How Does Lelantus Spark Work? A Full Breakdown of Firo’s Privacy Transaction Flow

Last Updated 2026-05-15 07:18:22
Reading Time: 7m
Lelantus Spark is the privacy protocol used by Firo. It enables anonymous on-chain transactions through anonymity pools, Spark addresses, and zero-knowledge proofs. Users first convert public assets into an anonymity pool, then withdraw assets again through hidden addresses, breaking the on-chain link between transaction inputs and outputs. Compared with traditional public blockchain transactions, Lelantus Spark can hide the sender, recipient, and transfer amount, while combining with Dandelion++ to reduce network-layer tracing risks. The protocol is also a key component of Firo’s private financial infrastructure.

As blockchain applications gradually expand into stablecoins, DeFi, and cross-border payments, transparent on-chain data is exposing more privacy issues, including address linkage, fund flow tracking, and user behavior analysis. Privacy protocols have therefore become an important part of Web3 infrastructure, and Lelantus Spark is one of the more representative solutions in the recent evolution of privacy protocols.

Compared with traditional privacy coins that mainly focus on anonymous transfers, Lelantus Spark places greater emphasis on a transaction structure that is “verifiable but untraceable.” Its design is not only used to hide user transaction activity, but also provides the underlying support for Spark Assets, private stablecoins, and confidential asset systems. Within the Firo ecosystem, Lelantus Spark is not just an anonymous transaction tool, but the core infrastructure of the entire private finance system.

What Is Lelantus Spark?

Lelantus Spark is a zero-knowledge privacy protocol launched by Firo. It is used to hide the sender, recipient, and amount in on-chain transactions. Its design focuses on breaking the on-chain link between transaction inputs and outputs through anonymity pools and zero-knowledge proofs.

Compared with Firo’s earlier Sigma and Lelantus protocols, Spark further improves transaction efficiency, privacy structure, and user experience. Spark also introduces a new address model, making anonymous transactions feel closer to ordinary cryptocurrency transfers.

What Is Lelantus Spark?

How Is Lelantus Spark Different from Ordinary Blockchain Transactions?

Ordinary blockchain transactions are usually fully public. Anyone can view wallet addresses, asset flows, and transfer amounts. Lelantus Spark hides this key data, reducing the likelihood that on-chain analytics tools can trace user activity.

On traditional public chains, transaction inputs and outputs usually have clear links. Spark tries to break that linkage structure.

Why Does Firo Use the Spark Protocol?

Firo previously used the Zerocoin and Sigma protocols, but as privacy technology evolved, the project needed a more efficient and flexible anonymity model. One of Spark’s main goals is to improve privacy and scalability without relying on a trusted setup.

How Does a Firo Private Transaction Begin?

A Firo private transaction usually begins when a user converts public assets into anonymous assets.

Step 1: Public FIRO Enters the Anonymity Pool

The user first transfers ordinary public FIRO into the Spark anonymity pool. During this process, assets on the public chain are converted into an anonymous state.

This is similar to “repackaging” publicly traceable assets as anonymous assets, reducing the risk of linking them back to the original address.

Step 2: Generate a Spark Address

Users rely on Spark addresses when making private transactions. Unlike traditional public addresses, Spark addresses do not directly expose long-term asset relationships.

Spark addresses are designed to reduce the on-chain tracing risks caused by address reuse.

Step 3: Assets Enter a Shared Anonymity Set

All assets that enter the Spark system become part of a shared anonymity pool. As the pool grows, the link between a single transaction and its original source becomes harder to identify.

How Does Firo’s Anonymity Pool Work?

The anonymity pool is the core structure of the Lelantus Spark privacy model. Its role is to mix a large number of user transactions, improving anonymity.

What Is an Anonymity Set?

An anonymity set can be understood as a “set of possible transaction sources.” The larger the anonymity set, the harder it is for outside observers to determine which asset came from the real sender.

Spark’s anonymity does not rely on mixing just two individual transactions. Instead, it is built on a much larger anonymity pool.

Why Do Anonymity Pools Improve Privacy?

On public blockchains, transaction paths can usually be tracked continuously. An anonymity pool breaks this continuity, making it difficult to create a direct mapping between inputs and outputs.

This mechanism is similar to placing many identical assets into a shared pool, then withdrawing assets again from that pool.

How Are Anonymity Pools Different from Traditional CoinJoin?

CoinJoin usually requires multiple users to participate in transaction mixing at the same time. Spark’s anonymity pool structure is more flexible and does not require users to participate synchronously.

Compared with CoinJoin, Spark is better suited to long-term anonymity set expansion.

How Do Zero-Knowledge Proofs Verify Transactions?

Lelantus Spark uses zero-knowledge proofs to verify transaction validity while avoiding the exposure of specific transaction details.

What Are Zero-Knowledge Proofs?

Zero-knowledge proofs are a cryptographic technique that allows users to prove something is true without revealing the underlying data.

In Spark, the network can verify that a user really owns the assets and satisfies the transaction rules, without publicly revealing the source or amount of those assets.

How Does Spark Prevent Double Spending?

Even when transaction details are hidden, Spark still uses cryptographic mechanisms to ensure that the same asset cannot be spent more than once.

This means the system can protect privacy while maintaining blockchain security and consistency.

Why Is No Trusted Setup Important?

Some zero-knowledge protocols require a trusted setup. If the initialization process has problems, it could theoretically affect system security. One of Spark’s design goals is to avoid this dependency.

How Are Spark Addresses Different from Ordinary Addresses?

Spark addresses are one of the important structures introduced by Lelantus Spark. Their role is to improve the private transaction experience.

