1. Introduction
The main technical goal of the Republic Protocol is to ensure the operation of network nodes so that transactions on the switch are processed and executed without revealing information about themselves. Republic Protocol uses Shamir's encryption sharing scheme to divide orders into multiple segments distributed throughout the network. If most of the fragments are not collected, the original order cannot be recreated. In order to prevent the malicious fragmented orders, the Republic Protocol uses a smart contract called a "registrar", which is a network topology gathered at network nodes.
2. Highlights
a. The identity of the trader is safe in the Republic Protocol. The cryptocurrency being traded underlying may provide different privacy restrictions.
b. Traders do not have to maintain a connection to the network when matching orders. Once the order is placed, the node will run a matching calculation until a match is found, or the order has expired (manually or preset the deadline).
c. The order is private until it matches. After matching, some details of the order will be displayed to the matching party. Since both parties know that this is a natural limitation of order security, they need to know when competition has occurred. Note that the information disclosed in these cases will not provide any information advantage to any party.