Unleashing the power of vetKeys — first public demo and developer bounties

vetKeys are underway to enable privacy-preserving applications on the Internet Computer. DFINITY unveils the first demo and offers bounties to the developer community to test it out.

DFINITY
The Internet Computer Review
4 min readJul 17, 2023

--

Written by Aisling Connolly

Cryptographic advancements continue to reshape the landscape of blockchain technology, pushing the boundaries of security and privacy. With the release of the first public demo of vetKeys, developers get a glimpse of how this technology preview could be used to leverage privacy-preserving technologies in building applications with enhanced data protection. vetKeys offers powerful capabilities such as identity-based encryption, end-to-end encryption, simplified key management, and more.

This blog post highlights the exciting milestones of the first public demo and an updated version of the Encrypted Notes dapp integrated with vetKeys.

The Power of vetKeys

vetKeys transforms key management and data privacy within decentralized applications. This empowers developers to easily add end-to-end encryption capabilities to an application, ensuring that sensitive data remains protected within the blockchain ecosystem. By leveraging onchain encryption and verifiably encrypted threshold key derivation, vetKeys ensures confidentiality and security, even in a decentralized environment.

Furthermore, vetKeys allows for threshold decryption, distributing decryption capabilities across multiple participants (nodes in a subnet) to enhance security and prevent single points of failure. This innovative approach guarantees that no single entity holds the complete decryption key, mitigating the risk of unauthorized access.

Simplified key management is another notable feature of vetKeys. By abstracting the complexities of cryptographic key management, vetKeys simplifies the process for developers. Cryptographic keys can be derived on demand, reducing the burden of securely handling and managing cryptographic keys within blockchain applications.

vetKeys primer
vetKeys paper

Exciting Milestones

The first public demo of vetKeys marks a significant milestone, showcasing the power and simplicity of end-to-end encryption. Developers can explore firsthand how vetKeys enhances data privacy and confidentiality within decentralized applications. This demo provides a hands-on experience, offering valuable insights into the capabilities and potential applications of vetKeys.

Additionally, an updated version of the Encrypted Notes dapp, integrated with vetKeys, is unveiled. This enhancement addresses the challenge of key management across multiple devices. By simplifying key management complexity, developers can significantly alleviate the burden associated with building privacy-focused applications. This, in turn, paves the way for the widespread adoption of privacy preserving dapps.

Opportunities for developers

A canister mocking the proposed system API for vetKeys is now available for developers to explore, providing valuable insights into the capabilities and potential applications of this new cryptographic tool. It serves as a starting point for developers interested in integrating vetKeys into their projects.

Note: the proposed version of this system API is for demonstration purposes only and must not be used in production.

To further drive innovation and collaboration, developers are invited to participate in a bounty contest, to provide feedback on the proposed API, and begin building the first vetKey applications on the Internet Computer.

The bounties specifically are tailored to the following use cases:

  • Identity-Based Encryption (IBE) Bounty: One example could be to develop a secure messaging or data sharing application that leverages vetKeys and identity-based encryption to simplify key management and enhance user experience.
  • Group Encryption Bounty: An example could be to create a decentralized collaboration platform that utilizes vetKeys to ensure secure and efficient sharing of sensitive information among authorized participants.
  • Timelock Encryption Bounty: An example could be to design a time-based access control mechanism or a private auction solution that leverages vetKeys, providing enhanced data security and controlled data release.
  • Open/Blue Skies Field Bounty: We encourage developers to think beyond the defined use cases and propose innovative applications of vetKeys. This open-ended bounty invites creative solutions that push the boundaries of privacy technologies within the blockchain ecosystem.

Bounties Description
Bounties Discussion

Join the vetKeys community

We invite developers and cryptography enthusiasts to explore the vetKeys public demo, delve into the potential applications, and participate in the development of these transformative use cases. By engaging with the vetKeys community, sharing ideas, and contributing expertise, you can help shape the future of cryptographic innovation within the blockchain space.

To access the public demo, learn more about the bounties, and become part of the vetKeys community, the best place to find us is on the forum. Join the discussions, collaborate with like-minded individuals, and together, let’s unlock the full potential of vetKeys.

Forum discussion

Conclusion

The release of the first public demo and the integration of vetKeys into the Encrypted Notes dapp mark significant milestones in the advancement of privacy-preserving applications on the Internet Computer. vetKeys empowers developers with powerful cryptographic capabilities, simplifies key management, and enhances data privacy within the blockchain ecosystem. All developers are welcome to engage with the vetKeys community, participate in the bounty contest, and contribute to the evolution of privacy-preserving applications powered by vetKeys.

Together, let’s shape a more secure and privacy-conscious future for blockchain technology.

--

--

DFINITY
The Internet Computer Review

The Internet Computer is a revolutionary blockchain that hosts unlimited data and computation on-chain. Build scalable Web3 dapps, DeFi, games, and more.