Secret Network
search
Ctrlk
WebsiteDiscordGithub
  • πŸ‘‹INTRODUCTION
    • Secret Network Introduction
    • Secret Network Techstackchevron-right
  • πŸ’»Development
    • 🏠Getting Startedchevron-right
    • πŸ€“Secret Contractschevron-right
    • πŸ‘€Secret Contract - Reference, Guides, Exampleschevron-right
    • πŸ–ΌοΈFrontend Developmentchevron-right
    • πŸ“¬Deployment Addresses/ API Endpointschevron-right
  • starfighter-twin-ion-engineSecret AI
    • 🀝Introduction
    • πŸ—οΈArchitecture
    • πŸ‘©β€πŸ’»Secret AI SDKchevron-right
    • πŸͺ™Economics
    • memo-circle-checkSmart Contract Referencechevron-right
  • 🌐SecretVM - Confidential Virtual Machines
    • 🀝Introduction
    • πŸ—οΈArchitecture
    • β˜‘οΈAttestationchevron-right
    • 🏁Launching a SecretVMchevron-right
    • πŸ› οΈManaging SecretVM Lifecyclechevron-right
    • βœ…Verifying a SecretVMchevron-right
    • πŸ‘¨β€πŸ’»SecretVM CLIchevron-right
    • πŸ’‘Best Practices for Developerschevron-right
    • πŸ”Verifiable Message Signing
    • πŸ“–Glossary
  • πŸ”“Confidential Computing Layer
    • πŸ§‘β€πŸš€IBC Developer Toolkitchevron-right
    • 🀝Ethereum (EVM) Developer Toolkitchevron-right
      • Basicschevron-right
      • Usecaseschevron-right
        • Storing Encrypted Data on Secret Networkchevron-right
        • Sealed Bid Auctionchevron-right
        • Confidential Votingchevron-right
        • VRFchevron-right
          • Implementing VRF into any EVM Contract
          • VRF Developer Tutorial
          • Performance figures of SecretVRF vs competitors
          • Using encrypted payloads for VRF
          • Converting from Chainlink VRF to Secret VRF in four steps
        • Confidential Document Sharing
        • Tokenschevron-right
      • Supported Networkschevron-right
    • πŸ™ŒSolana Developer Toolkitchevron-right
  • 🀫Overview, Ecosystem and Technology
    • πŸš€Secret Network Overviewchevron-right
    • 🐸Ecosystem Overviewchevron-right
  • πŸ”§Infrastructure
    • πŸ”“Use SecretCLIchevron-right
    • πŸ”Use Ledger hardware walletchevron-right
    • πŸ› οΈInfrastructure Serviceschevron-right
    • πŸ–₯️Running a node/validatorchevron-right
    • ⛓️IBC Relayerschevron-right
    • πŸ†™Upgrade Instructionschevron-right
    • ☠️Postmortemschevron-right
    • ✍️Contribute to the documentationchevron-right
    • 🌊Versioning & Changelogchevron-right
  • ⏰Cron modulechevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. πŸ”“Confidential Computing Layerchevron-right
  2. 🀝Ethereum (EVM) Developer Toolkitchevron-right
  3. Usecases

VRF

Implementing VRF into any EVM Contractchevron-rightVRF Developer Tutorialchevron-rightPerformance figures of SecretVRF vs competitorschevron-rightUsing encrypted payloads for VRFchevron-rightConverting from Chainlink VRF to Secret VRF in four stepschevron-right
PreviousConfidential Voting Developer Tutorial with SecretPathchevron-leftNextImplementing VRF into any EVM Contractchevron-right

Last updated 1 year ago

Was this helpful?

Was this helpful?