{"id":37267,"date":"2019-12-17T07:00:46","date_gmt":"2019-12-17T05:00:46","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=37267"},"modified":"2025-08-29T14:39:35","modified_gmt":"2025-08-29T11:39:35","slug":"what-is-mimblewimble","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-is-mimblewimble\/","title":{"rendered":"What is MimbleWimble?"},"content":{"rendered":"<div id=\"cards_wrapper\">\n<div class=\"single_card\">\n<p id=\"card_counter_1\" class=\"card_counter\"><span class=\"card_counter_span\">1<\/span><\/p>\n<p><strong>What is MimbleWimble?<\/strong><\/p>\n<div class=\"card_description\">\n<p>MimbleWimble is a PoW protocol offering broad scalability and enhanced privacy. In the popular Harry Potter novels, MimbleWimble is the &#8220;tongue-tying curse&#8221; that prevents an opponent from pronouncing a spell correctly. The term alludes to the protocol\u2019s ability to obscure transaction data.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_2\" class=\"card_counter\"><span class=\"card_counter_span\">2<\/span><\/p>\n<p><strong>Who created MimbleWimble, and when?<\/strong><\/p>\n<div class=\"card_description\">\n<p><b>Creators<\/b>: an individual or group using the pseudonym &#8220;Tom Elvis Jedusor&#8221;. In the French translation of the same novels, that is the name of the main antagonist \u2014 Lord Voldemort.<br \/>\n<b>Creation date<\/b>: On July 19, 2016, a <a href=\"https:\/\/download.wpsoftware.net\/bitcoin\/wizardry\/mimblewimble.txt\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a> by Jedusor appeared online, describing a blockchain with improved scalability, privacy and fungibility. On October 6, 2016, Blockstream mathematician Andrew Poelstra released a <a href=\"https:\/\/download.wpsoftware.net\/bitcoin\/wizardry\/mimblewimble.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">review of the white paper<\/a> that proposed fixes for several security issues. A few days later, a pseudonymous author, &#8220;Ignotus Peverell&#8221;, <a href=\"https:\/\/github.com\/mimblewimble\/grin\/blob\/master\/doc\/intro.md\" target=\"_blank\" rel=\"noopener noreferrer\">published<\/a> on Github the Grin implementation.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_3\" class=\"card_counter\"><span class=\"card_counter_span\">3<\/span><\/p>\n<p><strong>How does MimbleWimble work?<\/strong><\/p>\n<div class=\"card_description\">\n<p>MimbleWimble uses <a href=\"https:\/\/en.bitcoin.it\/wiki\/Confidential_transactions\" target=\"_blank\" rel=\"noopener noreferrer\">confidential transactions<\/a> (CT), which fully eliminate inputs and outputs by using multisignatures. Under CT, both parties to a transfer create a multisignature key for the transaction. CT employs a blinding factor that encrypts all inputs and outputs, as well as their public and private keys. Transactions are validated using the Pedersen <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%A1%D1%85%D0%B5%D0%BC%D0%B0_%D0%BE%D0%B1%D1%8F%D0%B7%D0%B0%D1%82%D0%B5%D0%BB%D1%8C%D1%81%D1%82%D0%B2%D0%B0\" target=\"_blank\" rel=\"noopener noreferrer\">commitment scheme<\/a>, a low-level cryptographic primitive that lets participants commit to a chosen value, hide it and later reveal it. A full node subtracts these encrypted amounts from inputs and outputs and balances them, confirming that no new coins were created. The node does not learn the transaction amount.<\/p>\n<p>MimbleWimble <a href=\"https:\/\/medium.com\/@exbotanical\/how-it-works-mimblewimble-grin-and-beam-8fd929848c11\" target=\"_blank\" rel=\"noopener noreferrer\">compresses<\/a> blocks via \u201ccut-through\u201d \u2014 a technique that splits and removes large amounts of data from a block without compromising security.<\/p>\n<p>MimbleWimble \u201ccuts through\u201d the output of the first transaction and the input of the second. What remains is a single set of inputs and outputs, allowing verification of how the sender obtained the coin and how the recipient received it. This process shrinks the blockchain and optimises data storage.<\/p>\n<p>The protocol has significant scaling potential: inputs and outputs are hidden, there are no public addresses, and multiple transactions are combined into a single block.