[{"data":1,"prerenderedAt":123},["Reactive",2],{"content-query-aGQJYq77M2":3},{"_path":4,"_dir":5,"_draft":6,"_partial":6,"_locale":7,"title":8,"description":9,"body":10,"_type":118,"_id":119,"_source":120,"_file":121,"_extension":122},"/docs/dev/beam-technology/lelantusmw","beam-technology",false,"","LelantusMW","Cryptographer Aram Jivanyan of Firo (formerly ZCoin) initially developed Lelantus as a new protocol for a confidential exchange of value.",{"type":11,"children":12,"toc":115},"root",[13,21,38,61,84,106],{"type":14,"tag":15,"props":16,"children":18},"element","h1",{"id":17},"lelantusmw",[19],{"type":20,"value":8},"text",{"type":14,"tag":22,"props":23,"children":24},"p",{},[25,27,36],{"type":20,"value":26},"Cryptographer ",{"type":14,"tag":28,"props":29,"children":33},"a",{"href":30,"rel":31},"https://www.linkedin.com/in/aramjivanyan/",[32],"nofollow",[34],{"type":20,"value":35},"Aram Jivanyan",{"type":20,"value":37}," of Firo (formerly ZCoin) initially developed Lelantus as a new protocol for a confidential exchange of value.",{"type":14,"tag":22,"props":39,"children":40},{},[41,43,50,52,59],{"type":20,"value":42},"The core principles of Lelantus describe the related proofs placing a UTXO set into a ",{"type":14,"tag":28,"props":44,"children":47},{"href":45,"rel":46},"https://beamx.gitbook.io/glossary/-Ma56WMqUB1AsnhoithB/",[32],[48],{"type":20,"value":49},"shielded pool",{"type":20,"value":51}," while the ",{"type":14,"tag":28,"props":53,"children":56},{"href":54,"rel":55},"https://www.google.com/search?q=anonymity+set+crypto&sxsrf=ALeKk03stmb--lt3dzzlAfJEASZzekFidw%3A1625620539632&ei=OwDlYKXhJfW3qtsP4f6o8Aw&oq=anonymity+set+crypto&gs_lcp=Cgdnd3Mtd2l6EAMyBQghEKABMgUIIRCgAToHCCMQsAMQJzoHCAAQRxCwAzoCCAA6BggAEBYQHjoFCCEQqwJKBAhBGABQ2UdY1FdggVpoAXACeACAAcYBiAGFCZIBAzAuOJgBAKABAaoBB2d3cy13aXrIAQnAAQE&sclient=gws-wiz&ved=0ahUKEwjl6ra25M_xAhX1m2oFHWE_Cs4Q4dUDCA8&uact=5",[32],[57],{"type":20,"value":58},"anonymity set",{"type":20,"value":60}," accumulates. The UTXO set leaves the shielded pool as a \"new\" UTXO set equally the exact total value as UTXO set initially submitted.",{"type":14,"tag":22,"props":62,"children":63},{},[64,66,73,75,82],{"type":20,"value":65},"Beam combined Lelantus with Mimblewimble to create a hybrid",{"type":14,"tag":28,"props":67,"children":70},{"href":68,"rel":69},"https://docs.beam.mw/Lelantus-MW.pdf",[32],[71],{"type":20,"value":72}," LelantusMW protocol",{"type":20,"value":74},". This hybrid protocol resolves the issue of ",{"type":14,"tag":28,"props":76,"children":79},{"href":77,"rel":78},"https://ieeexplore.ieee.org/document/8806723",[32],[80],{"type":20,"value":81},"linkability",{"type":20,"value":83},", which in some instances could allow an active attack to establish a link between wallets (though not to determine identities or values of the transactions).",{"type":14,"tag":22,"props":85,"children":86},{},[87,89,95,97,104],{"type":20,"value":88},"See ",{"type":14,"tag":28,"props":90,"children":93},{"href":91,"rel":92},"https://github.com/BeamMW/beam/wiki/Lelantus-MW",[32],[94],{"type":20,"value":8},{"type":20,"value":96}," and ",{"type":14,"tag":28,"props":98,"children":101},{"href":99,"rel":100},"https://github.com/BeamMW/beam/wiki/MW-CLA",[32],[102],{"type":20,"value":103},"MW Confidential Lelantus Assets",{"type":20,"value":105}," for a more in-depth description of our protocol.",{"type":14,"tag":22,"props":107,"children":108},{},[109],{"type":14,"tag":28,"props":110,"children":113},{"href":111,"rel":112},"https://www.youtube.com/watch?v=cQGQZ1OWPmc&ab_channel=ZKProofStandards",[32],[114],{"type":20,"value":111},{"title":7,"searchDepth":116,"depth":116,"links":117},2,[],"markdown","docs:docs:dev:beam-technology:lelantusmw.md","docs","docs/dev/beam-technology/lelantusmw.md","md",1777630718508]