Cryptographic Protocols
Untrace Protocol employs a suite of cryptographic primitives to ensure confidentiality, integrity, and non-repudiation across all modules. Core protocols include:
Elliptic Curve Cryptography (ECC): Utilizes secp256k1 and BLS12-381 curves for secure key generation and digital signatures.
Hash Functions: Keccak-256 for Ethereum compatibility and SHA-256 for cross-chain proofs.
AES-256-GCM: Authenticated encryption for symmetric key transport in messenger and VPN modules.
Threshold Cryptography: Shamir’s Secret Sharing and threshold BLS signatures for distributed validator consensus in the Privacy Bridge.
Last updated