Labyrinth
WhitepaperResearchGet Private Access
  • πŸ”­Labyrinth Overview
    • Introduction
    • Why Labyrinth?
    • Who can use Labyrinth?
    • Reward and Fee in Labyrinth
    • Compliance
  • ⭐Use Labyrinth web App
    • How to use the Labyrinth app?
  • πŸ“¦Labyrinth SDK
    • ❓What is Labyrinth SDK?
    • βš’οΈQuickstart
      • Setup Environment
      • Initialization
      • Private Transactions
      • Balance And Transaction History
      • Protocol Integration
    • 1️⃣Getting Started
    • πŸ”Shielded Account
    • πŸ“ˆTransaction
    • ▢️Initializing SDK
    • πŸ’°Balances And History
    • πŸ“€Sending Transaction
    • πŸ”ŒIntegrating with DeFi Protocols
    • Labyrinth fee structure
  • Compliance Solution
    • Overview of Compliance
    • How Compliance Works
  • πŸ’»CLI
    • ▢️Running SeDe CLI
  • Technical Implementation
    • Cryptographic Primitives
    • Shielded Account
    • Shielded Address
    • Account Abstraction
    • πŸ”΅Core Architecture
      • πŸ’΅Note
      • 🌲Merkle Tree
      • πŸ”€JoinSplits
      • πŸ›‘οΈShielded Transaction
    • πŸ”„Protocol Interoperability
  • Resource and support
    • Roadmap
    • FAQs
    • Whitepaper
    • Selective De-Anonymization Compliance Paper
  • Contact and socials
    • Labyrinth Website
    • Twitter
    • Discord
    • Contact Us
Powered by GitBook
On this page
  • Independent Users
  • Private Payments App
  • For Developers
  • Pluggable Privacy For DeFi Protocols, AI/ML, Social
  1. Labyrinth Overview

Who can use Labyrinth?

Labyrinth product and infrastructure solution

PreviousWhy Labyrinth?NextReward and Fee in Labyrinth

Last updated 1 day ago

Independent Users

Labyrinth provides users with a and an app to manage it.

Private Payments App

The Labyrinth app serves individual, institutional, and business users, making it easy to interact with the Labyrinth ecosystem and compliance dashboard.

Users can top up their shielded accounts, perform private P2P transactions, and securely receive crypto salaries.

The app displays private balances and transaction history, allowing users to prove ownership of their assets and transactions using viewing keys in a zero-knowledge manner for compliance.

Additionally, Labyrinth uses stealth addresses for transactions, enabling users to generate one-time, random-looking addresses to maintain their anonymity. Labyrinth is available via before the mainnet launch πŸš€.

For Developers

Developers can access SDK to create private, compliant applications, and integrate Labyrinth into their protocols.

Pluggable Privacy For DeFi Protocols, AI/ML, Social

The Labyrinth protocol allows both new and existing DeFi protocols to integrate easily.

Developers don’t need to change deployed contracts or have prior experience with zero-knowledge proofs (ZK). The SDK simplifies the process of creating private transactions and generating proofs.

Developers only need to write and deploy a simple contract that acts as a logic layer between Labyrinth and the core smart contract of the integrating protocol.

For more information, see the .

πŸ”­
shielded account
private beta access
Labyrinth SDK