Deposit tokens and earn rewards.
Zcash (ZEC) is not listed as a staking asset on Staking Rewards. You can still convert token prices, calculate reward rates and compare against rewards earned for other top staking assets.Learn more about Zcash Staking
Convert ZEC to
Zcash Rewards Calculator
*The industry average reward rate is %
Earn up to on assets with a similar Market Cap
Earn up to on Assets with a similar Daily Volume
Earn up to with the most popular staking assets.
Learn about Zcash Staking
How to Stake Zcash?
You can lend your Zcash to a custodial lending provider in return for a set APY.
How much can I earn Staking Zcash?
The APY rate is set by the custodial lending providers, some current examples show around 2% APY.
Any risk to Staking Zcash?
When you participate in custodial lending your are taking a risk, please verify your providers throughly.
What is Zcash?
Zcash is a decentralized and open-source cryptocurrency that offers privacy and selective transparency of transactions. Zcash payments are published on a public blockchain, but the sender, recipient, and amount of a transaction remain private.
Zcash is based on peer-reviewed cryptographic research, and built by a security-specialized engineering team on an open source platform based on Bitcoin Core’s battle-tested codebase. Our improvement over Bitcoin is the addition of privacy. Zcash uses advanced cryptographic techniques, namely zero-knowledge proofs, to guarantee the validity of transactions without revealing additional information about them.
Who is the Team behind Zcash?
How was Zcash Launched?
The Zcash block chain launched on October 28, 2016, bringing into existence the first Zcash monetary units. This software release and the initial phase of the blockchain is called ‘Sprout’ to emphasize that it is a young, budding blockchain with great potential to grow.
Zcash is based on the peer-reviewed Zerocash protocol, which was published in the IEEE Security & Privacy conference in 2014. The Zerocash paper provides a detailed technical overview of the specification. Changes to the protocol are not generally peer-reviewed, but they are described and justified comprehensively in the protocol specification. Those changes have been subjected to several independent security audits.