Privacy Dashboard
HYVE integrates Zcash-grade zero-knowledge privacy natively — not through a bridge or sidechain. Monitor the shielded pool, stealth address activity, and ZK proof verification.
Shielded Pool (MASP)
Namada Multi-Asset Shielded Pool
Stealth Addresses
DKSAP (Dual-Key Protocol)
ZK Proof Verification
Sapling Zero-Knowledge Proofs
HOW HYVE PRIVACY WORKS
Shield
Deposit tokens from your transparent EVM address into the unified shielded pool. This burns the transparent tokens and creates shielded notes.
Private Transfer
Transfer within the shielded pool using ZK proofs. No one can see the sender, receiver, or amount — only that a valid proof was submitted.
Unshield
Withdraw tokens back to a transparent address by revealing a nullifier (prevents double-spend) and ZK proof of ownership.
Stealth Addresses
Even outside the shielded pool, senders can generate one-time addresses using DKSAP. The recipient scans announcements with their viewing key.
EVM PRIVACY PRECOMPILES
Privacy features are accessible from Solidity smart contracts via native EVM precompiles — no external bridges required.
0x0900MASP ExtendedFull MASP operations from EVM contracts
0x0901Stealth AddressesDKSAP one-time address generation
0x0902Privacy DeFiConfidential DeFi operations
| Address | Name | Functions | Description |
|---|---|---|---|
0x0900 | MASP Extended | shield()unshield()shieldedTransfer()shieldedBalance()merkleRoot()verifyProof() | Full MASP operations from EVM contracts |
0x0901 | Stealth Addresses | registerMetaAddress()getMetaAddress()announce()getAnnouncements()generateStealthAddress() | DKSAP one-time address generation |
0x0902 | Privacy DeFi | shieldedSwap()confidentialTransfer()shieldedCall() | Confidential DeFi operations |
WHAT THE BLOCKCHAIN REVEALS
- A shielded transaction occurred (but not who or how much)
- A ZK proof was verified as valid
- Total value locked in the shielded pool
- Shield/Unshield: transparent side amount and address
- Gas was paid for the privacy operation
WHAT IS HIDDEN
- Shielded transfer sender identity
- Shielded transfer receiver identity
- Shielded transfer amount
- Which notes are being spent (nullifier unlinkability)
- Stealth address recipient real identity
- Connection between shield and unshield operations