The Inner Workings of @Dusk Protocol;

Users select a user key, which is used to encrypt the transaction payload. The user key is then encrypted using the auditor key, ensuring that only the auditor can decrypt it. Through zero-knowledge proofs, users can demonstrate that the auditor key was utilized for encrypting the user key and that the transaction payload adheres to all the rules. This innovative approach combines privacy, digital identity, and encryption to ensure compliance.

#Dusk $DUSK

DUSK
DUSK
0.1025
-3.66%