EZEE Signals

What are EZEE Signals?:

EZEE Signals is a signer-ambiguous, anonymous message-passing protocol between two endpoints, leveraging many-out-of-many proofs and application identifiers. Within the EZEE framework, it fragments the encryption and execution layers, allowing users to segregate their states while performing operations on target applications. Instead of permitting end contracts to directly update the user’s primary account in the encryption layer, EZEE enables these contracts to anonymously access temporary assets through the user’s secondary accounts. EZEE Signals establishes anonymous asset transfer channels between the encryption and execution layers by creating two private endpoints, defined as a function ϕ := (π, α), where π is a protocol for selecting a tuple of accounts based on the operation result α.

EZEE Signals

Through EZEE Signals, users can connect to target applications from the encryption layer and execute privacy-preserving function calls. Once the resulting state is reflected in the user’s secondary account, the user can aggregate this public yet anonymous state back into their primary account within the encryption layer. This ensures efficient data privacy, shielding the user’s account state from network observers.

In summary, EZEE creates a framework for programmable privacy, enabling users to update arbitrary smart contracts in a privacy-preserving manner without suffering from State Denial. Unlike other protocols that rely on encrypted inputs, making end contracts dependent on such data to expand system states, EZEE adopts a design that separates the framework into constant and expandable system states. It segregates the user’s primary encrypted account into multiple secondary account states to orchestrate target execution silos. These silos, operating within the execution layer, interact with end contracts that can access the system’s global shared state without depending on encrypted inputs. By using EZEE Signals, the framework creates application-dependent anonymous asset transfer channels, enabling the aggregation of states from various execution silos back into the encryption layer, thus providing composable data privacy.

Last updated