About Dusk

What is Dusk Network?

Dusk Network is a privacy-oriented blockchain protocol, that anyone can use to create zero-knowledge dApps. By allowing Dusk Network to be openly accessible, Dusk Network aims to become the privacy infrastructure of choice for an entire ecosystem of solutions.

How did Dusk Network start?

In 2017, we conceived Dusk Network to solve blockchain’s unanswered challenges: scalability, privacy and compliance. During the inception of Dusk Network, it’s been our priority to create an ecosystem that is accessible by anyone, truly lowering the barrier to enter the financial industry, and replace intermediaries effectively with technology. We are creating a blockchain that will become the backbone of a fairer financial industry by allowing anyone to participate in the consensus, no matter their size. Where monopolistic power structures are disincentivised, forks are prevented, and trades are settled instantaneously.

How does Dusk Network work?

Dusk Network combines the versatility of smart contracts that can be found on Ethereum, the privacy of ZCash and a consensus algorithm developed in-house known as Segregated Byzantine Agreement to create a platform that supports transactions and privacy-oriented applications. An innovation that opens up entirely new use cases to millions of users. Read more about our technical architecture.

Who is your target market/audience?

Rather than just a payment network, Dusk Network was created to provide a technological solution that is capable of much more. The first example is our Confidential Security Contract (XSC), that issuers of securities can use to provide their shareholders with secure and private security tokens, while enabling them to follow regulations set by governing bodies.

Due to the lengthy and expensive procedures of taking a company public, Dusk Network stands out as an efficient and inexpensive alternative.

We have the rather ambitious goal of becoming the privacy infrastructure of choice to revolutionize finance, governance and cyber-security industries. In order to achieve this, Dusk Network is made available completely open source, allowing all developers to contribute and build upon our work.


Which consensus mechanism do you use and could you explain why you chose this mechanism?

Currently, the two most used consensus algorithms face severe drawbacks. Proof of Work wastes a vast amount of energy and leads to miner centralization, Proof of Stake moves toward centralization with those having access to resources gaining further advantage. For these reasons, we deemed them both inappropriate for our purposes and created an alternative: Segregated Byzantine Agreement.

What is SBA★?

Segregated Byzantine Agreement improves upon Proof of Stake by combining existing ideas like cryptographic sortition (lottery), stealth time-locked transactions (hidden stake amounts) and a reputation module to increase the chances of selecting honest nodes and further promote decentralization.

The algorithm makes use of several types of nodes, both intensive and light in computational power to encourage participation in the network. This further increases the security of the network and promotes decentralization.

Using SBA, transaction finality can be achieved as soon as a new block reaches agreement so there is no real chance that an unintended fork happens. This also means no conflicts between parties for control of the chain.

For more details on SBA, please see our set of articles which go over the topic in depth.

What kind of Nodes does Dusk utilize?

Dusk Network is compromised of two types of nodes, block generators and provisioners.

Block generators are light in computation and serve to compete for block generation. Staking a minimal amount of Dusk ensures a fair chance to win the lottery, promoting decentralization. Due to it's non-intensive computational nature, it is intended that even normal mobile devices will be able to run a node on the network. The winning block generator node is rewarded with DUSK.

Provisioner nodes are more heavy in computation where they take on roles like block selection, reduction and agreement in order to keep the network running and preventing fraud. These nodes earn a steady supply of DUSK for their participation.

Will Dusk Network facilitate smart contracts?

One of the main features of Dusk Network is the provisioning of a (full privacy) smart contract layer that can be used to build applications to fulfill all sorts of needs for consumer and enterprise use cases.

We provide open source code enabling all users to not only create XSCs, the confidential security contract of Dusk Network, but extend and expand on the features if so required.

What is ECC (Elliptic Curve Cryptography)?

Elliptical curve cryptography is a public key encryption technique that generates more efficient, faster and smaller keys which are very easy to perform but very difficult to reverse engineer. This is why Bitcoin, Ethereum and many other cryptocurrencies use a curve known as secp256k1 to generate private and public keys.

Dusk Network protocol uses a Ristretto implementation which has Curve25519 defined over the Ristretto scalar field. Curve25519 is birationally equivalent to an ed25519, a Twisted Edwards curve. This allows Dusk Network to utilize the power of the Ristretto scalar field, while not indulging in the complex and bulletproof-unfriendly abstractions that are associated with Ristretto. In other words, allows us to safely extend to zero-knowledge protocols in order to achieve privacy.

How is privacy achieved?

Dusk Network combines the use of stealth addresses (a random address created for each transaction), blind bidding (staking amounts hidden), bulletproof transactions (a type of zero knowledge proof to reduce transaction sizes), and more to ensure that privacy remains at the forefront of our priorities.

What are ZK-snarks and how do they work?

The core principle behind privacy is how to prove the validity of a statement without revealing information about the statement. This is where Zero-Knowledge cryptography comes into play.