What Privacy Problems Do Ordinary Addresses Have?

Traditional public addresses are usually fixed over long periods, making it easy to build a complete on-chain asset profile. Once an address is linked to a real-world identity, historical transaction records can also continue to be tracked.

How Do Spark Addresses Improve Anonymity?

Spark addresses do not directly expose long-term asset relationships, nor do they publicly display the full flow of funds the way ordinary addresses do.

This structure is better suited to payment scenarios that require privacy protection.

Do Spark Addresses Support Ordinary Transfers?

Spark addresses are mainly used for private transaction scenarios, while ordinary public addresses can still be used for regular on-chain transfers.

How Does Dandelion++ Protect Transaction Origins?

Beyond on-chain privacy, network-layer privacy is also important. Even when transaction data is hidden, node broadcast paths may still expose a user’s IP address.

How Dandelion++ Works

Dandelion++ divides transaction propagation into two phases, Stem and Fluff. In the initial phase, a transaction randomly passes through multiple nodes. Only afterward is it broadcast to the entire network.

This mechanism can reduce the likelihood that an attacker identifies the transaction source through the broadcast path.

Why Network-Layer Privacy Matters

Without network-layer privacy, a user’s IP address may still reveal the real source of their activity, even if transaction amounts and addresses are hidden.

For this reason, on-chain privacy and network-layer privacy usually need to be used together.

How Is Lelantus Spark Different from Monero and Zcash?

Firo, Monero, and Zcash all follow privacy protocol paths, but their underlying designs are clearly different.

Comparison Dimension Lelantus Spark Monero RingCT Zcash zk-SNARKs
Amount Hiding Supported Supported Supported
Address Privacy Supported Supported Supported
Trusted Setup Not required Not required Required
Anonymity Structure Anonymity pool Ring signatures Zero-knowledge proofs
Network-Layer Privacy Dandelion++ Dandelion++ Partially supported

Compared with RingCT and zk-SNARKs, Spark places greater emphasis on an anonymity pool structure that does not require a trusted setup, along with scalable confidential asset capabilities.

Conclusion

Lelantus Spark is the core protocol in Firo’s privacy system. Through anonymity pools, Spark addresses, and zero-knowledge proofs, it hides transaction senders, recipients, and amounts, reducing the risk of on-chain tracing. Compared with traditional public blockchain transactions, Spark places greater emphasis on a “verifiable but untraceable” privacy model and strengthens network-layer anonymity through Dandelion++.

As blockchain use cases gradually expand into stablecoins, DeFi, and digital asset issuance, privacy infrastructure continues to become more important. The anonymous asset structure explored by Lelantus Spark has also become one of the key technical paths for private finance in Web3.

FAQs

How Does Lelantus Spark Enable Anonymous Transactions?

Spark breaks the link between transaction inputs and outputs through anonymity pools, Spark addresses, and zero-knowledge proofs.

Does Spark Require a Trusted Setup?

No. One of Spark’s design goals is to avoid reliance on a trusted setup.

How Are Spark Addresses Different from Ordinary Addresses?

Spark addresses are mainly used for anonymous transactions and do not directly expose long-term asset relationships the way ordinary public addresses do.

Does Spark Hide Transaction Amounts?

Yes. Lelantus Spark can hide transaction amounts and fund flows.

What Is the Relationship Between Dandelion++ and Spark?

Spark handles on-chain privacy, while Dandelion++ handles network-layer privacy. Together, they reduce the risk of users being traced.

Author: Jayne
Translator: Jared
Disclaimer
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Related Articles

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline
Beginner

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline

This article explores the development trends, applications, and prospects of cross-chain bridges.
2026-04-08 17:11:27
Solana Need L2s And Appchains?
Advanced

Solana Need L2s And Appchains?

Solana faces both opportunities and challenges in its development. Recently, severe network congestion has led to a high transaction failure rate and increased fees. Consequently, some have suggested using Layer 2 and appchain technologies to address this issue. This article explores the feasibility of this strategy.
2026-04-06 23:31:03
Sui: How are users leveraging its speed, security, & scalability?
Intermediate

Sui: How are users leveraging its speed, security, & scalability?

Sui is a PoS L1 blockchain with a novel architecture whose object-centric model enables parallelization of transactions through verifier level scaling. In this research paper the unique features of the Sui blockchain will be introduced, the economic prospects of SUI tokens will be presented, and it will be explained how investors can learn about which dApps are driving the use of the chain through the Sui application campaign.
2026-04-07 01:11:45
Navigating the Zero Knowledge Landscape
Advanced

Navigating the Zero Knowledge Landscape

This article introduces the technical principles, framework, and applications of Zero-Knowledge (ZK) technology, covering aspects from privacy, identity (ID), decentralized exchanges (DEX), to oracles.
2026-04-08 15:08:18
What is Tronscan and How Can You Use it in 2025?
Beginner

What is Tronscan and How Can You Use it in 2025?

Tronscan is a blockchain explorer that goes beyond the basics, offering wallet management, token tracking, smart contract insights, and governance participation. By 2025, it has evolved with enhanced security features, expanded analytics, cross-chain integration, and improved mobile experience. The platform now includes advanced biometric authentication, real-time transaction monitoring, and a comprehensive DeFi dashboard. Developers benefit from AI-powered smart contract analysis and improved testing environments, while users enjoy a unified multi-chain portfolio view and gesture-based navigation on mobile devices.
2026-03-24 11:52:42
What Is Ethereum 2.0? Understanding The Merge
Intermediate

What Is Ethereum 2.0? Understanding The Merge

A change in one of the top cryptocurrencies that might impact the whole ecosystem
2026-04-09 09:17:06