<\/p>\n<p>MimbleWimble also uses CoinJoin. The technique, created by former Bitcoin Core developer Gregory Maxwell, takes payments from several senders and combines them into a single transaction, depriving an uninvolved third party of the ability to determine which recipient a payment was intended for.<\/p>\n<p>The CoinJoin mechanism <a href=\"https:\/\/bitcointalk.org\/index.php?topic=279249.0\" target=\"_blank\" rel=\"noopener noreferrer\">hides<\/a> the inputs and outputs of senders and recipients. Many transactions are merged into one. The sum of all inputs is subtracted from the sum of all outputs; a zero result allows consensus to be reached.<\/p>\n<p>Thanks to CoinJoin and privacy measures, MimbleWimble achieves a high degree of data integrity.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_4\" class=\"card_counter\"><span class=\"card_counter_span\">4<\/span><\/p>\n<p><strong>What are MimbleWimble\u2019s drawbacks? <\/strong><\/p>\n<div class=\"card_description\">\n<p>MimbleWimble does not support a scripting language. The protocol\u2019s functionality is limited to monetary operations. This makes it much harder to implement second-layer solutions such as Lightning Network and <a href=\"https:\/\/forklog.com\/en\/news\/what-are-atomic-swaps\">atomic swaps<\/a>. In theory, the protocol is vulnerable to quantum computing, since its privacy and coin-issuance controls rely on elliptic-curve cryptography (ECC).<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_5\" class=\"card_counter\"><span class=\"card_counter_span\">5<\/span><\/p>\n<p><strong>How is MimbleWimble developing? <\/strong><\/p>\n<div class=\"card_description\">The main implementations of the protocol are the Grin and Beam projects.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"7t4URCHTqO\">\n<p>Beam vs Grin: differences, mining specifics and the outlook for MimbleWimble-based cryptocurrencies<\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"\u201cBeam \u043f\u0440\u043e\u0442\u0438\u0432 Grin: \u043e\u0442\u043b\u0438\u0447\u0438\u044f, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u0438 \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u044b \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442 \u043d\u0430 \u0431\u0430\u0437\u0435 MimbleWimble\u201d \u2014 ForkLog\" src=\"https:\/\/forklog.com\/exclusive\/beam-protiv-grin-otlichiya-osobennosti-majninga-i-perspektivy-kriptovalyut-na-baze-mimblewimble\/embed#?secret=8sjoUY0C32#?secret=7t4URCHTqO\" data-secret=\"7t4URCHTqO\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>In October 2019, developers at the Litecoin Foundation published two improvement proposals that provide for integrating MimbleWimble. The aim is to ensure transaction privacy. Follow Forklog on <a href=\"https:\/\/www.facebook.com\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> Facebook<\/a>!<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1 What is MimbleWimble? A PoW protocol offering broad scalability and enhanced privacy; in the Harry Potter novels it is the &#8220;tongue-tying curse&#8221;, hinting at concealed transaction data. 2 Who created it and when? An individual or group using the pseudonym &#8220;Tom Elvis Jedusor&#8221;; a white paper appeared on July 19, 2016, followed by Andrew Poelstra\u2019s review in October and an early Grin implementation soon after.<\/p>\n","protected":false},"author":1,"featured_media":37268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"2","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2120,2115,1544,561,1256],"class_list":["post-37267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-anonymity","tag-101-technical-foundations","tag-coinjoin","tag-mimblewimble","tag-privacy-and-personal-data"],"aioseo_notices":[],"amp_enabled":true,"views":"51","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=37267"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37267\/revisions"}],"predecessor-version":[{"id":37269,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37267\/revisions\/37269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/37268"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=37267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=37267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=37267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}