Addresses and Keys
Aztec has no concept of externally-owned accounts. Every address identifies a smart contract in the network.
For end users to interact with the network, they'll most-likely need to deploy a so-called "account contract".
Addresses are then a commitment to a contract class, a list of constructor arguments, and a set of keys.
Keys in Aztec are used both for authorization and privacy. Authorization keys are managed by account contracts, and not mandated by the protocol. Each account contract may use different authorization keys, if at all, with different signing mechanisms.
Privacy keys are used for note encryption, tagging, and nullifying. These are also not enforced by the protocol. However, for facilitating composability, the protocol enshrines a set of enshrined encryption and tagging mechanisms, that can be leveraged by applications as they interact with accounts.
The requirements section outlines the features that were sought when designing Aztec's addresses and keys. We then specify how addresses are derived, as well as the default way in which keys will be derived. The precompiles section describes enshrined contract addresses, with implementations defined by the protocol, used for note encryption and tagging.
Last, the diversified and stealth accounts sections describe application-level recommendations for diversified and stealth accounts.
📄️ Address
An address is computed as the hash of the following fields:
📄️ Requirements
Requirements which motivated Aztec's design for addresses and keys.
📄️ Default Keys Specification
Specification for default privacy keys format and derivation, and nullifier derivation.
🗃️ Example Usage of Keys
4 items
📄️ Precompiles
Precompiled contracts, which borrow their name from Ethereum's, are contracts not deployed by users but defined at the protocol level. These contract instances and their classes are assigned well-known low-number addresses and identifiers, and their implementation is subject to change via protocol upgrades. Precompiled contracts in Aztec are implemented as a set of circuits, one for each function they expose, like user-defined private contracts. Precompiles may make use of the local PXE oracle.
📄️ Diversified and Stealth Accounts
The keys specification describes derivation mechanisms for diversified and stealth public keys. However, the protocol requires users to interact with addresses.