In the case of Dusk Network, Zero-Knowledge, specifically bulletproofs, are used to provide privacy in the transaction but allow the transactor to validate the transaction against the set of smart contract rules written to Dusk Network's XSC to everyone on the network.

For more details on the use of Zero-Knowledge Cryptography, please read our set of articles that take a deeper dive into our technology.
Part 1
, Part 2 and Part 3

What about network fees?

DUSK is used to pay transaction and gas fees in order to initiate transactions of both DUSK and XSC based tokens, atomic swaps (smart contract technology to exchange tokens trustlessly), as well as deploying a smart contract.

DUSK will also be used for voting on Dusk Enhancement Recommendations and on-chain governance in the future.


What are the benefits of using Dusk/why would somebody develop on Dusk?

Dusk Network is open source, meaning anyone can use it and even extend it with new features. The standards created by Dusk Network can be leveraged by third parties who wish to automate processes through the Dusk Network blockchain that would otherwise require the involvement of middlemen, which quickly increases costs.

Dusk Network was also built from the ground up in order to satisfy the strict requirements of regulators in both privacy and auditability. This means you can be sure that your security token offering will meet the standards required by governing bodies.

What are the incentives to participate in the Dusk Network?

Nodes are able to stake DUSK to become eligible to participate in the consensus. In exchange for assisting in the running and securing of the network, participants that were part of the block formation are automatically rewarded with DUSK tokens upon finalization of a block in proportion to the amount staked.

The greater the balance, the better the chance to be selected for block generation.


How will Dusk comply with regulators?

Dusk Network is an open source platform that can be used by companies and developers to create new businesses, or migrate existing business processes. These new businesses can automate their compliance on-chain, by using various tools. Businesses can use whitelists, that are part of the open standard, to make sure only accepted participants can acquire their (security) token. And perform certain compliance and auditability related actions to give insights into (only) their token holders transaction details.

Why did Dusk choose to build a privacy-oriented blockchain?

Privacy is all about context. In the context of security tokens its paramount that trades are market neutral, and do not affect the wider market. Furthermore, by offering privacy business can adhere to data protection regulations.

Having all transactions in the open also opens up the ability for market manipulation (think people monitoring large wallets for transactions), as well as breaking confidentiality agreements that are part of the arrangements made by institutional parties, deterring them from using the blockchain for such purposes.

Last year there was an update that the EU would ban private coins, any updates?

We stay well informed on ongoing developments as the released implementation details of the FATF are a concern to the wider blockchain community. However, at present time this does not seem to impact Dusk Network's vision for a fully global and open privacy-oriented blockchain economy.

Security Token Offerings

How do companies start an STO using Dusk technology?

Tech savvy companies can use the open-source standards, such as XSC, to automate the processes required for security token issuance. There are specialist service providers, such as legal and consultancy boutiques, security token platforms, and more that could help set it up for business that lack the technical know-how. By being an open-standard, anyone can use it, which is part of our strategy to quickly scale the usage of the network.

Will STOs have to pay a fee?

Similar to Ethereum, issuers will pay for the features on Dusk Network directly through gas fees and smart contract deployment fees. In order to perform corporate governance such as voting, DUSK is also charged as a gas fee. Dusk Network itself is open source for developers to make use of and does not in any way require steep fees to access it.

What are the specifications of the XSC-token contract?

Our confidential smart contract was developed in order to serve as a security token issuance, trading and management mechanism. As such, it will allow the functionality of controlling the supply of tokens, token ownership, whitelists, transfers and dividends of the securities under its governance. It will also offer extra functions such as on-chain governance mechanism, voting, alerts and messaging, view only permissions and buyback options. 

Read more on XSC here.

Where can I buy DUSK?

Dusk Network is listed by leading cryptocurrency exchanges. You can find more details on

Privacy and anonymity while complying with regulations sound contradicting, could you elaborate?

Rather than contradictory, privacy and regulations often times go hand in hand. Governing bodies require that personally identifiable information (PII) be protected from malicious actors through legislation like the GDPR.

While Dusk Network focuses on privacy in order to protect PII and prevent manipulation, it also enables the possibility of audits to be done by regulators through the introduction of read only keys, which allows auditors to see the transactions (of the wallets of which the user has given them the view-key), but not touch the assets stored inside.

What is the business model of Dusk Network?

Dusk Network is intended as a protocol layer, that due to its decentralized nature can be used as infrastructure by anyone. This means that Dusk’s business goal is self-sustainability. We have a funding runway of multiple years and in parallel we expect the self-funding mechanism to be ready within a year. Within that year we will build out traction to support development going forward, which over time will likely increasingly decentralize via community governance and enhancement proposals.
Having stated all of the above it is prudent to say that the infrastructure is extremely well suited for commercial enterprises to be deployed on top of. When looking at only the immediate security token use case the value is apparent, not only can propositions deploy their security token (offering) on top of the network, but this adoption will lead to a suite of ‘pick and shovel’ applications to be built for this ecosystem. Applications for corporate actions, life-cycle management, or zero-knowledge authentication spring to mind immediately.