Secret Network (Computing)

Introduction

On blockchains, all data is public by default.

Decentralized confidential computing (DeCC) enables use cases like private voting for DAOs, secure random number generation for gaming, encrypted databases for various applications, encrypted data tied to NFTs, sealed-bid auctions, and encrypted order books for DeFi applications. All of this can be built on Cronos by utilizing Secret Network’s Confidential Computing Layer, as long as these use cases are permitted by your country's laws and regulations.

Integrating Secret's Confidential Computing Layer​​

You can integrate Secret’s CCL into an existing Cronos application, or design a new application from the ground up to take advantage of the unique use-cases it enables. To start, check out Secret Network’s Confidential Computing Layer landing page to get an overview of how it works, and example use-cases for inspiration. From there you’ll find multiple links to Secret's CCL documentation:

  1. Basics - explains the cross-chain communication technologies used, and how to connect a MetaMask wallet to Secret Network.

  2. Use-cases - provides tutorials showing how to build various types of EVM applications using Secret’s CCL. All of these tutorials can be used to deploy a contract on Cronos zkEVM.

  3. Supported Networks - provides a list of gateway contract addresses. This is how your Cronos zkEVM application will communicate with Secret.

Get Support​

To get CCL development help, you can join the Secret Network Discord or Telegram. You can also get in touch with the Secret Network team directly.

Last updated