Difference between revisions of "Enigma"

From CloakCoin Wiki
Jump to: navigation, search
(Marked this version for translation)
Line 12: Line 12:
  
  
<translate>When a node sends funds via Enigma to an stealth address, the following happens:</translate>
+
<translate><!--T:24--> When a node sends funds via Enigma to an stealth address, the following happens:</translate>
  
#<translate>Sender generates inputs to cover amount sent, enigma reward (sent * (.2-1)%) and network fee (unknown at present, so ample reserved).</translate>
+
#<translate><!--T:25--> Sender generates inputs to cover amount sent, enigma reward (sent * (.2-1)%) and network fee (unknown at present, so ample reserved).</translate>
#<translate>Sender generates a CloakingRequest object (containing unique stealth nonce for this request).</translate>
+
#<translate><!--T:26--> Sender generates a CloakingRequest object (containing unique stealth nonce for this request).</translate>
#<translate>Sender generates 2 or 3 one-time stealth payment addresses using the recipients stealth address and splits the sent amount randomly between the addresses.</translate>
+
#<translate><!--T:27--> Sender generates 2 or 3 one-time stealth payment addresses using the recipients stealth address and splits the sent amount randomly between the addresses.</translate>
#<translate>Sender onion routes CloakRequest to network. The request contains the 'send amount' so that Cloakers know how much to reserve.</translate>
+
#<translate><!--T:28--> Sender onion routes CloakRequest to network. The request contains the 'send amount' so that Cloakers know how much to reserve.</translate>
#<translate>Cloaker picks up CloakRequest and decides to participate.</translate>
+
#<translate><!--T:29--> Cloaker picks up CloakRequest and decides to participate.</translate>
#<translate>Cloaker supplies X inputs to sender and a stealth address and stealth hash (for their change).</translate>
+
#<translate><!--T:30--> Cloaker supplies X inputs to sender and a stealth address and stealth hash (for their change).</translate>
#<translate>Cloaker sends CloakingAcceptResponse to Sender. This contains stealth address, stealth nonce and TX inputs.</translate>
+
#<translate><!--T:31--> Cloaker sends CloakingAcceptResponse to Sender. This contains stealth address, stealth nonce and TX inputs.</translate>
#<translate>Sender waits until enough Cloakers have accepted.</translate>
+
#<translate><!--T:32--> Sender waits until enough Cloakers have accepted.</translate>
#<translate>Sender creates Enigma transaction using own inputs and Cloaker inputs. Inputs are shuffled.</translate>
+
#<translate><!--T:33--> Sender creates Enigma transaction using own inputs and Cloaker inputs. Inputs are shuffled.</translate>
#<translate>Sender creates TX ouputs for all Cloakers. The outputs randomly split their change and return it to them. This also allocates the cloaking reward to Cloakers.</translate>
+
#<translate><!--T:34--> Sender creates TX ouputs for all Cloakers. The outputs randomly split their change and return it to them. This also allocates the cloaking reward to Cloakers.</translate>
#<translate>Sender creates their own change returns for the Enigma TX. These are one-time stealth payment addresses.</translate>
+
#<translate><!--T:35--> Sender creates their own change returns for the Enigma TX. These are one-time stealth payment addresses.</translate>
#<translate>The Sender calculates the network TX fee and subtracts this from their own change return.</translate>
+
#<translate><!--T:36--> The Sender calculates the network TX fee and subtracts this from their own change return.</translate>
#<translate>The Sender sends the Enigma TX to the Cloakers for signing.</translate>
+
#<translate><!--T:37--> The Sender sends the Enigma TX to the Cloakers for signing.</translate>
#<translate>Cloakers check the TX to ensure their inputs are present and correct and that there are one-time payment addresses linked to one of thier stealth addresses with payment that exceeds the input amount.</translate>
+
#<translate><!--T:38--> Cloakers check the TX to ensure their inputs are present and correct and that there are one-time payment addresses linked to one of thier stealth addresses with payment that exceeds the input amount.</translate>
#<translate>Cloakers sign or reject the TX and send signatures to Sender.</translate>
+
#<translate><!--T:39--> Cloakers sign or reject the TX and send signatures to Sender.</translate>
#<translate>Sender collates the signatures and transmits the finalized, signed TX to the network.</translate>
+
#<translate><!--T:40--> Sender collates the signatures and transmits the finalized, signed TX to the network.</translate>
#<translate>Nodes scan incoming transactions for stealth payments and Enigma payments and detect any payments or change. Keypairs and addresses are generated for any matching payments and generated keys/addresses are saved to the local wallet.</translate>
+
#<translate><!--T:41--> Nodes scan incoming transactions for stealth payments and Enigma payments and detect any payments or change. Keypairs and addresses are generated for any matching payments and generated keys/addresses are saved to the local wallet.</translate>
  
  

Revision as of 10:15, 26 October 2018

Other languages:
English • ‎Tiếng Việt • ‎Türkçe • ‎español • ‎português • ‎中文(中国大陆)‎
The Enigma Logo 2017


The inspiration for the name comes from the meaning of the original greek word – riddle, puzzle, mystery – and describes Cloakcoin’s Enigma: private, secure, untraceable and decentralized transactions.


Enigma in cooperation with Cloakshield makes it impossible for any outside observers to trace payments done with CLOAKCOIN.

Enigma - Transaction Process

When a node sends funds via Enigma to an stealth address, the following happens:

  1. Sender generates inputs to cover amount sent, enigma reward (sent * (.2-1)%) and network fee (unknown at present, so ample reserved).
  2. Sender generates a CloakingRequest object (containing unique stealth nonce for this request).
  3. Sender generates 2 or 3 one-time stealth payment addresses using the recipients stealth address and splits the sent amount randomly between the addresses.
  4. Sender onion routes CloakRequest to network. The request contains the 'send amount' so that Cloakers know how much to reserve.
  5. Cloaker picks up CloakRequest and decides to participate.
  6. Cloaker supplies X inputs to sender and a stealth address and stealth hash (for their change).
  7. Cloaker sends CloakingAcceptResponse to Sender. This contains stealth address, stealth nonce and TX inputs.
  8. Sender waits until enough Cloakers have accepted.
  9. Sender creates Enigma transaction using own inputs and Cloaker inputs. Inputs are shuffled.
  10. Sender creates TX ouputs for all Cloakers. The outputs randomly split their change and return it to them. This also allocates the cloaking reward to Cloakers.
  11. Sender creates their own change returns for the Enigma TX. These are one-time stealth payment addresses.
  12. The Sender calculates the network TX fee and subtracts this from their own change return.
  13. The Sender sends the Enigma TX to the Cloakers for signing.
  14. Cloakers check the TX to ensure their inputs are present and correct and that there are one-time payment addresses linked to one of thier stealth addresses with payment that exceeds the input amount.
  15. Cloakers sign or reject the TX and send signatures to Sender.
  16. Sender collates the signatures and transmits the finalized, signed TX to the network.
  17. Nodes scan incoming transactions for stealth payments and Enigma payments and detect any payments or change. Keypairs and addresses are generated for any matching payments and generated keys/addresses are saved to the local wallet.


Enigma Transaction


Analyzing a ENIGMA transaction with the Blockexplorer the inputs are located on the left and outputs on the right, the number depends on how many cloakers were used. If 21 cloakers/mixers are used, there will be 21 matching outputs on the right and also 21 times as many inputs on the left. Only the sender and recipient know who the real sender is. So, in essence, 20 other people pretended to also send coins, but really sent them back to themselves.



C0.png
Free of Copyright Restrictions.


Page under construction!