Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Confidential Transactions (CT)

2 min read
Pronunciation
[kon-fi-den-shuhl tran-zak-shuhnz]
Analogy
Imagine you're paying a friend with special 'privacy-preserving checks.' The check (transaction) is publicly recorded in a ledger so everyone can see it was validly signed and that you had enough in your account to cover it, but the amount written on the check is in invisible ink that only you and your friend can read. So, the transaction's legitimacy is verifiable, but the amount remains private.
Definition
Confidential Transactions (CT) are a cryptographic protocol that enables the amounts of cryptocurrency being transferred in a transaction to be hidden from public view on the blockchain, while still allowing anyone to verify that the transaction is valid (i.e., no coins are created out of thin air). Asset types may also be hidden in some CT implementations.
Key Points Intro
Confidential Transactions obscure transaction amounts on a blockchain, enhancing user privacy while maintaining network verifiability.
Key Points

Amount Obfuscation: Transaction amounts are cryptographically hidden from third-party observers.

Public Verifiability: The network can still validate that the sum of inputs equals the sum of outputs without knowing the actual amounts.

Uses Cryptography: Typically employs Pedersen commitments and range proofs.

Enhanced Privacy: Protects users' financial details from being exposed on a public ledger.

Example
Alice sends 10 BTC to Bob using a blockchain that supports Confidential Transactions. An external observer looking at the blockchain can see that a transaction occurred between Alice's and Bob's (potentially masked) addresses but cannot see the "10 BTC" amount. However, miners/validators can still confirm that Alice did not spend more BTC than she had and that no new BTC was created.
Technical Deep Dive
Confidential Transactions, as originally proposed by Gregory Maxwell for Bitcoin, use Pedersen commitments to commit to transaction amounts. A Pedersen commitment $C = g^v \cdot h^r$ commits to a value $v$ using a blinding factor $r$ and generators $g, h$. This scheme is additively homomorphic, meaning commitments can be added and subtracted, allowing verification that $\sum inputs = \sum outputs$ without revealing the values. Range proofs (e.g., Borromean ring signatures, Bulletproofs) are necessary to prove that each committed amount is within a valid range (e.g., non-negative) to prevent users from creating money. Bulletproofs significantly optimized the size of these range proofs.
Security Warning
The cryptographic primitives underlying CT (like Pedersen commitments and range proofs) must be correctly implemented. Flaws could lead to broken privacy or even the possibility of undetected inflation bugs. The complexity makes auditing critical.
Caveat
Confidential Transactions add computational overhead and increase transaction size compared to transparent transactions, which can affect scalability. Regulatory attitudes towards privacy-enhancing technologies like CT can also be a concern for adoption in some contexts.

Confidential Transactions (CT) - Related Articles

No related articles for this term.