level
Expert Level Reading
25 May, 2024

Shielded Transaction

[ Shiel-ded tran-sak-shuhn ]

A shielded transaction is a type of blockchain transaction based on zero-knowledge proofs that shields two addresses for privacy.

Yulia Zakharchuk
Written by
Julia Zakharchuk
Yulia Zakharchuk Julia Zakharchuk Expert Author
Julia is a professional crypto and blockchain writer known for her insightful YouTube channel "MoneyFest." She showcases her dynamic presentation skills as a host and moderator at blockchain conferences. Julia drives also business development at ChainUp and advises UNITBOX, an innovative NFT renting protocol. With her exceptional expertise, Julia is a highly valued industry contributor...
Yevheniia Broshevan
Fact checked by
Yevheniia Broshevan
Yevheniia Broshevan Yevheniia Broshevan Expert
Yevheniia Broshevan, Co-founder and the Chief Business Development Officer (CBDO) of Hacken, embarked on her crypto journey in 2014. With a Master's in Computer Science and Information System Security, she's academically accomplished and a force in driving business growth. Her leadership has been instrumental in cementing Hacken's reputation as a renowned blockchain security auditor, affiliating...

Privacy is not always guaranteed when transacting on the blockchain, which is why solutions like shielded transactions were introduced on networks using zero-knowledge proofs.

Understanding Shielded Transactions

blockquote icon

A shielded transaction is a type of blockchain transaction based on zero-knowledge proofs.

Unlike transactions on networks such as Bitcoin, where all data about the transaction is viewable by everyone, shielded transactions hide their data using cryptographic methods.

Shielded transactions are performed by two shielded addresses and verified using a mathematical proof known as zero-knowledge proof.

When a sender prepares a transaction, they compute and append a zero-knowledge proof that doesn’t reveal any data about the transaction and its involved parties. Later, when the transaction is verified, the validator checks the proof and compares it to public parameters that were added to the transaction when it was being prepared. 

If the proof is valid, the transaction will be accepted and added to the blockchain.

Shielded transactions
Shielded transactions | Source: coinloan.com

How are Shielded Transactions Positioned For Securing Privacy?

Because neither the validators nor anyone else on the blockchain, except the transaction sender and receiver, can see the details of the transaction, shielded transactions remain completely private.

Outsiders can’t know who the sender, receiver, or amount is. At the same time, the transaction contains everything necessary for its authenticity to be proven by anyone.

Additionally, shielded transactions on networks like Zcash allow for the use of viewing keys, which are special keys that can be given by the participants in a transaction to a third party to grant them access to the transaction data.

This is useful in real-life situations such as financial audits.

“To perform operations in Zcash, each user has two keys associated with their shielded address. First, the spending key that is used during the creation of a zero-knowledge proof allowing the users to prove ownership of the received funds. Second, the viewing key that is used to decrypt the shielded transaction in the blocks and verify if each transaction belongs to the user.” 

(Wüst et al., 2019)

Privacy In Zcash

The benefits of shielded transactions are numerous for businesses and individuals alike. On-chain privacy was hard to achieve before zero-knowledge proofs were used to secure transactions.

“Traditional” blockchains (like Bitcoin) aren’t technically private. They are simply pseudonymous — a type of anonymity attained using a pseudonym. In the case of Bitcoin, that pseudonym would be a wallet address.

Anyone can view any dealings happening on the Bitcoin blockchain and this sort of transparency isn’t practical for many businesses who want their operations kept private from competitors.

While a business’s wallet address doesn’t reveal who it is, its actions on-chain can reveal enough information to make it easy to determine its identity.

Networks like Zcash were created to address this and other privacy-related issues present in traditional blockchain design.

Conclusion

As the practical applications of blockchain and cryptocurrency continue to stack up, new and innovative solutions to privacy and security problems are being developed. Zero-knowledge proofs open the doors for new use cases to come into the blockchain world.

doc ico
Article Sources
arrow ico

Coinweb requires writers to use primary sources to support their work. These include white papers, government data, original reporting, and interviews with industry experts. We also reference original research from other reputable publishers. You can learn more about the standards we follow in producing accurate, unbiased content in our editorial process.

Yulia Zakharchuk
Written by

Julia is a professional crypto and blockchain writer known for her insightful YouTube channel “MoneyFest.” She showcases her dynamic presentation skills as a host and moderator at blockchain conferences.

Julia drives also business development at ChainUp and advises UNITBOX, an innovative NFT renting protocol. With her exceptional expertise, Julia is a highly valued industry contributor and is set to make a lasting impact.

More crypto lingo