| title | Pattern: Pre-trade privacy (Shutter/SUAVE/private RFQ) | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| status | ready | ||||||||
| maturity | pilot | ||||||||
| layer | hybrid | ||||||||
| privacy_goal | Prevent front-running and information leakage via encrypted order submission | ||||||||
| assumptions | Encrypted mempool (Shutter) or private builders (SUAVE), allow-listed counterparties | ||||||||
| last_reviewed | 2026-01-14 | ||||||||
| works-best-when |
|
||||||||
| avoid-when |
|
||||||||
| dependencies |
|
||||||||
| context | both | ||||||||
| crops_profile |
|
Prevent front-running and information leakage by routing quotes/orders via encrypted/private submission; then settle with confidential tokens.
- Infra: Shutter/SUAVE, allow-listed counterparties
- Off-chain: RFQ broker, audit of quote requests
- Buyer emits RFQ off-chain; quotes returned privately.
- Winning order submitted via encrypted route for inclusion.
- Settlement occurs on privacy L2/L1 pool; amounts remain hidden.
- No public mempool leakage of intent/size/price.
- Auditable RFQ lifecycle.
- Additional infra dependency; fallback path required.
- Latency/availability tied to privacy routing.
- CROPS context (both): CR could reach
highif threshold committee selection becomes permissionless via stake-weighted rotation. OS improves toyesby open-sourcing all encryption and decryption logic under copyleft. Privacy could reachfullby encrypting quotes end-to-end until settlement confirmation, not just during the pre-trade phase. Security could reachhighby hardening collusion resistance through key compartmentalization across independent operators. In I2I, encrypted order flow prevents counterparties and intermediaries from front-running institutional block trades. In I2U, threshold encryption protects retail orders from MEV extraction by builders or relayers. - Post-quantum exposure: threshold encryption schemes (Shutter/commit-reveal) may rely on pairings broken by CRQC. Mitigation: lattice-based threshold encryption. See Post-Quantum Threats.
- Three quotes received; best quote settles; unfilled quotes remain undisclosed.
- pattern-confidential-erc20-fhe-l2-erc7573.md · pattern-secondary-market-rfq-batched-settlement.md
- Shutter docs: https://docs.shutter.network/docs/shutter/research/the_road_towards_an_encrypted_mempool_on_ethereum
- Flashbots · SUAVE overview: https://writings.flashbots.net/the-future-of-mev-is-suave
- Flashbots docs hub: https://docs.flashbots.net/