Tokens
This document is better viewed at https://docs.openzeppelin.com/confidential-contracts/api/token |
This set of interfaces, contracts, and utilities are all related to the evolving Confidential Token Standard. The standard utilizes the Zama fhEVM co-processor for manipulating FHE values. All amounts are stored on-chain as cypher-text handles (or pointers) to values stored on the co-processor.
-
ConfidentialFungibleToken
: Implementation ofIConfidentialFungibleToken
. -
ConfidentialFungibleTokenERC20Wrapper
: Extension ofConfidentialFungibleToken
which wraps anERC20
into a confidential token. The wrapper allows for free conversion in both directions at a fixed rate. -
ConfidentialFungibleTokenUtils
: A library that provides the on-transfer callback check used byConfidentialFungibleToken
.
Core
ConfidentialFungibleToken
import "@openzeppelin/confidential-contracts/token/ConfidentialFungibleToken.sol";
Reference implementation for IConfidentialFungibleToken
.
This contract implements a fungible token where balances and transfers are encrypted using the Zama fhEVM,
providing confidentiality to users. Token amounts are stored as encrypted, unsigned integers (euint64
)
that can only be decrypted by authorized parties.
Key features:
-
All balances are encrypted
-
Transfers happen without revealing amounts
-
Support for operators (delegated transfer capabilities with time bounds)
-
Transfer and call pattern
-
Safe overflow/underflow handling for FHE operations
-
onlyGateway()
-
constructor(name_, symbol_, tokenURI_)
-
name()
-
symbol()
-
decimals()
-
tokenURI()
-
totalSupply()
-
balanceOf(account)
-
isOperator(holder, spender)
-
setOperator(operator, until)
-
confidentialTransfer(to, encryptedAmount, inputProof)
-
confidentialTransfer(to, amount)
-
confidentialTransferFrom(from, to, encryptedAmount, inputProof)
-
confidentialTransferFrom(from, to, amount)
-
confidentialTransferAndCall(to, encryptedAmount, inputProof, data)
-
confidentialTransferAndCall(to, amount, data)
-
confidentialTransferFromAndCall(from, to, encryptedAmount, inputProof, data)
-
confidentialTransferFromAndCall(from, to, amount, data)
-
discloseEncryptedAmount(encryptedAmount)
-
finalizeDiscloseEncryptedAmount(requestId, amount)
-
_setOperator(holder, operator, until)
-
_mint(to, amount)
-
_burn(from, amount)
-
_transfer(from, to, amount)
-
_transferAndCall(from, to, amount, data)
-
_update(from, to, amount)
-
OperatorSet(holder, operator, until)
-
ConfidentialTransfer(from, to, amount)
-
EncryptedAmountDisclosed(encryptedAmount, amount)
-
ConfidentialFungibleTokenInvalidReceiver(receiver)
-
ConfidentialFungibleTokenInvalidSender(sender)
-
ConfidentialFungibleTokenUnauthorizedSpender(holder, spender)
-
ConfidentialFungibleTokenZeroBalance(holder)
-
ConfidentialFungibleTokenUnauthorizedUseOfEncryptedAmount(amount, user)
-
ConfidentialFungibleTokenUnauthorizedCaller(caller)
-
ConfidentialFungibleTokenInvalidGatewayRequest(requestId)
isOperator(address holder, address spender) → bool
public
Returns true if spender
is currently an operator for holder
.
setOperator(address operator, uint48 until)
public
Sets operator
as an operator for holder
until the timestamp until
.
An operator may transfer any amount of tokens on behalf of a holder while approved. |
confidentialTransfer(address to, einput encryptedAmount, bytes inputProof) → euint64
public
Transfers the encrypted amount encryptedAmount
to to
with the given input proof inputProof
.
Returns the encrypted amount that was actually transferred.
confidentialTransfer(address to, euint64 amount) → euint64
public
Similar to confidentialTransfer
but without an input proof. The caller
must already be allowed by ACL for the given amount
.
confidentialTransferFrom(address from, address to, einput encryptedAmount, bytes inputProof) → euint64 transferred
public
Transfers the encrypted amount encryptedAmount
from from
to to
with the given input proof
inputProof
. msg.sender
must be either from
or an operator for from
.
Returns the encrypted amount that was actually transferred.
confidentialTransferFrom(address from, address to, euint64 amount) → euint64 transferred
public
Similar to confidentialTransferFrom
but without an input proof. The caller
must be already allowed by ACL for the given amount
.
confidentialTransferAndCall(address to, einput encryptedAmount, bytes inputProof, bytes data) → euint64 transferred
public
Similar to confidentialTransfer
but with a callback to to
after the transfer.
The callback is made to the IConfidentialFungibleTokenReceiver.onConfidentialTransferReceived
function on the
to address with the actual transferred amount (may differ from the given encryptedAmount
) and the given
data data
.
confidentialTransferAndCall(address to, euint64 amount, bytes data) → euint64 transferred
public
Similar to confidentialTransfer
but with a callback to to
after the transfer.
confidentialTransferFromAndCall(address from, address to, einput encryptedAmount, bytes inputProof, bytes data) → euint64 transferred
public
Similar to confidentialTransferFrom
but with a callback to to
after
the transfer.
confidentialTransferFromAndCall(address from, address to, euint64 amount, bytes data) → euint64 transferred
public
Similar to confidentialTransferFrom
but with a callback to to
after the transfer.
discloseEncryptedAmount(euint64 encryptedAmount)
public
Discloses an encrypted amount encryptedAmount
publicly via an {EncryptedAmountDisclosed}
event. The caller and this contract must be authorized to use the encrypted amount on the ACL.
