Overview
Umbra’s compliance system is entirely voluntary and user-initiated. Two independent mechanisms cover different parts of the protocol:Mixer Pool Viewing Keys
Derive scoped cryptographic keys from your master viewing key and share them with auditors. Viewing keys give read access to mixer pool (UTXO) activity within a specific time window or token scope - without exposing anything outside that scope.
X25519 Compliance Grants
Create on-chain grants that authorize Arcium MPC to re-encrypt your encrypted token account balances under a grantee’s X25519 key. The grantee can then decrypt and read the re-encrypted ciphertexts using their own private key.
No party can access your data without your explicit action. Neither mechanism is reversible for data the grantee has already received - revoking a grant prevents future access but does not invalidate ciphertexts already re-encrypted.
Mixer Pool Viewing Keys
The master viewing key (MVK) is a BN254 field element derived from your master seed. It is the root of a key hierarchy you can share selectively:X25519 Based Compliance Grants
X25519 compliance grants use on-chain PDAs to authorize Arcium MPC to re-encrypt your encrypted token account ciphertexts under a grantee’s X25519 key. You create the grant voluntarily, choose the receiver and a unique nonce, and can revoke it at any time by deleting the PDA.Privacy and Trust Model
- Compliance grants are stored on-chain as marker PDAs - their existence is transparent and auditable
- A viewing key at scope X gives access only to data within scope X - no access to anything outside that scope
- Revoking a compliance grant (deleting the PDA) prevents future re-encryption requests, but does not invalidate ciphertexts the grantee has already obtained
- The master viewing key and master seed are never shared directly through either mechanism