Penumbra
1.
Concepts and Mechanisms
❱
1.1.
Validators
1.2.
Batching Flows
1.3.
Addresses and Keys
1.4.
Assets and Amounts
1.5.
Notes, Nullifiers, and Trees
1.6.
Transactions
1.7.
Governance
2.
Cryptographic Primitives
❱
2.1.
Proving Considerations
2.2.
The decaf377 group
❱
2.2.1.
Costs and Alternatives
2.2.2.
Inverse Square Roots
2.2.3.
Decoding
2.2.4.
Encoding
2.2.5.
Group Hash
2.2.6.
Test Vectors
2.3.
Randomizable Signatures
2.4.
Key Agreement
2.5.
Poseidon for BLS12-377
❱
2.5.1.
Overview of Poseidon Construction
2.5.2.
Poseidon Parameter Generation
2.5.3.
Test Vectors
2.6.
Fuzzy Message Detection
❱
2.6.1.
Sender and Receiver FMD
2.6.2.
Constructing S-FMD
2.6.3.
S-FMD Threat Model
2.6.4.
S-FMD in Penumbra
2.6.5.
Parameter Considerations
2.7.
Flow Encryption
❱
2.7.1.
Ideal Functionality
2.7.2.
The eddy construction
2.7.3.
Distributed Key Generation
2.7.4.
Homomorphic Threshold Encryption
3.
Addresses and Keys
❱
3.1.
Spending Keys
3.2.
Viewing Keys
3.3.
Addresses and Detection Keys
3.4.
Payload Keys
4.
State Commitment Tree
❱
4.1.
Tiered Commitment Tree
4.2.
Nullifiers
5.
Multi-Asset Shielded Pool
❱
5.1.
Asset IDs and Value Commitments
5.2.
Note Plaintexts
5.3.
Note Commitments
5.4.
Note Ciphertexts
5.5.
Transaction Actions
❱
5.5.1.
Spend
5.5.2.
Output
6.
Decentralized Exchange
❱
6.1.
Sealed-Bid Batch Swaps
6.2.
Concentrated Liquidity
6.3.
LPNFTs
6.4.
On-Chain Routing
6.5.
Liquidity Compensation
6.6.
Transaction Actions
❱
6.6.1.
Swap
6.6.2.
SwapClaim
6.6.3.
Position Actions
7.
Staking and Delegation
❱
7.1.
Staking Tokens
7.2.
Validator Rewards and Fees
7.3.
Voting Power
7.4.
Delegation
7.5.
Undelegation
7.6.
Example Staking Dynamics
7.7.
Arithmetic
7.8.
Transaction Actions
❱
7.8.1.
Delegate
7.8.2.
Undelegate
7.8.3.
UndelegateClaim
8.
Governance
❱
8.1.
Transaction Actions
❱
8.1.1.
DelegatorVote
9.
IBC Integration
❱
9.1.
Transaction Actions
Light
Rust
Coal
Navy
Ayu
The Penumbra Protocol
LPNFTs