Block chain privacy: trading or calculation?

Chain-off, designed for developers and students, Insider!

This article from the chain off the block chain Q & A community , refused reproduced without permission.
Here Insert Picture Description

Block chain privacy: trading or calculation?

Privacy "What does it mean? Block chain in the ecosystem," privacy "the word is used in many different contexts, represented with so much going on, so that its meaning has been lost or confused. Consider the number of items to block chain "protection of privacy", and accurately classify these projects it is essential so that we can understand, compare and evaluate their "privacy" can usually be divided into two categories: trading privacy and computing privacy. in this article, we'll delve into this network and what users and distributed applications mean.

Trading privacy

When people think of the privacy of distributed applications and block chain, most people think of trading privacy. In private transactions, certain aspects of the public are hidden. Sender, recipient and amount of the transaction can be confusing, though it can be expensive computationally, but we now have the tools and support its network. The project has provided transaction privacy Zcash (use zksnark) and Monero (using the ring signature), these two items can be used to protect trade without interference from the public and the recipient. Trading privacy is a key factor in promoting the freedom of the individual transactions, but it is one-dimensional, because it allows for easy exchange of value. If we want something more powerful things - something beyond simple transaction - then we must turn to the calculation of privacy.

Calculation of privacy

Privacy in a distributed network computing has several basic requirements. First, the input data must be encrypted, and running on all nodes in the network observer secrecy and online transactions. Next, calculation can be performed on the encrypted data node needs. Finally, we must ensure that the results of running these nodes return calculation is correct.

If you can reliably meet these conditions, the calculation of the private network can remain dispersed, the advantages of block chain without permission, while maintaining information security and privacy; it supports general-purpose computing (not just something as simple as trading), without require disclosure of all data on the network.

Internet privacy

Think of the difference between Bitcoin and Ethernet Square. On the Bitcoin network, users can transfer back and forth value, but in most cases, nothing more. On the other hand, you can use smart Ethernet Square contract executed on the Square Ethernet Virtual Machine (EVM) any (with constraints) is calculated. Is the use of a single network, the other is a general-purpose network.

This is the origin of Enigma. Enigma using a privacy protection method of data encryption to maintain, while still allowing a general purpose computing. This gives a much-needed upgrade Ethernet Square: by hiding data, Square Ethernet network effect is maintained, while preventing the calculation itself was discovered. Privacy calculated using the method, developers can build truly distributed applications, while still being able to ensure that the user's data privacy.

? So these calculations privacy protection methods in the end what is it in Enigma, we focus on two systems: security zones (Trusted Execution Environment) and multi-party computation (MPC). Security zone is inside the chip is a physical computer hardware used to protect data from being externally visible. Use technologies such as remote authentication, network users can ensure that encrypted data submitted to the network it is still private, which is much faster than the pure software-based approach. Our upcoming Discovery uses this technique, and prioritizing availability.

In addition, Enigma team is committed to the use of MPC in the network architecture, it simulates a trusted third party through a combination of untrusted parties. Each computer on the network can only see the encrypted data, but never see anything of significance. For more information on the MPC, see the paper on the basis of decentralized privacy of our co-founder and CEO Guy Zyskind published in the Massachusetts Institute of Technology (now has more than 500 papers cited this paper), or view Github repository to get a better understanding!

DApp assessment and user privacy

As we have seen, understanding privacy mean any specific network or application what is challenging. Therefore, when you evaluate a the "privacy" as the project features provided, the first question to ask is: "? It is a private trading or calculation of privacy" The second question is, "This project which methods to use ensure privacy? "the third question is," What is the secret? "If you do not answer all of these questions, it is difficult to compare projects and technologies.

While other block chain projects can use different techniques to calculate the privacy protection, but we do not think we can provide a powerful and flexible Enigma has to offer. Enigma Enigma team is helping build people want to be the world's most powerful general-purpose computing network security - or, as we said, it is a distributed Web privacy layer.

Guess you like

Origin blog.csdn.net/weixin_44172023/article/details/91413934