1. Penumbra
  2. 1. Concepts and Mechanisms
    ❱
    1. 1.1. Validators
    2. 1.2. Batching Flows
    3. 1.3. Addresses and Keys
    4. 1.4. Assets and Amounts
    5. 1.5. Notes, Nullifiers, and Trees
    6. 1.6. Transactions
    7. 1.7. Governance
  3. 2. Staking and Delegation
    ❱
    1. 2.1. Staking Tokens
    2. 2.2. Validator Rewards and Fees
    3. 2.3. Voting Power
    4. 2.4. Delegation
    5. 2.5. Undelegation
    6. 2.6. Example Staking Dynamics
    7. 2.7. Arithmetic
  4. 3. IBC Integration
    ❱
    1. 3.1. Transfers into Penumbra
    2. 3.2. Transfers out of Penumbra
  5. 4. ZSwap
    ❱
    1. 4.1. Sealed-Bid Batch Swaps
    2. 4.2. Concentrated Liquidity
    3. 4.3. Liquidity Compensation
    4. 4.4. LPNFTs
  6. 5. Cryptographic Primitives
    ❱
    1. 5.1. Proving Considerations
    2. 5.2. The decaf377 group
      ❱
      1. 5.2.1. Costs and Alternatives
      2. 5.2.2. Inverse Square Roots
      3. 5.2.3. Decoding
      4. 5.2.4. Encoding
      5. 5.2.5. Group Hash
      6. 5.2.6. Test Vectors
    3. 5.3. Poseidon for BLS12-377
      ❱
      1. 5.3.1. Overview of Poseidon Construction
      2. 5.3.2. Poseidon Parameter Generation
      3. 5.3.3. Test Vectors
    4. 5.4. Fuzzy Message Detection
      ❱
      1. 5.4.1. Sender and Receiver FMD
      2. 5.4.2. Constructing S-FMD
      3. 5.4.3. S-FMD Threat Model
      4. 5.4.4. S-FMD in Penumbra
      5. 5.4.5. Parameter Considerations
    5. 5.5. Flow Encryption
      ❱
      1. 5.5.1. Ideal Functionality
      2. 5.5.2. The eddy construction
    6. 5.6. Threshold Cryptography for Flow Encryption
      ❱
      1. 5.6.1. Distributed Key Generation
      2. 5.6.2. Homomorphic Threshold Encryption
    7. 5.7. Randomizable Signatures
    8. 5.8. Key Agreement
  7. 6. Cryptographic Protocol
    ❱
    1. 6.1. Addresses and Keys
      ❱
      1. 6.1.1. Spending Keys
      2. 6.1.2. Viewing Keys
      3. 6.1.3. Addresses and Detection Keys
    2. 6.2. Asset IDs and Value Commitments
    3. 6.3. Notes
      ❱
      1. 6.3.1. Note Plaintexts
      2. 6.3.2. Note Commitments
      3. 6.3.3. Note Ciphertexts
      4. 6.3.4. Nullifiers
    4. 6.4. Action Descriptions
      ❱
      1. 6.4.1. Fee Descriptions
      2. 6.4.2. Spend Descriptions
      3. 6.4.3. Output Descriptions
      4. 6.4.4. Transfer Descriptions
      5. 6.4.5. Delegate Descriptions
      6. 6.4.6. Undelegate Descriptions
      7. 6.4.7. Commission Descriptions
      8. 6.4.8. Proposal Descriptions
      9. 6.4.9. Vote Descriptions
    5. 6.5. Transaction Cryptography
    6. 6.6. Flow Encryption and Consensus
  8. 7. Chain State
    ❱
    1. 7.1. Ledger Invariants
    2. 7.2. Treestates
    3. 7.3. Genesis Data
    4. 7.4. App Hashes

The Penumbra Protocol

Flow Encryption and Consensus