Cryptographic Protocols

Untrace Protocol employs a suite of cryptographic primitives to ensure confidentiality, integrity, and non-repudiation across all modules. Core protocols include:

  • Elliptic Curve Cryptography (ECC): Utilizes secp256k1 and BLS12-381 curves for secure key generation and digital signatures.

  • Hash Functions: Keccak-256 for Ethereum compatibility and SHA-256 for cross-chain proofs.

  • AES-256-GCM: Authenticated encryption for symmetric key transport in messenger and VPN modules.

  • Threshold Cryptography: Shamir’s Secret Sharing and threshold BLS signatures for distributed validator consensus in the Privacy Bridge.

Last updated