Cryptographic Protocol
This chapter describes the cryptographic design of the Penumbra protocol, described in more detail in the following sections:
-
The Addressses and Keys section describes the Penumbra key hierarchy and diversified addresses.
-
The Notes section describes Penumbra’s private notes and their contents.
-
The Transaction Cryptography section describes the symmetric keys used at the level of an individual transaction.
Notation
We use the following notation in this chapter:
- denotes the
decaf377
group; - denotes the BLS12-377 scalar field of order ;
- denotes the
decaf377
scalar field of order .