Common terms and Panther-specific usage.
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
Within Panther Protocol, the term appending is used to describe the process of reading queued UTXOs from storage and creating a batch of up to 64 UTXOs.
Within Panther Protocol, the term batch is used to describe a group of up to 64 UTXOs.
Digital asset using cryptography to secure transactions.
Cryptocurrencies and cryptography are indissociable because the digital asset uses cryptography to secure transactions. With no centralilized authority regulating the system, it operates while nodes support it. Panther Protocol provides a privacy-enhanced trading service for users to trade digital assets such as cryptocurrencies.
To be considered cryptographically secured, the result needs to be:
Confidential — Not understood by anyone
Unalterable by anyone, including the creator
Non-repudiable: This means that the sender or creator cannot deny their intentions at later stages
Able to be authenticated by all parties involved
Within Panther Protocol, the term dummy is used to describe a placeholder UTXO used to fill up a queue to 64 UTXOs.
Decentralization, in simple terms, means dissolving central authority and giving the right of governance to the stakeholders involved in the system, giving full control back to the ordinary user. Panther Protocol is governed by a decentralized authority, the Panther DAO.
Shielded Pools are connected to popular DeFi protocols through custom plugins called “DeFi Adaptors.” The first use case for Panther’s DeFi Adaptors, zSwap, allows users to execute swaps on the most liquid DEXs without publicly revealing their identity.
By allowing users of multiple kinds of assets to enter the Pool (e.g., different token types supported within a given chain, such as ERC-20, non-fungible, and other standards of tokens), users of every compatible token can access the same privacy, regardless of the liquidity of their assets. While a single-asset Pool for rarely-used tokens would struggle to find much security due to the relatively low volume of transactions, MASPs can leverage popular assets to quickly build critical speed and provide much-needed privacy to the long tail of crypto assets.
The fact that different types of assets can co-exist in the same Pool is called Diverse Pool Privacy. Thanks to it, Pools can get large enough to preserve data heterogeneity, i.e. have so many transactions happening within them that it becomes challenging to track and deanonymize users.
[Elliptic-curve Diffie–Hellman (ECDH)](https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman#:~:text=Elliptic%2Dcurve%20Diffie%E2%80%93Hellman%20(,or%20to%20derive%20another%20key) is is a variant of the Diffie–Hellman protocol using elliptic-curve cryptography. ECDH provides a key agreement protocol that enables two parties to share secrets over insecure channels. This shared secret may be a key, or, as in the case of Panther Protocol, it can be used to derive a key. The key, or the derived key, is then used to decrypt/encrypt subsequent communications using a symmetrical key cipher.
Panther Protocol uses EDCH over the baby Jubjub elliptic curve.
Within the Panther Protocol, the zAsset is always backed by 1:1 of the underlying asset, i.e. fully collateralized. If you have 1 zBTC (privacy-enhanced BTC), that zBTC is always backed by an entire BTC within a Panther Vault.
Hash functions are used in data storage. Often, they convert variable input-sized data into fixed-sized values.
Within Panther Protocol, inserting describes the process of adding a batch of up to 64 UTXOs to the Merkle Tree.
“Interoperable” means that Panther will provide DeFi users with privacy no matter what public blockchain is used by their DeFi application of choice. Panther can be perceived as a private hub that connects all public blockchains, creating a privacy pipe that creates one robust privacy-enabled environment.
Keys are used to decrypt cryptographic secrets. Public keys are points on an elliptic curve, while private keys are scalars in the field. Thus keys are found in pairs, or keypairs.
Within Panther, Multi-Asset Shielded Pools (MASPs) are sets of smart contracts where users can deposit various tokens. Within a pool, the transaction path of these tokens is safeguarded by Zero-Knowledge proofs (ZKPs). This renders the transactions within these pools untraceable while providing users with the flexibility to selectively disclose information, thus enabling a pathway to compliance.
A Merkle tree is a hash-based data structure stored in a tree-like structure. Hashes may encode files that are much smaller than the original data file. Each leaf node of the tree is a hash of a block of data, and each non-leaf node is a hash of its children.
Merkle trees are useful in distributed systems as they provide an efficient data verification mechanism. They are popular in peer-to-peer networks such as Bitcoin and Git. Panther uses Merkle trees in its MASP.
Ecosystem operators known as zMiners earn rewards by running an Oshiya node to collect and process Shielded Pool transactions.
