Last time we explored private swaps using ZK proofs β now letβs dive into another essential operation: wallet-to-wallet transfers, where N input UTXOs are transformed into 1 or 2 output UTXOs (transfer value + optional change).
This goes far beyond simple balance movement. Itβs a cryptographically verified operation, with privacy guaranteed by zero-knowledge proofs (ZKPs) and auditable compliance.
βοΈ How does this transfer work?
Inputs and Outputs
Your assets are represented as UTXOs β like digital banknotes.
When transferring, you select N input UTXOs and generate:
1 output UTXO with the transferred value
1 change UTXO (optional)
All of this happens privately β without revealing the amount or recipient publicly.
Press enter or click to view image in full size
π§ͺ Transaction Verifications
π³ Existence Proof
Each UTXO is a commitment in the private Merkle Tree.
The ZKP proves the UTXO exists in the tree β without revealing which one.
The Merkle root is published on the public blockchain.
π Root History
Prevents fraud by ensuring the UTXO existed in a valid tree state recently.
π Ownership Proof
Only the holder of the secret key can spend the UTXO.
This is proven via ZKP β without revealing the key.
βοΈ Mass Conservation
Sum of input values = sum of output values.
No tokens are created or destroyed.
π« Nullifier (Double-Spend Prevention)
Each spent UTXO generates a unique nullifier.
Itβs published on the public chain.
Harpo checks if the nullifier has already been used before validating the transaction.
π‘οΈ Lock Verification
If a UTXO is blocked by an authority (e.g. regulatory reasons), it cannot be spent.
The ZK circuit enforces this in the proof.
π€ Auditing
Harpo enables selective auditability.
ZKPs ensure that data shared with authorities for compliance matches the original transaction β without revealing secrets.
β If everything checks outβ¦
Nullifiers are added to the public list to prevent reuse
New commitments are created in the Merkle Tree with updated balances
The transaction is recorded β with privacy for users and verifiability for regulators
π In Harpo, every transfer is a commitment to integrity and privacy.
Powered by UTXO architecture + ZK proofs + Merkle Trees + nullifiers
To see more πclick hereπ
Top comments (0)