Edenchain is the name of the programmable economy platform for being a blockchain network. It will provide ICO platform for the start-ups to launch their own ICO across all the sectors. It enables the system with IoT, B2B services, P2P Finance, shared economy and so on.
Edenchain supports the Solidity which is the most popular form of smart contract language. It is mostly used for sensitive services like payment and settlement, stability and reliability for the smart contract programming languages and it becomes important for the programming language and can be easy for the developers as written.
E-Protocol
The protocol of Edenchain is used for communication among E-Oracle severs in an E-Oracle pool. The server of E-Oracle is required for interaction with one another in order to access external data reaching in a consensus collection of data. The server of E-Oracle cannot manipulate data by the temperament for programming running through the SGX enclave through the possibility so that the hackers cannot sneak around the network pockets and it needs to be prevented.
The system also facilitates the communication process using the threshold for cryptography by the encryption of data. The cryptography threshold is the process for the encryption protocol and it enables people in a group to compose to share special values protecting data within the threshold cryptography protocol to cooperate the property as per data necessity of decryption and encryption while data retrieved from individuals for the participants are present.
Threshold Cryptography Characteristics
The E-Protocol is applied in terms of processing and importing data requests by the smart contract session for an external E-Oracle client and it can select the values to return the E-Oracle client. It contacts the characteristics of threshold cryptography which are:
The trusted third party might not require this depending on the used algorithm
Participants can be smaller than K and it cannot decrypt messages
The attackers may not use the acquired information determining the signatures from future messages
The signatures can be created by the participants should not have the creation or mi the signatures.
Another threshold method is trusted for the third party to leak information while setting up the secret sharing improving the safety with the solution of the existing problems in threshold cryptography. One popular method can be ECC-TC as it divides the encryption messages in key generation, encryption and decryption stages.
External Threats
E-protocol messages may have some threats from the external attacker with the access in it by the information obtained for the public key and random number. This information will obtain normal ECC so the attacker cannot obtain even if the external attacker has the access in the message and has the knowledge regarding the E-Oracle server.
This will be used as ECC-TC so that the attackers to obtain the public key and random which will be impossible to decrypt the message or identify the signature.
There might be attacks from malicious participants and it can be impossible to attempt the modules or decrypt the messages within the nodes to participate in an E-Oracle session and the efforts might have some effect since it can decrypt the message in ECC-TC. It is important to know the secret keys of the nodes while participating in ECC-TC. It is impossible to decrypt the message for one individual secret key.
E-Protocol in Edenchain used these methods and restructures the encrypted messages based an E-Oracle.
Website : http://edenchain.io/
Whitepaper : https://drive.google.com/file/d/1qUUUm8mNuL-7f5yYsNza1gqcZE6PoDhN/view
Telegram : https://t.me/edenchainio
Twitter : https://twitter.com/edenchainio
Congratulations @gadzilomemm! You have completed the following achievement on Steemit and have been rewarded with new badge(s) :
You got your First payout
Click on the badge to view your Board of Honor.
If you no longer want to receive notifications, reply to this comment with the word
STOP
To support your work, I also upvoted your post!