This is an asynchronous operation where the actual decryption happens off-chain and
finalizeDiscloseEncryptedAmount is called with the result.
|
finalizeDiscloseEncryptedAmount(uint256 requestId, uint64 amount)
public
May only be called by the gateway contract. Finalizes a disclose encrypted amount request.
_transferAndCall(address from, address to, euint64 amount, bytes data) → euint64 transferred
internal
ConfidentialFungibleTokenInvalidReceiver(address receiver)
error
The given receiver receiver
is invalid for transfers.
ConfidentialFungibleTokenInvalidSender(address sender)
error
The given sender sender
is invalid for transfers.
ConfidentialFungibleTokenUnauthorizedSpender(address holder, address spender)
error
The given holder holder
is not authorized to spend on behalf of spender
.
ConfidentialFungibleTokenZeroBalance(address holder)
error
The holder holder
is trying to send tokens but has a balance of 0.
ConfidentialFungibleTokenUnauthorizedUseOfEncryptedAmount(euint64 amount, address user)
error
The caller user
does not have access to the encrypted amount amount
.
Try using the equivalent transfer function with an input proof. |
Extensions
ConfidentialFungibleTokenERC20Wrapper
import "@openzeppelin/confidential-contracts/token/extensions/ConfidentialFungibleTokenERC20Wrapper.sol";
A wrapper contract built on top of ConfidentialFungibleToken
that allows wrapping an ERC20
token
into a confidential fungible token. The wrapper contract implements the IERC1363Receiver
interface
which allows users to transfer ERC1363
tokens directly to the wrapper with a callback to wrap the tokens.
-
constructor(underlying_)
-
decimals()
-
rate()
-
underlying()
-
onTransferReceived(, from, amount, data)
-
wrap(to, amount)
-
unwrap(from, to, amount)
-
unwrap(from, to, encryptedAmount, inputProof)
-
finalizeUnwrap(requestID, amount)
-
_unwrap(from, to, amount)
-
name()
-
symbol()
-
tokenURI()
-
totalSupply()
-
balanceOf(account)
-
isOperator(holder, spender)
-
setOperator(operator, until)
-
confidentialTransfer(to, encryptedAmount, inputProof)
-
confidentialTransfer(to, amount)
-
confidentialTransferFrom(from, to, encryptedAmount, inputProof)
-
confidentialTransferFrom(from, to, amount)
-
confidentialTransferAndCall(to, encryptedAmount, inputProof, data)
-
confidentialTransferAndCall(to, amount, data)
-
confidentialTransferFromAndCall(from, to, encryptedAmount, inputProof, data)
-
confidentialTransferFromAndCall(from, to, amount, data)
-
discloseEncryptedAmount(encryptedAmount)
-
finalizeDiscloseEncryptedAmount(requestId, amount)
-
_setOperator(holder, operator, until)
-
_mint(to, amount)
-
_burn(from, amount)
-
_transfer(from, to, amount)
-
_transferAndCall(from, to, amount, data)
-
_update(from, to, amount)
-
OperatorSet(holder, operator, until)
-
ConfidentialTransfer(from, to, amount)
-
EncryptedAmountDisclosed(encryptedAmount, amount)
-
ConfidentialFungibleTokenInvalidReceiver(receiver)
-
ConfidentialFungibleTokenInvalidSender(sender)
-
ConfidentialFungibleTokenUnauthorizedSpender(holder, spender)
-
ConfidentialFungibleTokenZeroBalance(holder)
-
ConfidentialFungibleTokenUnauthorizedUseOfEncryptedAmount(amount, user)
-
ConfidentialFungibleTokenUnauthorizedCaller(caller)
-
ConfidentialFungibleTokenInvalidGatewayRequest(requestId)
rate() → uint256
public
Returns the rate at which the underlying token is converted to the wrapped token.
For example, if the rate
is 1000, then 1000 units of the underlying token equal 1 unit of the wrapped token.
underlying() → contract IERC20
public
Returns the address of the underlying ERC-20 token that is being wrapped.
unwrap(address from, address to, euint64 amount)
public
Unwraps tokens from from
and sends the underlying tokens to to
. The caller must be from
or be an approved operator for from
. amount * rate()
underlying tokens are sent to to
.
This is an asynchronous function and waits for decryption to be completed off-chain before disbursing
tokens.
NOTE: The caller must already be approved by ACL for the given amount .
|
unwrap(address from, address to, einput encryptedAmount, bytes inputProof)
public
Variant of unwrap
that passes an inputProof
which approves the caller for the encryptedAmount
in the ACL.
Utilities
ConfidentialFungibleTokenUtils
import "@openzeppelin/confidential-contracts/token/utils/ConfidentialFungibleTokenUtils.sol";
Library that provides common ConfidentialFungibleToken
utility functions.
-
checkOnTransferReceived(operator, from, to, amount, data)
checkOnTransferReceived(address operator, address from, address to, euint64 amount, bytes data) → ebool
internal
Performs a transfer callback to the recipient of the transfer to
. Should be invoked
after all transfers "withCallback" on a ConfidentialFungibleToken
.
The transfer callback is not invoked on the recipient if the recipient has no code (i.e. is an EOA). If the
recipient has non-zero code, it must implement
IConfidentialFungibleTokenReceiver.onConfidentialTransferReceived
and return an ebool
indicating
whether the transfer was accepted or not. If the ebool
is false
, the transfer will be reversed.