs) and ring signatures. The former is considered as a more robust method of privacy; however, will consume more system resources to produce the result. Thus, the second option of Ring Confidential Transactions is offered to give users an option of fast and light anonymous transactions. To accommodate for these transaction types, users can generate the appropriate keys to construct the transactions — spend, receiving, viewing, anonymous and stealth keys.

Privacy Protecting Contracts

The QURAS blockchain includes a virtual machine layer, which users can use to deploy smart contracts written in C#, a widely adopted programming language.7 Developers can utilize two key functions within their contract code — zero-knowledge proof and validation methods. These functions are general purpose and can be implemented in the contract code for a wide variety of use cases.

As these privacy methods are merely functions, developers freely choose to use them in order to create transparent or secret contracts. Whenever a user calls (interacts) with a smart contract, QURAS GAS is consumed.

Image for post
Image for post

Privacy Protecting Contracts

There are two types of anonymous transactions — complete anonymity and partial anonymity.

Completely Anonymous Transaction means all transaction information will be hidden including sender’s address, recipient’s address, remitted amount, etc.

Image for post
Image for post

A Partly Anonymous Transaction means a part of transaction information such as the sender’s address, recipient address or remittance amount is hidden.

Image for post
Image for post

A Part Anonymous Transaction uses zk-SNARKs or the ring signature technology to realize the anonymous effect. For more details, please refer to the technical paper.

Written by

Secret Contract Platform for Privacy 2.0

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store