What is Suter Virtual Machine (VM)?

Heisenberg Lin
Suterusu
Published in
2 min readFeb 17, 2020

Our ecosystem will provide a SuterVM containing several technical modules to developers who are not necessarily familiar with the underlying cryptographic technologies. Developers can use these modules to instantly launch a privacy-preserving blockchain protocol under different payment models.

Anonymous digital cryptocurrency

Our ZK-ConSNARK allows the user to develop an anonymous cryptocurrency with either a Monero-like (UTXO model), or MimbleWimble-like (no address) transaction structure, but with a much smaller constant transaction size and more efficient verification. One could also invoke our ZK-ConSNARK modules to develop a Zcash-like anonymous cryptocurrency without the need of a trusted setup.

Account-based privacy-preserving blockchains

The relatively stable privacy-preserving blockchain technique for account-based blockchains is Zether, which provides a confidential payment channel scheme while solving the interoperability issue of smart contracts. Since the main underlying cryptographic modules are Elgamal encryption and ZK-SNARK technology, our ZK-ConSNARK technology can easily applied to this case.

UTXO model-based privacy-preserving cross-chain technology

The developer can invoke our ZK-ConSNARK module to develop an improved version of anonymous multi-hop locks (AMHL), which can be applied to implement anonymous payment channels for digital assets. The existing AMHL protocol that is resistant to wormhole attacks primarily has the following two features:

  1. The premise of the general construction is that the underlying algebraic structure supports the construction of a homomorphic one-way function, which both of our current ZK-ConSNARK protocols can satisfy, and hence there won’t be any compatibility issue.
  2. However, the aforementioned general scheme only applies to blockchains with Turing-complete scripting language, such as Ethereum. We, therefore, need to further develop a scriptless AMHL module for the blockchain without comprehensive scripting language. In this case, the underlying algebraic structure is required to support the scriptless Schnorr signature or ECDSA signature scheme. Both aforementioned ZK-ConSNARK schemes satisfy this requirement.

The existing AMHL supports limited relationship anonymity, i.e., the security model only considers the sender and receiver anonymity when the adversary is the intermediate nodes of the AMHL protocol. This security model is insufficient in the sense that it ignores the possibility that the adversary might launch the attack against the anonymity of the involved parties through analyzing the payment graph of the whole blockchain. We will solve this problem by applying our ZK-ConSNARK scheme to enhance user anonymity.

--

--

Suterusu
Suterusu

Published in Suterusu

Bring the truly layer-2 anonymous transaction solution in Defi, to crypto, and the world.

Heisenberg Lin
Heisenberg Lin