-
Cryptocurrencies
-
Exchanges
-
Media
All languages
Cryptocurrencies
Exchanges
Media
Enigma is a distributed computing platform with privacy guarantees. With the help of secure multi-party computing technology, different parties can run computing programs on distributed stored data and get correct results without accessing the original data itself. Enigma separates data access and calculation, making sharing data no longer an irreversible process, realizing autonomous control of personal data, and establishing a foundation for data monetization.
The Enigma protocol is Enigma's computing model, which is based on a highly optimized version of multi-party computing, and is secured through a verifiable secret sharing scheme. In order to maintain the secret sharing of data, Enigma uses a modified distributed hash table to store data.
1. Privacy
By using Secure Multi-Party Computation (SMPC), request data is computed in a distributed form. Data is randomly distributed to multiple nodes, and they share the computing responsibility, without worrying about data leakage to other nodes. It should be emphasized that no single node can access the complete data, they only contain a certain part of the data.
2. Scalability
Unlike the blockchain, Enigma stores complete data in each node, and only a small number of nodes calculate part of the data. This separation of storage and computing makes the system naturally scalable.
The current traditional data sharing method is irreversible. Once the data is shared, it cannot be recovered and controlled. But Enigma allows fallback and control over the data, since no one but the owner of the data can see the original data. This has brought fundamental changes to the current field of data analysis and subverted data encryption transactions.
3. Private Contract
In the design model of Enigma, the code is executed in two parts. The public part is executed on the blockchain, and the private data is executed off-chain. In order to support decentralized application development, the Enigma team designed a scripting language similar to smart contracts: private contracts. It is Turing complete and can handle private data.
4. Catalyst application
Catalyst is the first application of the Enigma protocol, driven by the financial data market. Catalyst allows users to share and manage data, as well as construct beneficial investment strategies driven by data. It allows developers to build, test and trade crypto assets. Through Catalyst, developers can access Enigma's decentralized data mart to consume valuable encrypted data for investment strategy analysis.
5. Decentralized Data Mart
Enigma has established an open and secure decentralized bazaar that allows individuals, companies and organizations to share and consume data. Tokens are used to manage data subscriptions, rewards and penalties on-chain. The storage and transmission of the data itself is done off-chain.
https://enigma.co/ecosystem/