Prove Anything, Reveal Nothing
Findora’s features are enabled by a toolbox of highly efficient zero-knowledge proofs and other advanced cryptography including homomorphic encryption and authenticated data structures, specifically tailored to be as efficient as possible for our applications. Some are based on peer-reviewed inventions by Findora’s research team, such as Bulletproofs and Supersonic. In addition to built-in features, a general toolkit is provided to users and developers for flexible use custom applications.
Confidential transactions can completely hide the amount and/or asset type sent within the transaction. The inputs and outputs to a confidential transfer hide asset amounts and types inside Pedersen commitments.
With confidential policies, verifiable custom rule sets can be imposed on confidential transactions, without having to publicly reveal the rules.
Confidential Smart Contracts
Confidential smart contracts can be enforced without having to reveal any details about the contract.
Anonymous transactions can not only hide the amount and asset type, but also hide addresses of the sender and the receiver. This is done by revealing a unique random-looking nullifier associated with the UTXO being spent, rather than showing the UTXO itself. This effectively prevents double-spending.
Verifiable Selective Reveal
For auditing purposes, a user can selectively reveal components of their private data, instead of their entire personal financial profile. In many cases, a user can prove complex statements about themselves (e.g., an income range, proof that they are an accredited investor and complex combinations of several qualifications) without revealing any additional personal details at all.
Proof of Solvency
A proof of solvency for a financial platform (such as an Internet lending platform, hedge fund, trading business, exchange, or other Internet financial service) demonstrates that the value of asset-backed tokens owned by the platform exceeds its liabilities to consumers. This enables the financial platform to demonstrate solvency even when the assets and liabilities recorded on the ledger are confidential.
Proof of Whitelisted Asset
A proof of whitelisted asset is a proof that a (confidential) asset token purchased by a fund is on a whitelist of approved assets. The technology behind these proofs combines cryptographic accumulators with zero-knowledge proofs.
Confidential Asset Tracing
The issuer of an asset may place a tracing policy on the asset to ensure that every future transaction involving this asset will be visible to the issuer, while remaining completely confidential to the public. For example, a company issuing stock could place a tracing policy on the stock asset so that it can track the identities of its shareholders even as the stock passes hands through confidential secondary trades. The exact information visibility is configurable, as is the list of viewers (the viewer may be a regulator or arbitrator instead of the issuer). Users can see what policies are attached to an asset and avoid using it if they are uncomfortable with the policies.
ZK-Rollups can bundle hundreds of transfers into a single SNARK (succinct non-interactive argument of knowledge). This greatly improves scalability and reduces storage requirements.
Findora uses highly efficient ZKPs and accumulators that allow users to verify data quickly and greatly reduce storage requirements.
Create an internet of ledgers
Findora enables a network of independent yet interoperable financial networks to form. Instances of the Findora ledger can be deployed in a variety of operational configurations, in addition to the main ledger operated by the distributed governance of FIN holders. Separate instances are called side ledgers. Side ledgers could be centrally managed, private, and/or use a different consensus protocol entirely. Ledgers connected to the main ledger are interoperable, enabling side ledgers to transact with each other.