Anonymity Revoking
The anonymity revoking system allows authorized parties to decrypt compliance payloads attached to on-chain transactions, enabling regulatory investigations while preserving privacy for all other users.
The only operation that hides a transaction amount is transfer — it includes an encrypted compliance payload (the amount encrypted under a compliance public key). Conceal and reveal both have the amount visible on-chain, so no compliance ciphertext is needed. Sender and recipient BPKs are already public inputs in the Concealed Balances account model; only the transfer amount requires encryption for compliance purposes.
| Document | Description |
|---|---|
| On-Chain Components | Contracts and circuits that produce encrypted compliance payloads |
| Decryption Protocol | Key generation, threshold decryption, and proofs of correct decryption |
| Revoking Process | Roles, workflows, and the coordination service for handling regulatory requests |