We are reshaping the financial industry.

Hero

Virtual Machine
PIECRUST

Rusk enables you to program smart contracts, power new decentralized applications (dapps) and set parameters for compliance and control. The Rusk VM relies entirely on zero-knowledge proof cryptography and is the world’s first Zero-Knowledge Virtual Machine (ZK-VM) implementation. Yes, even gas fee refunds, block rewards and other related transactions are obfuscated.

Zero-Knowledge
PLONK

We are using PLONK, the latest and most recent advancement in zero-knowledge cryptography. Zero-Knowledge is paramount for public blockchain collaboration because it allows businesses to issue claims and submit proofs, whilst transacting securely and in strict privacy.

Consensus
SUCCINCT ATTESTATION

Dusk is powered by the Succinct Attestation (SA) agreement. SA is a novel consensus algorithm designed by Dusk to create a Proof-of-Stake-based, decentralized and permissionless blockchain network. SA achieves instant settlement finality, meaning that transactions settled on the network are irrevocable and final.

Privacy-preserving digital identity
CITADEL

We created Citadel, and its off-chain version Shelter, to provide private KYC for institutions. Institutions can use Citadel to reduce costs and automate processes, as well as being able to offer "KYC-as-a-Service", while users are able to practice selective disclosure and protect their data.

Network Fuel
DUSK

Businesses use DUSK to pay for network services, such as deploying and running a smart contract, and transferring DUSK or XSC-based security tokens. For each transaction submitted to the network, DUSK is used to compensate network nodes for bandwidth, verification, and storage.
DUSK DUSK DUSK DUSK
DUSK DUSK DUSK DUSK

How Dusk is
Revolutionizing DeFi

  1. Final

    Transactions are fast and achieve immediate on-chain finality.

  2. Private

    Zero-Knowledge cryptography is our bread and butter. We make privacy programmable on a public ledger.

  3. Scalable

    The Succinct Attestation consensus algorithm is designed for high-throughput, supporting the needs of businesses of all sizes.

  4. Secure

    Dusk enforces stringent security standards, providing you with a trusted and reliable network.