White Paper ZDEEX

The whitepaper was written using materials from the Pirate Chain Team, as well as a thorough study of technical documentation, understanding and respect for the principles that the Pirate Chain Team implements and promotes. The ZDEEX team always looks up to its older brother, the Pirate Chain team

ZDEEX NETWORK - The Confidential Universe

.

Privacy Focused Decentralized Network

.

Enforced Encrypted Peer-to-Peer Transactions

.

Version 1.5

INTRODUCTION

ZDEEX (ZDEEX NETWORK) is a confidential digital network that provides secure peer-to-peer transactions. Interactions between nodes are encrypted using Zero Knowledge Short Non-Interactive Argumentation Knowledge (zk-SNARK) technology, which excludes information transmitted in a typical transparent transaction, such as sender address, recipient address, amount and transaction history. This technology solves the problem of unintentional metadata leakage when using transparent addresses, which can allow an attacker to link transactions and identities. By providing secure peer-to-peer transactions, no previous transaction history is exposed. On the ZDEEX NETWORK, this solves the problem of “tainted” coins, which is defined as a transaction balance with a history of transactions associated with blacklists or other unwanted addresses. This can lead to legitimate transactions being rejected or devalued by exchanges or other organizations. Therefore, ZDEEX NETWORK's native currency is considered safe and secure to use.

The Pirate Chain team was one of the first to use and continues to use this principle.

Our ZDEEX team, inspired by the achievements of the Pirate Chain team, took up the initiative and strives to contribute to the development of this promising area of privacy and information protection in blockchain technology.

As cryptography-based digital currencies become more common, they are proving resistant to various attacks and facilitating discoveries, making blockchain technology even more promising. Public acceptance of decentralized networks is growing as more people and organizations get involved in the field. The projects being developed and implemented in this area are becoming more diverse, and their number is rapidly increasing. Many of these projects are based on previous ones that aimed to solve real-world problems in innovative ways.

Bitcoin's original structure used a transparent public ledger, which is also used in many other large networks. Every transaction on the network includes the entire history of transactions and balances. In the past, miners could mine using their own unique addresses and remain pseudo-anonymous. However, with the popularity of cryptocurrencies, many people now prefer to buy coins from public markets.

As a result, there has been an increase in the number of blockchain analytics companies that monitor and analyze various networks. These companies offer services to analyze, monitor, and audit blockchain networks, as well as solutions to optimize and improve their operation.

1. ORIGIN ZDEEX CHAIN

ZDEEX COIN - is an asset in the chain of assets in the Komodo platform ecosystem. Komodo uses the blockchain's open-source, independent approach to empower blockchain entrepreneurs and everyday crypto users by providing freedom and ease of use.

jl777 this is the main developer of the platform Komodo, 2018.

The ZDEEX team, inspired by the achievements of the Pirate Chain team, took up the initiative and strives to contribute to the development of this promising area of privacy and information protection in the blockchain.

The Assets chain is a standalone blockchain that inherits the functionality of the Komodo source code. It is a hard fork of Komodo.

The Komodo platform is a modified version of Zcash, which itself is a fork of Bitcoin.

Therefore, ZDEEX is based on functions developed by Satoshi Nakamoto for the Bitcoin protocol, as well as Zcash's zk-SNARK implementation and modifications of the Komodo platform.

ZDEEX Chain was created on December 27, 2023 as a variant of the Pirate Chain (ARRR) concept. It uses encrypted and secure transactions with zk-SNARK proofs, without additional transparent addresses, designed to solve fundamental privacy problems.

2. NETWORK PARAMETERS

Mining algorithm: Equihash(200,9) Proof-of-Work

Average block interval: 300 seconds

Standard transaction fee: 0.0001 ZDEEX

Starting Block Reward: 2.2 ZDEEX (0.2 ZDEEX The Project Fund)

Maximum block size: 4MB

Block Halving: Every 1,000,000 blocks (~3650 days)

Maximum Supply: 5 Million ( 4,505,759.19665246 )

Premine:: 100000 ZDEEX

Central Authority: None

Capital Investors / loans: None

Governance: Autonomous Community Project

3. TOKENOMICS

The maximum number of coins is - 5,000,000 98% of all issued coins are mined, of which 10% of the network reward from miners' income goes to the community fund for making payments to team members, community members, and project development.

