Storing Encrypted Data on Secret Network
Solana developers can now use SecretPath to pass encrypted messages from Solana applications to a Secret Network smart contract. With this capability, Solana developers can build privacy-centric applications, such as:
Private DeFi protocols: Allow users to interact with decentralized finance applications while keeping transaction details private.
Confidential NFTs: Create NFTs where ownership or content can be privately verified and shared.
Encrypted messaging apps: Build decentralized applications where users can exchange encrypted messages, ensuring confidentiality.
Secure Voting Systems: Implement voting mechanisms where individual votes remain private but outcomes are publicly verifiable.
By integrating Solana with Secret Network via SecretPath, developers can bring enhanced privacy features to decentralized applications, improving security and user trust.
SecretPath seamlessly handles encrypted payloads, as the master gateway contract on Secret Network automatically decrypts payloads and passes the decrypted payload over to the target contract deployed on Secret Network.
If this sounds confusing, fret now, we will walk you through each step in subsequent Solana developer tutorials π
The encryption of the payload is done using the ChaCha20-Poly1305, an authenticated encryption with additional data (AEAD) algorithm.
The key for this symmetric encryption is created by using the Elliptic-curve Diffie-Hellman (ECDH) scheme, comprising of two components:
An extra encryption public key provided from the Secret Gateway Contract
A randomly created (ephemeral) encryption private key on the user side (independent of the user wallet's private key)
Combining both of these keys together via the ECDH Scheme yields our encryption key, which we use to encrypt the payload with ChaCha20-Poly1305.
Let's learn how to use SecretPath on Solana in the key-value store developer tutorial π.
Last updated