Your data, your business
The Chain Protocol is designed to support selective disclosure of sensitive information. This is accomplished with three complementary techniques: one-time-use addresses, zero knowledge proofs, and encrypted metadata.
A one-time-use address is created each time an account holder wishes to receives assets. These differing addresses prevent other observers of the blockchain from associating transactions with each other or with a particular party.
To conceal the contents of a transaction, the Chain Protocol is incorporating a technique known as “zero knowledge proofs,” which cryptographically conceals the assets and amounts in a transaction, while allowing the entire network to validate the integrity of the contents. Only the counter-parties (and those granted access) can view the details of the transaction.
Finally, transaction metadata can be encrypted with traditional PKI, to conceal details from all but the relevant parties.