Premine 2% of the total - 100,000 of them:

- listings, liquidity pools

- reserve fund for the technical needs of the team

- Marketing

Reserve funds will be established as well:

-TON

-TRON

-ZEC

-ZEN

-DOGE

-SOL

-USDT

and other team projects, as well as community solution projects.

Reward History %
Emission

The tokenomics are in their initial stage. Strategic development decisions, as well as the distribution of bonuses and payments, are determined by the community through voting.

4. TRANSACTIONS

The initial coinbase reward to the miner of a block is transparent for supply audibility.

From that point on, all Peer-to-Peer transactions of the ZDEEX Chain network are requiredto be shielded.

The details of the transaction are encrypted meaning no outside observer can know the sender, receiver, quantity of ZDEEX, or the optional message stored in the memo field.

Every subsequent transaction is verified by the network utilizing the zkSNARK methodology developed by Zcash to prove the ZDEEX quantity of the inputs always equal the ZDEEX quantity of the outputs, proving no new coins have come into existence despite being a shepherded transaction.

Transparent P2P transactions are not allowed as a fundamental parameter of the ZDEEX Chain network.

In networks where transparent addresses are allowed, a condition is created where the end points are observable.

For example, when an amount publicly visible on a ledger is sent from a transparent address to a shielded address, the amount is no longer visible.

However, if that same amount is later unshielded to a transparent address, it now becomes possible (with advanced chain analysis) to have a high probability linking these transactions, despite being shielded at some point.

ZDEEX Chain solves this as all P2P transactions have shielded end-points, leaving no meaningful way to link transactions on the distributed ledger.

The sender of a shielded transaction is further protected as the receiver can only know the amount and their own receiving address (senders address is not revealed).

If an audit of an account is required, viewing keys may be generated which allows viewing of the transactions and balances for an address.

5. DELAYED PROOF OF WORK (dPOW)

Currently, the ZDEEX team is working on implementing the DELAYED PROOF OF WORK (dPOW) function and creating its own fleet of Notary Nodes.

What is DELAYED PROOF OF WORK (dPOW) and why is it needed?

Deferred Proof of Work is a built-in feature of the Komodo platform that notarizes a "snapshot" to other PoW blockchains. It provides a unique and innovative form of security that is as secure as the network it is connected to, but without the cost of running that network. Delayed Proof of Work is a solution that leverages several existing methods into a single hybrid consensus system that is as energy efficient as Proof-of-Stake (PoS), while being protected by Litecoin's Proof of Work. Users creating independent blockchains (asset chains) in the Komodo ecosystem can choose a block hash that serves as a "snapshot" of their own blockchain, which is inserted into the Komodo main chain. Thus, the records of the asset chain are indirectly included in the hash of the Komodo block that is placed on the Litecoin blockchain. 51% ZDEEX Chain attack: The attacker must simultaneously control the computing power of the ZDEEX Chain, Komodo and Litecoin.

The dPoW notarization service allows blockchains to benefit from Litecoin. hash rate, and this in turn makes Litecoin energy use more environmentally friendly. securing the entire dPoW ecosystem in addition to itself (Jl777c 2016). Besides the ZDEEX Chain, dPoW has been successfully implemented in many asset chains, such as Game Credits, Einsteinium (EMC2), and Pungo among others (Komodostats 2018).

Komodo security is performed by notary nodes, which are required to record block hashes on the Litecoin blockchain, which is called notarization. Notarization involves the creation of a group of signed Litecoin transactions containing the latest hash of the Komodo block, signed by an unknown combination of 13 out of 64 notary nodes (Jl777c 2016). Block hashes of the ZDEEX Chain (among other asset chains) are also inserted into the Komodo blockchain in a timely manner using the same method. In this way, even one surviving copy of the Komodo main chain will allow the entire ecosystem of asset chains to overwrite and undo any attacker's changes.

