You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+38-51Lines changed: 38 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# Private Data Availability Proxy
1
+
# Private Blockspace Proxy
2
2
3
3
A [Celestia Data Availability (DA)](https://celestia.org) proxy, enabling use of the [canonical JSON RPC](https://node-rpc-docs.celestia.org/) but intercepting and [**_verifiably_** encrypting](./doc/verifiable_encryption.md) sensitive data before submission on the public DA network, and enable decryption on retrieval.
4
4
Non-sensitive calls are unmodified.
@@ -18,24 +18,11 @@ Presently all HTTP requests to the proxy are transparently proxied to an upstrea
18
18
-`blob.Submit` encrypts before proxy submission of a _signed transaction_ to upstream gRPC `app` endpoint.
19
19
-`blob.Get` and `blob.GetAll` proxy result verifies the [Verifiable Encryption](./doc/verifiable_encryption.md) proof, and decrypts before forwarding to the client.
20
20
21
-
## Known Limitations
22
-
23
-
At time of writing, as it should be possible to change these limitations internally:
Importantly, the DB should persist, and the container must have access to connect to the DA light client (likely port 26658) and Succinct network ports (HTTPS over 443).
This document introduces **Verifiable Encryption (VE)** and explores how it enables **Private Data Availability (PDA)** - a transformative new primitive for secure, decentralized systems.
16
+
This document introduces **Verifiable Encryption (VE)** and explores how it enables **Private Blockspace** - a transformative new primitive for accountable, offchain systems.
17
17
18
18
## Verifiable Encryption
19
19
@@ -43,9 +43,9 @@ However, not all data should be exposed to the world.
43
43
Some datasets are **too sensitive** for full transparency.
44
44
The challenge: **How can we ensure critical data is available, yet only selectively disclosed under prearranged conditions**?
45
45
46
-
## The Power of VE + PDA
46
+
## The Power of VE
47
47
48
-
By combining **Verifiable Encryption** with **Private Data Availability**, we unlock a powerful new primitive: **auditable yet private data**.
48
+
By combining **Verifiable Encryption** with **Private Blockspace**, we unlock a powerful new primitive: **auditable yet private data**.
49
49
50
50
With integration into **existing or novel Key Management Systems (KMS)**, VE allows one to define:
51
51
@@ -55,30 +55,30 @@ With integration into **existing or novel Key Management Systems (KMS)**, VE all
55
55
56
56
This means:
57
57
58
-
- Anyone (users, smart contracts, off-chain agents) can verify that encrypted data is available and satisfies certain properties.
58
+
- Anyone (users, smart contracts, offchain agents) can verify that encrypted data is available and satisfies certain properties.
59
59
- Only authorized parties can decrypt and access the sensitive contents.
60
60
61
61
## Use Cases
62
62
63
63
We’ve outlined a few use cases below - but would love to hear your ideas too!
64
-
💡 [Open an issue](https://github.com/celestiaorg/pda-proxy/issues) to share feature requests or novel applications of VE and PDA.
64
+
💡 [Open an issue](https://github.com/celestiaorg/private-blockspace-proxy/issues) to share feature requests or novel applications of Private Blockspace.
65
65
66
66
### _Programmable Privacy for Web3 dApps_
67
67
68
-
VE and PDA align closely with the principles of [local-first access control](https://www.inkandswitch.com/keyhive/notebook/), enabling **secure collaboration** across decentralized applications.
68
+
VE and Private Blockspace align closely with the principles of [local-first access control](https://www.inkandswitch.com/keyhive/notebook/), enabling **secure collaboration** across decentralized applications.
69
69
70
70
In a world where chain data is globally replicated and indexed, **encryption at rest** becomes essential for access control and selective disclosure.
71
71
72
72
#### Example Applications
73
73
74
-
-**PDA as a database** for collaborative dApps with fine-grained access control.
74
+
-**VE'd database** for collaborative dApps with fine-grained access control.
75
75
-**Private rollups** with programmable cryptography, enabling [obfuscated state](https://0xparc.org/blog/programmable-cryptography-1).
76
76
-**Private bridging and escrow** sending verifiably correct but private messages around web2 and/or web3 apps.
77
-
-**Drop-in support** for existing DA users via a [proxy service](../README.md), simplifying migration to PDA.
77
+
-**Drop-in support** for existing DA users via a [proxy service](../README.md), simplifying migration to Private Blockspace.
78
78
79
79
### _Trustless Data Markets_
80
80
81
-
With VE, PDA, and escrow contracts you can construct protocols to build trustless exchange of data access
81
+
With VE, Private Blockspace, and escrow contracts you can construct protocols to build trustless exchange of data access
82
82
See the [Stock0](https://dorahacks.io/buidl/14098) media market hackathon project for some great inspiration!
83
83
84
84
Here is a [diagram inspired by them](https://docs.google.com/presentation/d/1qq1QXSBcThOjaQ2OcEyS8cwNyAHs3SnC76YrBMAYENk) of an example setup of inputs for a market:
@@ -97,7 +97,7 @@ flowchart LR
97
97
> NOTE: Celestia does _not_ guarantee that data will be available forever!
98
98
> See [the docs on retrievability](https://docs.celestia.org/learn/retrievability#data-retrievability-and-pruning-in-celestia-node) for the latest safe assumptions to use.
99
99
100
-
With PDA, sensitive data can be publicly published in encrypted form, with **predefined methods for recovery** - without revealing its contents.
100
+
With Private Blockspace, sensitive data can be publicly published in encrypted form, with **predefined methods for recovery** - without revealing its contents.
101
101
102
102
This unlocks a new class of **verifiable, resilient backups**.
103
103
@@ -115,13 +115,16 @@ The **anchor** acts as a bridge, connecting **any protocol** to a **proof** that
115
115
116
116
## Future Work and Research Directions
117
117
118
-
While VE for PDA is still evolving, the potential is enormous.
118
+
While VE for Private Blockspace is still evolving, the potential is enormous.
119
119
Current implementations have limitations, but these are rapidly being addressed by:
120
120
121
-
- Enabling performance improvements, **confidential compute**, and **scalable parallelization** of PDA workflows.
121
+
- Enabling performance improvements, **confidential compute**, and **scalable parallelization** of Private Blockspace workflows.
122
122
-**Hybrid systems** combining:
123
123
- Trusted Execution Environments (TEEs),
124
124
- Multi-Party Computation (MPC),
125
125
- and Zero-Knowledge Proofs (ZKPs),
126
+
-**Account-centric key management systems** empowering end-users to declare keys to use for VE by operators.
126
127
127
-
For deeper insights, see our ongoing [research discussion here](https://docs.google.com/document/d/1XZyuOxdMm5INcHwQZOZ8ALRk_YkvicNwQHSfOVs8hoM/).
128
+
For more, see:
129
+
-[(Historical) research document](https://docs.google.com/document/d/1XZyuOxdMm5INcHwQZOZ8ALRk_YkvicNwQHSfOVs8hoM/)
130
+
-[Account-centric model for Private Blockspace research discussion](https://forum.celestia.org/t/account-user-centric-private-data-avalibility/2155/)
0 commit comments