Professional Documents
Culture Documents
WSN Litepaper
WSN Litepaper
WSN Litepaper
1. Barriers
In the conditions of openness and audibility of accounting systems, sometimes it's pretty dif cult
to ensure such properties as con dentiality and anonymity. Some systems solve problems locally,
providing only properties they (and their users) need. Monero uses ring signatures and stealth
addresses to ensure the anonymity of counterparties, Bulletproofs as a range proofs mechanism
[1]. ZCash uses zkSNARKS [2]. MimbleWimble (Grin) - Pedersen commitments as well as
Schnorr's signature scheme (also along with Bulletproofs)
[3]. On the one hand, this is the good approach that allows focusing on the tasks that are relevant
to this system (not to provide technology for the sake of technology). On the other hand, there is a
lack of exibility that makes it necessary to reinvent / rebuild the necessary privacy technologies
for use in systems that do not coincide (or do not completely coincide) with listed ones.
fl
fi
fi
Thus, there are no protocols (and most importantly, ready implementations) suitable for
wider applications (not only payments), which allow exible use of uni ed approaches
to achieve certain privacy properties. Also, the implementation of such protocols on top
of existing smart contract platforms (like Ethereum) is often not an effective solution.
For example, in order to add veri cation of another signature algorithm when calling
contract methods, you need to add a special veri er function to the contract, which
spends additional (most often redundant resources) and does not eliminate the need
to use the native signature algorithm of the system to initiate an operation.
fi
fi
fl
fi
Wave Security Network
2. Mission
The purpose of Wave Security Network is
to shape common practices and provide
versatile tools for various privacy options in
the bounds of one platform.
That is, Wave Security is both a platform
for building decentralized applications with
privacy options, and at the same time a
framework for building similar private
systems (but potentially with narrower
case).
Private Solutions
As a native currency in the Wave Security Network platform
WSN token is used. It’s designed for:
The main purpose of stealth addresses is to hide the recipient of coins, tokens, data, etc. The
main idea is that the sender can generate a one-time address that cannot be associated with the
recipient's public key / address, but only the recipient can spend funds from such an address.
It is planned to add ISAP [5] and tx
generated. tx
Bob
Alice Accounting system Bob
But in this case, the user needs to
r < - random b - secret keys
R = r*G B - public keys
use his own private key to search
for transactions that relate to him,
and this is not the safest and most
c = H (r*B)
convenient approach (the user must
be guaranteed to trust the owner of
Transaction
address: c*G+B for each tx
the auditor node or raise his own).
c = H (b*R)
?
Sign Therefore, the second option is to
address= c*G+B with c+z
use the DKSAP algorithm.
Alice Accounting system Bob
3.2.1 Multisignatures
In this case, it is worth distinguishing between 3 types of multisignatures. The rst type
is classic - the use of one type of signature and several keys to calculate the signature of
a transaction (like a multisignature in Bitcoin). In this case, the transaction contains a
set of signatures and a set of public keys with which they must be veri ed.
fi
fi
tx tx
Body
Body
Sig1 pk1
Multisig
Sigaggr pkaggr
Multisig
The second type is multisignature with support Sig2 pk2
That is, in fact, you can lock the possibility of SigECDSA pkECDSA
initiating an action between users who use
Multisig
SigSchnorr pkSchnorr
various signature algorithms. In this way, for … …
example, swaps can be implemented.
fi
3.2.4 Post-quantum Signature Algorithms
The SPHINCS+ [12] digital signature algorithm, submitted to the NIST post-
quantum crypto project [13], will act as the initial implementation of post-quantum
cryptography algorithms (the algorithm proved to be quite good at all stages of the
competition). Also, due to the basic cryptographic protocols embedded in Wave
Security Network, this algorithm can be quickly and ef ciently implemented.
3.2.5 Future
The community will be responsible for managing the system. The community can
expand the list of supported hash functions, encryption algorithms, signatures
(including types of signatures such as adding proxies, threshold or blind signatures),
and the algorithms that are based on them.
fi
3.3 Zero Knowledge Proofs 3.4 Decentralized Store
Naturally, one of the most demanded Wave Security Network also supports
mechanisms for ensuring privacy is zero decentralized storage. It will be based on
knowledge proofs. The most common cases are IPFS [16]. Each validator, together with the
range proofs and proofs of the occurrence of system node, will have to raise the IPFS
certain data in the general set. However, the key network node and store additional data
challenge for Wave Security Network is to provide ( les, media data, calculation results, etc.).
tools that are potentially suitable for any use The storage of such data will be paid
case. Therefore, one of the rst such tools will be separately by the users for the period of their
Bulletproofs [14] and Merkle Trees [15]. In the storage. To prove that the data itself is really
future, the project community will work to provide stored by validators, the latter will publish
tools for narrower cases with the aim of usability the corresponding proofs to the system.
and optimization of the required resources.
fi
fi
4. Bridges
5. Operations
Providing the functionality described above on
top of smart contracts in Ethereum is quite and Contracts
problematic and much less ef cient than in
Another distinctive feature of Wave Security
Wave Security Network (including due to the
Network is the constant preset cost for using
size of current fees). However, at the same
cryptographic primitives supported by the
time, it should be possible to transfer the
system. All other contract logic is calculated in
assets created in ProjectX to other public
the same way as in other contract platforms.
networks. For this, Wave Security Network
Such an element motivates users to use built-in
implies the presence of native bridges for cryptographic mechanisms, which are much
ERC20 and ERC721 tokens on Ethereum and cheaper than in similar platforms. The cost of
Flow. Thus, tokens with privacy options can be using various operations can be changed by the
created inside Project and, if necessary, community.
transferred to other systems.
fi
6. Use Cases
Wave Security Network is designed for building solutions for:
- Ensuring the con dentiality of data transferred between
counterparties and their integrity at the blockchain level;
- Ensuring the anonymity of the sender / receiver of off-chain data with the ability to add tags
to the chain, allowing counterparties to learn about the events associated with their sending;
- Ensuring the con dentiality of transfer amounts with protection
against double-spending attacks;
- Ensuring the anonymity of the sender / recipient of the NFT;
- Decentralized applications with privacy requirements: voting
systems, registries, etc.
fi
fi
7. Roadmap
- 3 Managers
- 14 Software Enineers
& DLT Experts
8. Team
- 3 Designers