Technology Comparison: Keep Network vs Enigma

Privacy layer for the Ethereum

Ben Longstaff
coinremix

--

Blockchain can be trusted for correctness, but not for privacy.

“Today, sharing data is an irreversible process; once it is sent, there is no way to take it back or limit how it is used. Allowing access to data for secure computations is reversible and controllable, since no one but the original data owner(s) ever see the raw data.” — Enigma whitepaper

There are five approaches to using private data with blockchain technology:

  • off-chain secure Multi Party Computation (sMPC)
  • private blockchains
  • zero knowledge proofs
  • proxy re-encryption
  • hash reveal

Keep Network and Enigma both use sMPC.

Keep Network vs Enigma

Both projects make use of secure multi party computation to allow private data to be used on public blockchains. Enigma and Keep Network will both make use of master nodes for mining.

Smart Contracts

--

--

Ben Longstaff
coinremix

Playing at the intersection of privacy and personalisation. Fascinated by the state of trust in a world with leaky data.