Privacy-Preserving
In the process of decentralized verification, DID-account relationships might inevitably be exposed to the validators. We believe that there should be a balance between privacy and convenience. Under the premise of providing functional and decentralized service, we will apply confidential computing methods (such as TEE implementation and zero-knowledge proof) and to ID obfuscation technology the protocol. The ID obfuscation technology hides the ID of the credential owner or ID of the service demander. The validators won’t know the true owner of the DID data or where the data is going so that they lose malicious motives to send advertisements or fraud.
Last updated