LogoLogo
  • Welcome
    • About ENI
  • Getting Started
    • Quickstart
      • Account Structure
      • Token Standards
      • Gas
    • Divergence from Ethereum
    • Transactions
      • Creating Transaction
    • Governance
      • Proposals
    • Oracles
  • Build
    • Setup and Installation
    • Smart Contracts
      • EVM (General)
      • EVM (CLI)
      • Querying State
    • Frontend Development
      • Overview
      • How to Deploy Your First dApp
    • Ecosystem
      • Tools and Resources
      • Resources
  • Node
    • Getting Started
    • Node Operators Guide
    • Validator Operations Guide
    • Advanced Configuration & Monitoring
    • Technical Reference
  • Reference
    • Overview
    • enid
    • CLI
      • enid add-genesis-account
      • enid blocktest
      • enid collect-gentxs
      • enid compact
      • enid config
      • enid debug
      • enid export
      • enid gentx
      • enid help
      • enid init
      • enid keys
        • enid keys delete
        • enid keys add
        • enid keys export
        • enid keys import
        • enid keys list
        • enid keys mnemonic
        • enid keys parse
        • enid keys show
      • enid latest_version
      • enid migrate
      • enid prune
      • enid query
        • enid query accesscontrol
        • enid query upgrade
        • enid query account
        • enid query auth
        • enid query bank
        • enid query block
        • enid query authz
        • enid query distribution
        • enid query epoch
        • enid query evidence
        • enid query evm
        • enid query feegrant
        • enid query ibc-transfer
        • enid query gov
        • enid query ibc
        • enid query mint
        • enid query oracle
        • enid query params
        • enid query slashing
        • enid query staking
        • enid query tendermint-validator-set
        • enid query tokenfactory
        • enid query tx
        • enid query txs
      • enid rollback
      • enid start
      • enid status
      • enid tendermint
      • enid tools
      • enid tx
      • enid validate-genesis
      • enid version
Powered by GitBook
On this page
  • Oracle technology evolution and paradigm breakthrough
  • Trust bounds for traditional oracle
  • Matrix of zero-knowledge oracle technologies
  • Core Architecture of ENI Zero-Knowledge Oracles
  • System Layering Model
  • Key Technological Innovations
  • ICore Functions of Zero-Knowledge Oracles
  • Privacy Data Verification
  • Cross-Chain State Proofs
  • IoT Data On-Chain
  • Developer Integration Guide
  • Basic Integration Process
  • Typical Application Scenarios
  • Security Enhancement Mechanisms
  • Five-Layer Protection System
  • Performance Optimization Solutions
  • Proof Generation Acceleration
  • Resource Graded Scheduling
  1. Getting Started

Oracles

Oracle technology evolution and paradigm breakthrough

Trust bounds for traditional oracle

Traditional oracle architectures (such as Chainlink) achieve data trustworthiness through multi-node signature mechanisms but face two core challenges:

  • Data Transparency Paradox: On-chain disclosure of raw data may lead to sensitive information leaks (such as financial trading strategies and corporate operation data).

  • Single-Dimensional Verification: Relies solely on the number of signatures to verify data authenticity, lacking verifiability of the data generation process.

ENI introduces an innovative four-layer trust verification system by incorporating Zero-Knowledge Proofs (ZKP) and cross-chain verification frameworks:

  • Privacy Layer: Uses zk-SNARK for anonymizing input data.

  • Verification Layer: Combines Tendermint BFT consensus with threshold signatures for dual-layer verification.

  • Proof Layer: Utilizes the IBC protocol to achieve compressed zero-knowledge proofs for cross-chain state verification.

  • Incentive Layer: Implements a Proof of Contribution (PoC)-based reputation system for nodes.

Matrix of zero-knowledge oracle technologies

Technical Dimension
Traditional Solution
ENI’s Solution

Data Privacy

Plaintext Transmission

Verifiable Encrypted Data Flow

Verification Efficiency

Multi-round Mutual Verification

Single Effective Proof

MEV Resistance Capability

Transactions Easily Front-Run

Zero-Knowledge Encapsulation of the Entire Process

Cross-Chain Verification

Relies on Third-Party Bridges

Native IBC Proof Verification


Core Architecture of ENI Zero-Knowledge Oracles

System Layering Model

Privacy Data Flow Pipeline: (Data Collection → zk Preprocessing → Multi-Chain Verification → Proof Aggregation → Smart Contract Interface)


Key Technological Innovations

Dual Privacy Protection Mechanism:

  • Input Privacy: Uses the Paillier homomorphic encryption algorithm to enable aggregation of encrypted data.

