PlatON Tips #12 | Scalable Privacy-Preserving Computing

PlatON Tips #12 | Scalable Privacy-Preserving Computing

PlatON Tips #12 | Scalable Privacy-Preserving Computing

PlatON Tips #12 | Scalable Privacy-Preserving Computing

PlatON Tips #12 | Scalable Privacy-Preserving Computing

Welcome to PlatON Tips-Episode 12

We are going to talk about the Scalable Privacy-Preserving Computing

With the rapid growth of the Internet, the Internet giants represented by FAANG and BAT, by virtue of their technological monopoly status, have collected and stored enormous user data. And with the use of big data and AI, they are enjoying data monopoly and acquiring huge business benefits. Users not only fail to obtain data dividends, but also bear the risk of personal privacy being violated and personal data being abused.

PlatON is committed to building the next generation of Privacy-Preserving Computing and data exchange network. Based on modern cryptography and blockchain technology, PlatON creates a new computing paradigm to maintain privacy of the client’s data without the need to rely on third parties for collaborative computing and verify the integrity of the results.

PlatON: Non-interactive Proof Privacy-Preserving Computation

PlatON uses modern cryptographic algorithms including but not limited Zero-Knowledge Proof (ZKP), Verifiable Computation (VC), Homomorphic Encryption (HE), Secure Multi-Party Computation (MPC), Secret Sharing (SS), etc. to implement non-interactive proof computation scale solution.


The scalability problem of the existing blockchain architecture is mainly due to the tight coupling of consensus and computing. PlatON’s scheme based on verifiable computing uses cryptographic algorithms to weaken their endogenous binding relationship, thereby fundamentally decoupling consensus and computing.

To avoid the trade off in efficiency, people in the industry have increasingly come to an agreement: the proper use of blockchain is for verification only; the computing tasks must be separated from the consensus layer and migrated off-chain, but the untrusted off-chain is new problem. PlatON’s Verifiable Computation (VC) cryptographic algorithm passes trust off-chain. Through verifiable computation, the contract only needs to be processed off-chain once, and all nodes can quickly verify the correctness.On the one hand, it improves the transaction processing performance, and on the other hand, it makes PlatON support complex contracts.


On PlatON, MPC and HE are combined to achieve complete privacy-preserving computing, ensuring the privacy of input data and the computation logic. Compared to trusted computing that relies on the trusted hardware or TEE (such as SGX) provided by a third-party manufacturer for computational integrity, trustless computing on PlatON relies only on falsifiable cryptographic assumptions, and thus during its life, it provides unprecedented private data security without trust boundaries.

Thank you for watching this video, follow me and take you to learn more about PlatON’s tips! See you next one!

Publisher:PlatONWorld-M6,Please indicate the source for forwarding:

Like (0)
PlatONWorld-M6's avatarPlatONWorld-M6Official
Previous February 21, 2022 10:49
Next February 22, 2022 10:35


Leave a Reply

Please Login to Comment