Panther’s Oshiya selects a batch of pending transactions represented by UTXOs from the mining queue on the Bus tree and creates a SNARK-proof that proves the correctness of Merkle tree updates it proposes, and submits these updates to be written on-chain together with the proof to the smart contract. Finally, Oshiya validates this proof by calling a verifier contract and updates the root Merkle Tree of the Panther contract.
Oshiya’s use of SNARKs provides operational efficiency by enabling up to 64 transactions to be committed to one proof.
Panther is a cross-protocol app layer that uses Zero-Knowledge technology to build DeFi solutions that meet regulatory requirements and satisfy users’ on-chain data privacy needs.
A Privacy Encancing Technology, PET, improves the privacy layer. No two methods are equal in their impact.
Within Panther Protocol, a queue is a group of UTXOs held in storage on-chain.
Panther Relayers provide an (optional) privacy layer within Panther Protocol by breaking the link between the initiator of the transaction and the transaction itself.
Panther Relayers are network operators who charge a fee for signing transactions with their public key, paying the transaction gas fees, and relaying bundles of transactions to the Shielded Pool contract where they are processed by zMiners. Relayers enhance privacy, since observers are unable to pinpoint the actual address that initiated the transaction.
A proprietary Multi Asset Shielded Pool is core to Panther Protocol's private operating environment: allowing users to conduct (disclosable) confidential digital asset trades.
Shielded Pools are essentially a collection of append-only Merkle trees, where each leaf is a commitment to a UTXO representing a number of zAssets (or zNFTs).
Users trade UTXOs that represent the underlying locked asset. The UTXOs may only be traded within a Shielded Pool. The Shielded Pool acts like a walled garden: only invited users and assets may enter. Assets are deposited in the Panther vault in exchange for a zAsset.
Slippage is the delta between the anticipated price of an order and the execution price.
Panther DAO has approved staking yield pre-mainnet beta launch to reward the growing community. DeFi Lama tracks Panther Protocol’s market capitalization and Advanced Staking TVL (total volume locked).
Public blockchains require transparency to allow anyone, and most importantly node operators, to validate transactions without dependence on centralized intermediaries. This transparency, while advantageous in many respects, also necessitates a privacy solution. This is what Panther Protocol offers.
UTXO, or Unspent Transaction Output, defines the outcome of a digital transaction or an on-chain state update, such as merging zAssets into one record. Bitcoin uses UTXOs, but the cryptocurrency is not itself a UTXO. Within Bitcoin, if Alice has a UTXO representing 5 BTC and wants to send Bob 2 BTC, the entire UTXO is unlocked and sent to Bob and Bob returns a UTXO to the value of 3 BTC.
Alternatively, Alice may own 2 UTXOs that, in total, represent 2 BTC and both of these will have their ownership transferred to Bob to complete the transaction.
Panther Protocol also leverages a UTXO model, but one that is quite unique to the use cases it solves for.
VASPs are virtual asset service providers. In most states, entities like crypto exchanges must be licensed to provide VASP services. Within Panther, the Zone Manager must be a licensed VASP.
Within Panther, zAccounts are akin to bank accounts that safeguard users’ on-chain data privacy and ownership. All transactions conducted by a given user are linked to the same zAccount. Panther developed this novel mechanism to support compliance, decentralized identity, and selective disclosures.
zAccounts are implemented using a particular type of UTXO inside the UTXOs Merkle Tree. Every zAccount UTXO contains important values at a user/account level, such as the zAccount’s ID, zAsset balances, PRP balance, ZoneID, etc.
A zAsset, is a "mirror" asset that is printed when an asset is deposited and locked in the Panther contract. It’s subsequently spent when that asset is withdrawn.
When an asset is deposited and locked in the Panther vault, a UTXO or zAsset is printed. In this way, the zAsset:asset always exists in a strict 1:1 ratio. Users can send, swap, receive, and pay with zAssets.
Shielded Pools may be deployed onto multiple blockchains (L1s and L2s) to realize the Protocol’s vision of cross-chain Zero-Knowledge access to DeFi. The zBridges will connect these Pools on different blockchain networks, enabling privacy-enhanced cross-chain transactions.
zMiners are ecosystem operators who earn rewards by running an Oshiya node.
zMiners are essential contributors to the transaction processing capabilities of Panther Protocol. They decentralize the responsibility of processing queues containing up to 64 UTXO commitments with a SNARK proof, enabling continual execution of transactions in Panther's Shielded Pools.
A licensed entity that configures a trading area by allowlisting assets and trusted counterparties.