**The Matter Of Privacy**

**Among Us**

**Note**: Please refer acronym list.

1. Anonymous Signing

1.1. Multi-Signatures or Threshold Signatures

1.2. Group Signatures

1.3. Ring Signatures

2. Blinding

2.1. Homomorphic Encryption

2.2. PSI

3. Proof Systems

3.1. ZKP

3.1.1. Pedersen Commitments

3.1.2. Bulletproofs

3.1.3. ZK Challenge-and-Response

3.1.4. ZK Authentication

3.1.5. ZK Mutual Authentication

4. Anonymization

4.1. Stealth Addresses

6. The Matter Of Privacy

6.1. *Privacy: What is it?*6.2.

*How is Privacy Assured?*

Privacy is in the matter to determine the **right-to-know** and the **need-to-know**, as well as the matter to determine **who to trust** and **how to trust**. The crux of utility and application is in the matter of proof, with the consideration of privacy, and yet the matter of proof that privacy is assured.

As all proofs are based on ** Assertions**, how would security solutions architects assured

**A6**?

# Anonymous Signing

## Multi-Signatures or Threshold Signatures

Multi-signature(Itakura and Nakamura, 1983) schemes reveal data only when certain conditions are met, i.e. an adequate number of entities (e.g., k of N, where k may be 3, N may be 5) authorize. Another option may be threshold signature or presentation, e.g. Schnorr signature, SSS (Shamir Secret sharing(1979)). """Schnorr signature method to aggregate signers(secp256k1)

G := base point on the curve.[Sign]

A takes his private key, a random value (r_i) and a message (M), and produces a signature: (R,s).< Keys generation >:1. A generates private key of (x_1) and a public key (X_1):X_1 = x_1 * G2. B generates private key (x_2) and a public key (X_2):X_2 = x_2 * G