illumineX Docs
  • πŸ”Introduction
  • βš™οΈFeatures
    • πŸ“©Private wrapped tokens
    • πŸŒͺ️Confidential unwrapping buffered queue
    • πŸ•ΈοΈConfidential multi-chain swaps
  • πŸ’±Economy
    • πŸ’ΈFees model
    • 🏦illumineX Fund
  • πŸ€“Guide
    • πŸŒ‰Bridging tutorial
    • πŸ“ˆBoosted Farming & Staking Rewards
    • 🌊Adding Liquidity
    • πŸ”’Private Wrapped Tokens
    • πŸ”„Swapping
  • πŸ›£οΈRoadmap
  • πŸ”Privacy Settings
  • βš–οΈCompliance
  • πŸ’΅Tokenomics
    • IX Token
    • Distribution
    • Token Utility
    • Protocol Earnings
    • Public & Private Sale
  • Misc
    • πŸ“ƒContracts
    • 🌐Links
    • βš’οΈAudit
Powered by GitBook
On this page
  • In a nutshell
  • How does this integration work?
  1. Features

Confidential multi-chain swaps

PreviousConfidential unwrapping buffered queueNextFees model

Last updated 1 year ago

In a nutshell

As part of illumineX's commitment to providing a seamless experience within the entire EVM ecosystem, we have established a strategic partnership with Celer IM. This collaboration leverages fast and cost-effective inter-chain messaging framework to enhance the functionality of our platform.

How does this integration work?

When a user submits a swap instruction through illumineX, the smart contract on the source chain, referred to as the "Source endpoint", generates a message for Celer IM. This message is then transmitted to another endpoint smart contract deployed on the Sapphire network.

Upon reception, the Sapphire endpoint parses the message data, executes the swap, and allocates the output token volume in accordance with the provided swap instruction.

The swap request encapsulates comprehensive details about the swap, including the designated destinations for the distribution of the output tokens (the results of the swap) and their respective proportions. Prior to transmission to the source chain endpoint smart contract, the swap request undergoes encryption using the Sapphire endpoint encryption functions, which are fortified by the symmetrical encryption algorithm.

This entire multi-chain swapping mechanism is underpinned by the use of and a .

βš™οΈ
πŸ•ΈοΈ
Deoxys-II
private wrapped tokens
confidential unwrapping buffered queue
Celer IM's