PLATO TALK #3 — Wonderful discussion sharing
TOPIC: Privacy-Preserving Computation Application Scenario Sharing
“Share what you think is a viable implementation scenario and solution based on Privacy-Preserving Computation technology”
cherima
I think privacy computing can be applied to Defi first. As we all know, transactions on blockchain can be queried, which means that once someone knows your address, they can access a lot of information about you, which will bring great security risks to users. Let's say you participate in an airdrop, and for that you need to provide an Ethereum address. In order to avoid confusion with the usual used addresses, you choose to create a new address, so that no one really knows how your account relates to another account. However, after you receive the airdrop and want to sell the tokens, you transfer tokens to an addres offered by CEX which you usually use. This may seem innocuous, but it actually reveals personal information. First of all, you should also have charged CEX with other addresses. It is easy to check the other addresses you have charged to this address on the browser, so others can know the information of other accounts you are using, and even check all your transaction records. There may be some accounts that are linked to your real identity, and all of your information is exposed, which is pretty scary when you think about it. After using privacy computing, we can realize the privacy transaction function, so that the actual transaction data and transaction execution process are not visible to the outside, so that no one can check the transaction data you send, and even can not know who is the recipient of the transaction, so as to protect the privacy of the participants of the transaction.
I know that ZCASH has implemented private transactions, but it does not provide universal privacy computing. PHALA and OASIS, based on TEE technology, can provide a common privacy computing infrastructure, and it is easy to realize privacy transactions based on such infrastructure. Phala made a private transaction demo in 2020, which was implemented by creating a privacy computing contract, which was executed in TEE. The data passed in by the user when invoking the privacy contract was encrypted, so that the outside could not know the specific data.
I've seen PlatON's documentation on privacy computing, but haven't studied it much. Some time ago, I participated in a test activity of private computing network, but I didn't have a strong sense of participation, because I didn't quite understand how to use this product. The computing network does not support writing what I want, it is probably not the same thing as the privacy contract mentioned in documentation.
PlatON Privacy Transaction/Token github.com/AlayaNetwork/Alaya-Go/tree/featu..
github.com/PlatONnetwork/confidential-trans..
nihat
An application can be made to transmit the data related to covid19 disease of the people in the community [follow-up of vaccinated, unvaccinated] from health institutions to the ministry of health, store it here, change it, distribute it to other institutions that want to access this data.
Process:
- The information of people from health institutions about covid19 is transferred to the data warehouse created by the Ministry of Health via the PlatON Network.
The technology that ensures security in the data warehouse and its storage and access permissions are defined. People who are not at risk of covid19 are determined. People who are not at risk of disease generate their own data matrix with the mobile application
This QR code can be used in public institutions, shopping malls, airports, etc. used in places. People who are not at risk of illness and quarantine are allowed to enter the building by scanning the QR code at the building entrances.
- The approved data matrix of the persons diagnosed with the disease is canceled from the system and quarantine control is ensured.
Chopper
First, work out the security and availability of data: a large number of valid data, such as hospital records, are dormant and cannot be used in a safe and wide range, which fails to give play to the real value of data. Zero-knowledge proof technology allows verifiers to verify the source of data without infringing on privacy (without exposing data), and to guarantee ciphertext data with integrity, robustness and zero-knowledge characteristics, i.e. guarantee the security and availability of data.
We also need to solve the data safety to be Shared: Re-encryption agent (the encrypted data in the case of security through the client's encrypted, that can share to recipient which can decrypt data), identity based encryption (identity) of the specified receiver and attribute-based encryption (property) of the specified data receiver technology for safety to achieve data sharing.Let the data under the premise of security, play its maximum value.
Sharing such as electronic medical records, if there is a case electronic network sharing platform, the patient as a data provider, with electronic medical records and encryption key, the patient's medical record will be encrypted and stored in a decentralized network, and determines who has permissions to access the data, at the same time the data owner can give security access authorization to a third party, such as hospitals and insurance companies.
most hospital data is independent, lying in their own hospital database. In fact, the utilization rate is not high, data can only be used to generate value. If these data can be integrated into a shared platform to provide samples and references for scientific research and case studies, share medical research results and reduce repeated input of resources, the utilization rate of data can be improved.
susu123
Cases are an excellent application scenario, which can better help medical staff make an overall assessment of patients, track the recovery of discharged patients, and review them regularly! And it can be transferred between different hospitals and departments, reducing unnecessary inspection procedures! marvelous!
The current global medical system is actually independent of each other. Each hospital has its own patient database, but it is independent of each other. Each hospital is an independent center. Cumbersome and repetitive medical examinations result in a waste of resources, and patients will also spend more examination fees. If the network technology of blockchain is used to allow patients to have their own case data, and to authorize different hospitals to control their own health data, it can protect their privacy and prevent their data from being sold by centralized hospitals. To other hospitals, it can save the cost of repeated inspections. This is a real decentralization and a great initiative.
According to their own needs, patients decide to show a certain part of the data, but not all the data.
Akira
Encryption of mobile device data, internal data of financial institutions and medical information data can all be regarded as application scenarios for privacy computing.