Introduction to Raze Network (RAZE)
Raze Network is a cross-chain privacy protocol based on Substrate for the Polkadot ecosystem. It is developing a Cross-chain Privacy Middleware aimed at enhancing privacy for DeFi and Web3.0 applications. Functioning as a native privacy layer, Raze Network offers comprehensive anonymity for the entire DeFi and Web3.0 infrastructure. The primary aim is to facilitate privacy-preserving cross-chain payment and trading systems, ensuring your asset transparency and behavior are shielded from surveillance. Raze Network aspires to anonymize all cryptocurrencies across all blockchain networks. RAZE serves as the native utility token within Raze Network and is utilized for various purposes, including: RAZE token is the fundamental utility within the Raze Network ecosystem. It encompasses various value-capturing functionalities, including but not limited to: - Privacy-Preserving: RAZE empowers DeFi users to transition effortlessly between applications and blockchains without traces of trading history or application interactions. - Governance and Voting: RAZE token holders have the capability to initiate and vote on proposals. - Intermediary of Exchange: RAZE token facilitates a range of services within the ecosystem. - Token Burning: A specific proportion of transaction fees is burned in the form of RAZE tokens. - Liquidity Reward: Market makers contributing liquidity to pools receive RAZE tokens as rewards. The technical architecture of Raze Network involves: Raze Network employs the Zether framework to develop a second-layer decentralized anonymous payment module, which is then integrated as substrate-based smart contracts. It comprises three technical modules: - Mint: Converts a base token into its anonymized version. - Transfer: Enables anonymous transfer of the anonymized token. - Redeem: Converts the anonymized token back to its native form. In conclusion, Raze Network uses public-key homomorphic encryption to keep transaction details confidential and applies the "one-out-of-many" proof to obscure sender and receiver identities. Additionally, other zero-knowledge proof schemes are utilized to ensure payment consistency.














