The objective of PRIViLEDGE is to develop cryptographic protocols enabling privacy, anonymity, and efficient decentralised consensus for distributed ledgers and blockchains.
Objective A: To provide efficient privacy-enhancing cryptography (PEC) for enabling the execution of smart contracts on blockchains such that the privacy of users and the privacy of data is respected.
Objective B: To develop and demonstrate cryptographic tools that aim at anonymity, transparency, and security and maintain a balance between these goals, for practical deployments of DLT and blockchains.
Objective C: To construct efficient cryptographic blockchain consensus protocols that rely on advances in cryptography, satisfying the contradicting demands of verifiability, transparency, and stake-based governance.
Objective D: To provide effective exploitation of the PRIViLEDGE cryptography in real operational environments, for enabling privacy in distributed ledgers.
WP2 Privacy-Enhancing Cryptography will define a suite of advanced privacy-preserving cryptographic primitives that are useful in cryptographic protocols and in particular in the protocols required by the use cases of the project. Furthermore, WP2 will define the privacy-enhancing cryptographic notions that are needed for WP3 and the implementation of the use cases.
WP3 Cryptographic Protocols will define a set of core protocols for building distributed ledgers. The protocols will use the cryptographic primitives defined in WP2, and must be able to support the requirements of the use cases defined in WP1.
- Ledger protocols: Consensus mechanisms, including mechanisms for generalised consensus, such as stake-based and flexible quorums. They will also cover ledger updates and authentication within the ledger infrastructure.
- Secure multiparty computation: Setting up a secure multiparty computation; support verifiable inputs for secure multiparty computations; running a secure multiparty computation inside the ledger; secure multiparty computations that hide the function being evaluated.
- Post-quantum cryptographic protocols: PRIViLEDGE will not ignore the implications of quantum computing and will investigate the use of post-quantum secure cryptographic protocols for specific operations.
- A Generic Architecture which will dictate how privacy-preserving cryptographic protocols and cryptographic ledger technologies can be integrated and applied together in different contexts.
- Toolkits that will implement the specific technologies needed by the use cases, as identified by WP1. Such toolkits will include:
- An implementation of cryptographic protocols for anonymous authentication within a distributed ledger system.
- A toolkit for flexible consensus protocols.
- A toolkit implementing post-quantum secure protocols for distributed ledgers.
- A toolkit for zero-knowledge proofs for ledgers.
- A toolkit for ledger-oriented secure two/multi-party computation.
- A toolkit for privacy-preserving applications on top of ledger technology, in particular storing data on ledgers in a privacy-preserving way.