Notary nodes pay a Litecoin transaction fee for notarizing the Komodo blockchain using tools provided by the Komodo platform. Notary nodes are compensated for their work by mining KMD blocks at CPU difficulty, receiving block rewards and transaction fees. Therefore, financial stakeholders are expected to vote for notary nodes that they value. 64 mostly distributed notary nodes are expected to be an optimal representation of the decentralized ecosystem, making any type of attack 51% highly unlikely. (Descriptive part DELAYED PROOF OF WORK (dPOW) used from the ZDEEX Chain information space)

6. PRIVACY

The ZDEEX privacy model, like the Pirate Chain, provides complete anonymity for peer-to-peer transactions. must be shielded. In the event that an identity is associated with a particular transaction, no other information will be revealed because all other transactions on the public ledger are shielded.

For example, if Bob provides Alice with a receiving address so that she can pay him, she cannot know any other transactions at that address, and no balances are exposed. To ensure complete confidentiality, the receiving address should not be shared with more than one trusted sender.

For example, Alice provides the receiving address to Bob and anonymously to Charlie. Bob knows that the address belongs to Alice, but Charlie does not know who it belongs to. If Bob and Charlie collude, Charlie will now know that the address belongs to Alice. Although no other information is disclosed, to prevent third-party collusion, each party must be given a unique receiving address.

7. REFERENCES

-Bowe, S. 2017. “Cultivating Sapling: Faster zk-SNARKs--Zcash Blog”. Zcash Blog.

-EXAKING. 2018. “PoW 51% Attack Cost”. 2018. https://www.exaking.com/51.

-Grewal, Satinder. 2018. “Satinder’s notes on the PIRATE chain”. 2018. https://blog.komodoplatform.com/pirates-of-komodo-platform-cdc991b424df.

-Hopwood, Daira, Sean Bowe, Taylor Hornby, en Nathan Wilcox. 2016. “Zcash protocol specification”.

-Japparova, Irina, en Ramona Rupeika-Apoga. 2017. “Banking Business Models of the Digital Future: The Case of Latvia”. European Research Studies 20 (3A). Professor El Thalassinos: 846.

-Jl777c. 2016. “Delayed Proof of Work (dPoW) Whitepaper”. Github. 2016. https://github.com/KomodoPlatform/komodo/wiki/Delayed-Proof-of-Work- (dPoW)-Whitepaper.

-Kappos, George, Haaroon Yousaf, Mary Maller, en Sarah Meiklejohn. 2018. “An Empirical Analysis of Anonymity in Zcash”. arXiv preprint arXiv:1805.03180.

-Komodostats. 2018. “Asset Chains Notarizations Summary”. 2018. https://komodostats.com/acs.php.

-Lee, James. 2018. “Komodo: An Advanced Blockchain Technology, Focused on Freedom.” Komodo.

-Moser, Malte. 2013. “Anonymity of bitcoin transactions”.

-Nakamoto, Satoshi. 2008. “Bitcoin: A peer-to-peer electronic cash system”. Working Paper.

-Ocminer. 2018a. “Network Attack on XVG / VERGE”. Bitcointalk. 2018. https://bitcointalk.org/index.php?topic=3256693.0.

-. 2018b. “Network Attack on XVG / VERGE (Page 57)”. Bitcointalk. 2018. https://bitcointalk.org/index.php? topic=3256693.msg38135174#msg38135174.

-PTY X. 2018. “What is a Parallel Chain (Asset Chain)?” Komodo Platform. 2018. https://komodoplatform.atlassian.net/wiki/spaces/KPSD/pages/71729160/ What+is+a+Parallel+Chain+Asset+Chain.

-Quesnelle, Jeffrey. 2017. “On the linkability of Zcash transactions”. arXiv preprint arXiv:1712.01210.

-Roberts, Jeff John. 2018. “Bitcoin Spinoff Hacked in Rare ‘51% Attack’”. FORTUNE. 2018. http://fortune.com/2018/05/29/bitcoin-gold-hack/.

-Saberhagen, Nicolas Van. 2013. “CryptoNote v 2.0”.

-Sasson, Eli Ben, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, enMadars Virza. 2014. “Zerocash: Decentralized anonymous payments from bitcoin”. In 2014 IEEE Symposium on Security and Privacy (SP), 459–74.

-Pirate Chain White Paper. https://piratechain.com/