An On-chain Funding Platform with privacy-preserving features powered by ZKP.
Videos - Public Testnet (In-progress)
The Distributed Key Generation (DKG) protocol is a fundamental cryptographic module in our platform. This protocol ensures the secure generation of asymmetric cryptographic keys in a distributed manner, preventing any single entity from having complete access to sensitive key information. The generated keys can be used by the Threshold Homomorphic Encryption service, which enable privacy-preserving features such as Private Funding or Private Voting on our platform.
-
Committee Management: Creation and configuration of a key generation committee with a security threshold of T / N members.
-
Key Generation: Committee members contribute their random inputs and computation result to generate encryption public keys.
-
Key Usage: Services can request to use generated keys for their use cases.
-
Threshold (Additive) Homomorphic Encryption: This service allows an arbitrary number of users to encrypt their secret vectors and the sum vector can be computed without decrypting the encryption submissions. And the final results can only be computed after T / N members submitted their response contribution.
This protocol can support various applications that prioritize data privacy and security. Some of the applications that can benefit from DKG include:
-
Private Funding: Applications dealing with financial transactions and investments can use DKG to secure sensitive financial data.
-
Private Voting: DKG can be employed to create secure voting systems where individual votes remain confidential, preventing unauthorized access or manipulation.
-
Social Recovery: DKG can aid in securely recovering lost or forgotten passwords or keys without compromising user data privacy.
-
Fee Configuration: Committees will soon be able to configure custom fee paid by other services for key usages.
-
Supports for other use cases: Currently, our DKG protocol supports generation of public keys compatible to Pasta Curves and ElGamal encryption scheme based on those curves. We are open for partnership and collaboration to work on supporting other schemes and use cases.
-
Public Docker Image: This protocol and its application for user interaction requires the availability of some services: Reducer Service, REST Service, and Storage Service. These services are open-sourced and will be published as public docker images to allow anyone with interests to run and maintain by themselves.
npm run build
npm run test
npm run testw # watch mode
npm run coverage