{"id":18161,"date":"2024-10-29T11:37:45","date_gmt":"2024-10-29T09:37:45","guid":{"rendered":"https:\/\/forklog.com\/en\/circle-unveils-privacy-solution-for-erc-20-tokens\/"},"modified":"2024-10-29T11:37:45","modified_gmt":"2024-10-29T09:37:45","slug":"circle-unveils-privacy-solution-for-erc-20-tokens","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/circle-unveils-privacy-solution-for-erc-20-tokens\/","title":{"rendered":"Circle Unveils Privacy Solution for ERC-20 Tokens"},"content":{"rendered":"<p>Experts at Circle Research, in collaboration with Inco Network, have released a framework for converting ERC-20 standard assets into confidential wrapped versions.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Introducing the Confidential ERC-20 Framework <a href=\"https:\/\/twitter.com\/inconetwork?ref_src=twsrc%5Etfw\">@IncoNetwork<\/a> and Circle Research release a new whitepaper and open-source repo on transforming ERC-20 tokens into confidential wrapped versions that preserve user privacy using fully homomorphic encryption (FHE) while maintaining\u2026 <a href=\"https:\/\/t.co\/Vvrx7KfX5T\">pic.twitter.com\/Vvrx7KfX5T<\/a><\/p>\n<p>\u2014 Circle Developer (@BuildOnCircle) <a href=\"https:\/\/twitter.com\/BuildOnCircle\/status\/1850917702497714561?ref_src=twsrc%5Etfw\">October 28, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The Confidential ERC-20 Framework tools conceal user balances and transaction amounts.<\/p>\n<p>To ensure compliance with regulatory requirements, the framework allows for the delegation of account access rights to auditors, law enforcement, and other authorized parties.<\/p>\n<p>The solution provides programmable transfer rules, which can include anti-money laundering measures, set limits, and other options at the smart contract level.<\/p>\n<p>The framework employs fully homomorphic encryption (FHE), integrated with the EVM as an intelligent contract execution environment. This technology enables arbitrary computations on data without decryption.<\/p>\n<p>Developers believe the privacy features of the Confidential ERC-20 Framework could see widespread use in finance. Potential applications include employee payroll, payments to supply chain providers (where amounts are best kept confidential from competitors), and P2P transfers like Venmo.<\/p>\n<p>Back in 2023, the startup Nocturne Labs launched a protocol for anonymous transactions, implementing the concept of private accounts within the Ethereum ecosystem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts at Circle Research, in collaboration with Inco Network, have released a framework for converting ERC-20 standard assets into confidential wrapped versions. Introducing the Confidential ERC-20 Framework @IncoNetwork and Circle Research release a new whitepaper and open-source repo on transforming ERC-20 tokens into confidential wrapped versions that preserve user privacy using fully homomorphic encryption (FHE) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18160,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1220,791,1256],"class_list":["post-18161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-circle","tag-erc-20","tag-privacy-and-personal-data"],"aioseo_notices":[],"amp_enabled":true,"views":"25","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/18161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=18161"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/18161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/18160"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=18161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=18161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=18161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}