From Ethereum to Enigma: Understanding Privacy Protocols in the Blockchain

Jesus Rodriguez
Jul 12, 2018 · 5 min read
Image for post
Image for post

In a recent article this week, I discussed Oasis Labs’ Ekiden protocol as one of the technologies focused on enabling privacy-first blockchain technologies. Based on some of the feedback, I realize that many people have the wrong assumptions about the challenges and opportunities of privacy protocols in the blockchain ecosystem. In that context, today I would like to quickly explore some of the most recent technologies and ideas that are trying to enable privacy preserving computations as a first-class citizen of blockchain technologies.

Security vs. Privacy?

The Privacy Triangle

The challenge with enabling privacy protocols in blockchains has little to do with security itself. Today, we have plenty of cryptographic technologies such as multi-party signatures, some flavors of homomorphic encryption or trusted execution environments that have proven to be able to deliver high levels of privacy and confidentiality in datasets. The main challenge, however, comes from the fact that privacy is often at odds with two other important capabilities of blockchain applications: scalability and usability.

Borrowing some of the ideas from the famous CAP Theorem that was so relevant to unleash the big data space, we can visualize privacy-scalability and usability as the axis of a triangle of conflicting forces. Differently from the CAP Theorem, recent technologies such as Enigma or Oasis Labs seem to have proven that you can enable the three capabilities to a certain degree. However, in most blockchain technologies, any two of those capabilities conflict with the third one. For instance, you can build privacy and usable protocols that are hardly scalable or, as with most cryptocurrencies, scalable and usable protocols that are not private.

Image for post
Image for post

Privacy Protocols in the Blockchain

Image for post
Image for post

· CryptoNote & Ring Signatures: One of the grandfathers of blockchain privacy, CryptoNote(CryptoNight) is the protocol behind Monero. Conceptually, CryptoNote leverages a cryptographic technique known as traceable ring signatures to obfuscate messages among a group of nodes in a decentralized network. Improvements in the CryptoNote protocol have proven able to produce high degrees of anonymity while operating at scalable levels.

· zk-SNARKS: The protocol behind ZCash, zk-Snarks is a novel form of zero-knowledge cryptography that allows one party (the prover) to prove to another (the verifier) that a statement is true, without revealing any information beyond the validity of the statement itself. Since the launch of ZCash, zk-Snarks have been adapted on different blockchain technologies such as J.P Morgan Quorum

· zk-STARKS: Following our triangle thesis, one of the challenges of zk-Snarks is that is hard to be applied at scale as the complexity of the proofs scale linearly with the size of the database. Earlier this year, professor Eli-Ben Sasson from the Technion-Israel Institute of Technology published a highly-anticipated paper that describes a faster alternative to zk-Snarks which (to keep things confusing) he decided to call zk-Starks. From the paper professor Ben Sasson explains that “zk-SNARKs use public key (asymmetric) cryptography to establish security. zk-STARKs instead requires a leaner symmetric cryptography, namely, collision resistant hash functions, and thus removes the need for a trusted setup. These same techniques also eliminate the number-theoretic assumptions of zk-SNARKs (and BulletProofs) that are computationally expensive and prone to attack by quantum computers. This makes zk-STARKs both faster to generate and post-quantum secure.”

· TEE: Trusted Execution Environments(TEE) have emerged as a popular way to offload confidential computations in blockchain technologies. TEE technologies such as Intel’s Software Guard Extensions (SGX) isolated code execution, remote attestation, secure provisioning, secure storage of data and trusted paths for execution of code. Applications that run in TEEs are securely protected and almost impossible to be accessed by third parties.

· Enigma: Developed by cryptographers at MIT, Enigma is a blockchain protocol that enables the implementation of “secret contracts”. The protocol essentially allows nodes to compute using encrypted fragments of the smart contracts without having to decrypt them, which other blockchains cannot do. Instead of relying proof of possession protocols such as zkSNARS/zk-STARKS, Enigma uses TEEs to isolate cryptographic computations from the rest of the blockchain. I discussed Enigma in a recent essay

· Oasis Labs: A recent addition to blockchain privacy race, Oasis Labs’ Ekiden protocol focuses on enabling high performant, confidential computations in blockchain smart contracts. Ekiden also relies on TEE environments to isolated private computations but leverage blockchain networks for scalability. I reviewed Oasis Labs in a recent article.

As you can see, there are plenty of new and creative ideas to enable privacy in blockchain technologies. In the near future, we should expect privacy-first blockchain such as Oasis Labs and Enigma to become more popular while mainstream platforms like Ethereum adopt some form of privacy protocols. It should be interesting….

HackerNoon.com

#BlackLivesMatter

Sign up for Get Better Tech Emails via HackerNoon.com

By HackerNoon.com

how hackers start their afternoons. the real shit is on hackernoon.com. Take a look

By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.

Check your inbox
Medium sent you an email at to complete your subscription.

Jesus Rodriguez

Written by

CEO of IntoTheBlock, Chief Scientist at Invector Labs, Guest lecturer at Columbia University, Angel Investor, Author, Speaker.

HackerNoon.com

Elijah McClain, George Floyd, Eric Garner, Breonna Taylor, Ahmaud Arbery, Michael Brown, Oscar Grant, Atatiana Jefferson, Tamir Rice, Bettie Jones, Botham Jean

Jesus Rodriguez

Written by

CEO of IntoTheBlock, Chief Scientist at Invector Labs, Guest lecturer at Columbia University, Angel Investor, Author, Speaker.

HackerNoon.com

Elijah McClain, George Floyd, Eric Garner, Breonna Taylor, Ahmaud Arbery, Michael Brown, Oscar Grant, Atatiana Jefferson, Tamir Rice, Bettie Jones, Botham Jean

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store