Implementation and preliminary evaluation of an auditable confidentiality mechanism for DeFi

Ao Xuan Li, Su Kit Tang, Gabriele D'Angelo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A well-known use of the blockchain technology is Decentralized Finance (DeFi). DeFi makes financial information accessible to the public but raises potential privacy and security issues. In this study, we implemented a DeFi protocol that protects privacy, which is based on the Mystiko.Network protocol. As a proxy between the user and DeFi platforms, the Mystiko.Network protocol offers an auditable confidentiality mechanism for blockchain transactions. Via the new system, users may submit anonymous DeFi transactions and get income back into a shielded tokens pool. Moreover, we implemented a rollup approach to handle anonymous DeFi transactions in groups. The evaluation results suggest that the protocol is both practical and affordable, in fact it is able to save around 90% of the cost for DeFi transactions.

Original languageEnglish
Title of host publicationProceedings - 2023 IEEE 43rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages49-54
Number of pages6
ISBN (Electronic)9798350328127
DOIs
Publication statusPublished - 2023
Event43rd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2023 - Hong Kong, China
Duration: 18 Jul 202321 Jul 2023

Publication series

NameProceedings - 2023 IEEE 43rd International Conference on Distributed Computing Systems Workshops, ICDCSW 2023

Conference

Conference43rd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2023
Country/TerritoryChina
CityHong Kong
Period18/07/2321/07/23

Keywords

  • DeFi
  • Privacy
  • Zero-knowledge Proof

Fingerprint

Dive into the research topics of 'Implementation and preliminary evaluation of an auditable confidentiality mechanism for DeFi'. Together they form a unique fingerprint.

Cite this