It integrates the most advanced technologies in cryptography and blockchain fields such as Proxy Re-encryption, Zero-Knowledge proof, Fully Homomorphic Encryption, Chain Interoperation, etc.
Proxy re-encryption (PRE) is a type of public-key encryption (PKE) that allows a third party to transform ciphertext under one public key to another, without leaking any information.
Distributed storage is a storage method based on P2P network. It uses cryptography technologies such as hash，which make it has advantages in file retrieval and file transfer.
3. Blockchain Interoperation
Blockchain interoperation is the technology that allows two or more different block chain systems can read, write and transmit information to each other.
1.Zero Knowledge Proof
Zero knowledge proof (ZKP) is a proof mechanism does not reveal privacy. The prover makes the verifier believe a certain conclusion without providing useful knowledge.
2.Secure Multi-party Computation
Secure multi-party computation (MPC) is a computing method of multi-party cooperation. It means that multiple participants who hold private data jointly calculate a certain agreed function, and obtain the results safely.
Identity-based encryption (IBE) uses user's identity as a part of key, the sender can transfer a message that can only be decrypted by the recipient of the specified identity.
Attribute-based encryption (ABE) uses user's attribute set as a part of key, which can restrict user's ability to access and decrypt the ciphertext.
1. Electronic Health Records Sharing
2. Private-Preserving Social Network
3. Decentralized digital rights management
4. Encrypted NFT