Cryptographic Protocol

This chapter describes the cryptographic design of the Penumbra protocol, described in more detail in the following sections:

• The Addressses and Keys section describes the Penumbra key hierarchy and diversified addresses.

• The Notes section describes Penumbra’s private notes and their contents.

• The [Transaction Cryptography][../protocol/transaction_crypto.md] section describes the symmetric keys used at the level of an individual transaction.

Notation

We use the following notation in this chapter:

• denotes the decaf377 group;
• denotes the BLS12-377 scalar field of order ;
• denotes the decaf377 scalar field of order .