How does Tusima achieve on-chain privacy protection?

Trias
4 min readFeb 14, 2022

TL; DR

Tusima uses ZKP (zero-knowledge proof) and privacy computing to provide a solution that takes into account both security and efficiency. Tusima provides an environment in which individuals and enterprises can use data without compromising privacy.

Privacy Problems in Blockchain

The word ‘crypto’ is easy to misunderstand that the blockchain has extremely high anonymous properties, but in fact, the unique openness of the blockchain may expose the privacy of users. Bitcoin uses addresses instead of accounts to achieve anonymity, but privacy protection is still insufficient, because the blockchain is a public ledger, all transactions can be viewed and tracked on a block explorer, and accessible to all.

As long as the address is obtained, anyone can easily query the user’s asset holdings, transaction records, fund sources and on-chain activities in the block explorer. This is also the main purpose of tools such as Whale Alert and DeBank. For example, we can check the amount of assets in an Ethereum address, the source and flow, and many people monitor the flow of assets of whales to discover market hotspots.

Whether in the virtual world or the real world, in many circumstances, people don’t want their addresses to be linked to real information, so there is a need for privacy protection.

Tusima’s solution

Tusima focuses on how to meet the privacy needs of users in the blockchain world, and solves the problem of privacy protection through ZK Rollup and privacy technology.

ZK Rollup

ZK Rollup is an expansion scheme with privacy properties. Its essence is to compress and store the changes of the user status on the chain in the Merkle Tree, use zero-knowledge proof to ensure the correctness of the change process, and submit the proof to the chain superior.

The advantage is that the main chain does not need to verify the legitimacy of each transaction separately, but only needs to verify the validity of Proof, and combine multiple transactions into one to reduce transaction costs and greatly improve the throughput of the main chain. Secondly, as a privacy technology, ZK Rollup can upgrade every ordinary transaction before the merger into a private transaction, providing anonymity for the transaction and protecting the privacy and security of the data.

Tusima makes full use of zero-knowledge proof, and hides the information of the trader in the blockchain record, including the transaction amount, etc. Therefore, in addition to the key owner, even if someone else obtains the IP corresponding to a wallet address, it is impossible to trace all the information related to the transaction, which is also the core of zero-knowledge proof. It can fully prove that it is the legal owner of a certain right without leaking relevant information — it gives zero knowledge to the outside world.

At the same time, the availability of data allows anyone to restore the overall situation of the account based on the transaction data stored on the chain, thereby eliminating the security risks caused by data availability.

Privacy Computing

Privacy computing is a technology that protects private information without affecting the use of data. With the help of privacy computing technology, data can be available but invisible.

Tusima’s privacy computing solution adopts a variety of modern cryptographic algorithms. In addition to the zero-knowledge proof mentioned above, it also includes trusted execution environment (TEE), verifiable computing, homomorphic encryption, secure multi-party computing (MPC), etc., to comprehensively improve the security and scalability of private computing.

For example, a Trusted Execution Environment (TEE) can be regarded as a black box in a secure area. After the data enter the black box, it will be encrypted and the output will be the encrypted data. Anyone without permission or even the underlying operating system It cannot be called illegally by itself. The whole process protects data privacy and ensures that sensitive data will not be leaked to computing nodes or software developers.

And with secure multi-party computing (MPC), different sides can run computing programs on distributed stored data and get correct results without accessing the original data itself, allowing decentralized applications to use encrypted data that will not be leaked, allowing developers to build permissionless and privacy-preserving applications.

In Tusima’s system, all nodes can conduct transactions without trust. The operation of the database and the entire system is open and transparent, and within the rules and time frames of the system, nodes cannot deceive each other.

Tusima enables ordinary users to truly own their own personal data rights. At the same time, through Tusima, enterprises can also use data under the premise of privacy protection.

For example, in the financial field, for different sides in the financial system, when it is necessary to jointly use the private data held by unilaterally, the privacy computing technology in cryptography can realize the protection of privacy without revealing the original data information. Multi-party collaborative analysis of data is carried out to solve the privacy issues involved.

In the DeFi field, Tusima can build a privacy protection wall for DeFi applications. For example, Tusima can provide ZK Rollup and privacy transaction functions for existing DeFi applications, improving the scalability and privacy protection functions of DeFi applications.

--

--

Trias

Trustworthy and Reliable Intelligent Autonomous Systems