-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
Enigma is a distributed computing platform with privacy guarantees. With secure multi-party computing technology, different parties can run computing programs on distributed stored data and get the correct results without accessing the original data itself. Enigma separates data access and calculation, making sharing data no longer an irreversible process, realizes autonomous control of personal data, and establishes a foundation for data monetization.
The Enigma protocol is Enigma's computing model, which is based on a highly optimized version of multi-party computing, ensuring security through a verifiable secret sharing solution. To keep data secretly shared, Enigma uses an improved distributed hash table to store data.
1. Privacy
Request data is calculated in distributed form by using secure multi-party computing (SMPC). The data is randomly scattered into multiple nodes, and they share the responsibility for computing, without worrying about data leakage to other nodes. It should be emphasized that no node can access the complete data, they only contain a certain part of the data.
2. Scalability
Enigma does not store complete data like blockchain, and only a small number of nodes calculate part of the data. This separation of storage and computing design makes the system naturally scalable.
At present, the traditional data sharing method is irreversible. Once the data is shared, it cannot be reclaimed and controlled. But Enigma allows fallback and control of data, because no one can see the original data except the owner of the data. This has brought fundamental changes to the current field of data analysis and has subverted data encryption transactions.
3. Private Contract
In Enigma's design model, the code is executed in two parts. The public part is executed on the blockchain, and the private data is executed off-chain. To support decentralized application development, the Enigma team designed a scripting language similar to smart contracts: private contracts. It is Turing-complete and can handle privacy data.
4. Catalyst application
Catalyst is the first application of the Enigma protocol, driven by the financial data market. Catalyst allows users to share and manage data, as well as build beneficial investment strategies driven by data. It allows developers to build, test, and trade crypto assets. Catalyst allows developers to access Enigma's decentralized data marts to consume valuable encrypted data for investment strategy analysis.
5. Decentralized data mart
Enigma has established an open, secure decentralized market that allows individuals, companies and organizations to share and consume data. Tokens are used to manage data subscriptions, rewards and penalties on the chain. The storage and transmission of the data itself are completed off-chain.
https://enigma.co/ecosystem/