1. Penumbra
  2. 1. Concepts and Mechanisms
    ❱
    1. 1.1. Validators
    2. 1.2. Batching Flows
    3. 1.3. Addresses and Keys
    4. 1.4. Assets and Amounts
    5. 1.5. Notes, Nullifiers, and Trees
    6. 1.6. Transactions
    7. 1.7. Governance
  3. 2. Staking and Delegation
    ❱
    1. 2.1. Staking Tokens
    2. 2.2. Validator Rewards and Fees
    3. 2.3. Voting Power
    4. 2.4. Delegation
    5. 2.5. Undelegation
    6. 2.6. Example Staking Dynamics
    7. 2.7. Arithmetic
  4. 3. IBC Integration
    ❱
    1. 3.1. Transfers into Penumbra
    2. 3.2. Transfers out of Penumbra
  5. 4. ZSwap
    ❱
    1. 4.1. Sealed-Bid Batch Swaps
    2. 4.2. Concentrated Liquidity
    3. 4.3. Opening Positions
    4. 4.4. Liquidity Compensation
    5. 4.5. Closing Positions
  6. 5. Cryptographic Primitives
    ❱
    1. 5.1. Proving Considerations
    2. 5.2. The decaf377 group
      ❱
      1. 5.2.1. Costs and Alternatives
      2. 5.2.2. Inverse Square Roots
      3. 5.2.3. Decoding
      4. 5.2.4. Encoding
      5. 5.2.5. Group Hash
      6. 5.2.6. Test Vectors
    3. 5.3. Poseidon for BLS12-377
      ❱
      1. 5.3.1. Test Vectors
    4. 5.4. Fuzzy Message Detection
      ❱
      1. 5.4.1. Sender and Receiver FMD
      2. 5.4.2. Constructing S-FMD
      3. 5.4.3. Parameter Considerations
    5. 5.5. Flow Encryption
      ❱
      1. 5.5.1. Ideal Functionality
      2. 5.5.2. The eddy construction
    6. 5.6. Threshold Cryptography for Flow Encryption
      ❱
      1. 5.6.1. Distributed Key Generation
      2. 5.6.2. Homomorphic Threshold Encryption
    7. 5.7. Randomizable Signatures
    8. 5.8. Key Agreement
  7. 6. Cryptographic Protocol
    ❱
    1. 6.1. Addresses and Keys
      ❱
      1. 6.1.1. Spending Keys
      2. 6.1.2. Viewing Keys
      3. 6.1.3. Addresses and Detection Keys
    2. 6.2. Value Commitments
    3. 6.3. Notes
      ❱
      1. 6.3.1. Note Plaintexts
      2. 6.3.2. Note Commitments
      3. 6.3.3. Note Ciphertexts
      4. 6.3.4. Nullifiers
    4. 6.4. Action Descriptions
      ❱
      1. 6.4.1. Fee Descriptions
      2. 6.4.2. Spend Descriptions
      3. 6.4.3. Output Descriptions
      4. 6.4.4. Transfer Descriptions
      5. 6.4.5. Delegate Descriptions
      6. 6.4.6. Undelegate Descriptions
      7. 6.4.7. Commission Descriptions
      8. 6.4.8. Proposal Descriptions
      9. 6.4.9. Vote Descriptions
    5. 6.5. Flow Encryption and Consensus
  8. 7. Chain State
    ❱
    1. 7.1. Ledger Invariants
    2. 7.2. Treestates
    3. 7.3. Genesis Data
    4. 7.4. App Hashes

The Penumbra Protocol

Opening Positions