  • Leverages the Groth16 protocol to generate validity proofs. Verifier nodes only need to validate the proof’s correctness without accessing raw data.


Cross-Chain Verification Network

  • IBC Light Client Verification: Compresses external chain state proofs into zk-SNARK circuits.

  • State Snapshot Signatures: Generates verifiable cross-chain state snapshots every 30 blocks.


MEV-Resistant Design

  • Request Obfuscation Pool: Uses ring signature technology to hide the identity of requestors.

  • Delayed Proof Mechanism: Executes data responses and proof generation asynchronously to mitigate MEV risks.


ICore Functions of Zero-Knowledge Oracles

Privacy Data Verification

  • Compliance Proofs: Enterprises can submit proofs for compliance with carbon emissions standards without revealing exact data.

  • Credit Assessment: Financial institutions can verify user credit scores without accessing full credit records.


Cross-Chain State Proofs

  • Cross-Chain Asset Verification: Verifies asset states on other chains via the IBC channel, generating compressed proofs.

  • Smart Contract Interoperability: Supports cross-chain contract calls under zero-knowledge conditions.


IoT Data On-Chain

  • Encrypted Device Fingerprinting: Processes industrial sensor data through zk circuits to generate unique device fingerprints.

  • End-to-End Verification: Ensures verifiable and confidential data flows from collection to on-chain storage.


Developer Integration Guide

Basic Integration Process

Initialize Oracle Contracts:

interface IZKOracle {
    function request(
        bytes32 circuitID,
        bytes calldata encryptedParams
    ) external returns (uint256 requestId);
}

Build Zero-Knowledge Circuits:

  • Define data verification logic using Circom language.

  • Deploy verification keys to the on-chain registry.


Typical Application Scenarios

Scenario 1: Privacy Financial Contracts

  • Anonymous Lending: Borrowers can prove their asset holdings without exposing details.

  • Dark Pool Trading: Executes large-scale trade orders under zero-knowledge conditions.

Scenario 2: Compliance Data On-Chain

  • Medical Data Sharing: Hospitals can verify that patient test results meet treatment standards without exposing data.

  • Supply Chain Traceability: Suppliers can prove raw material compliance while protecting trade secrets.


Security Enhancement Mechanisms

Five-Layer Protection System

  • Circuit Security Audit: Conducts formal verification of zk circuits.

  • Node Reputation Pruning: Dynamically adjusts validator node weights based on reputation.

  • Anomaly Circuit Breaker: Automatically suspends services if data deviation exceeds a threshold.

  • Proof Retrospective System: Permanently stores all proofs for audit purposes.

  • Quantum Resistance: Adopts STARK-based quantum-resistant algorithms for disaster recovery.


Performance Optimization Solutions

Proof Generation Acceleration

  • GPU Acceleration: Supports CUDA-accelerated zk proof generation.

  • Batch Proofing: Merges multiple requests into a single proof to enhance efficiency.


Resource Graded Scheduling

Implements tiered scheduling for optimal resource utilization.

Service Level
Response Time
Proof Complexity
Applicable Scenarios

Platinum

<1s

Million-gate Circuit

High-Frequency Trading

Gold

3s

Hundred-thousand-gate Circuit

IoT Data

Standard

10s

Ten-thousand-gate Circuit

Regular Commercial Applications


Conclusion

By deeply integrating zero-knowledge proofs with the Cosmos ecosystem, this system establishes the first oracle infrastructure supporting full privacy and cross-chain verification. Developers can retain their familiar EVM development paradigms while benefiting from quantum-safe privacy protection capabilities.

This innovation opens up new frontiers for Web3 applications in finance, healthcare, IoT, and other sensitive domains.

PreviousProposalsNextSetup and Installation

Last updated 2 months ago