Secret Network (Computing)
Introduction
On blockchains, all data is public by default.
Decentralized confidential computing (DeCC) enables use cases like private voting for DAOs, secure random number generation for gaming, encrypted databases for various applications, encrypted data tied to NFTs, sealed-bid auctions, and encrypted order books for DeFi applications. All of this can be built on Cronos by utilizing Secret Networkβs Confidential Computing Layer, as long as these use cases are permitted by your country's laws and regulations.
Integrating Secret's Confidential Computing Layerββ
You can integrate Secretβs CCL into an existing Cronos application, or design a new application from the ground up to take advantage of the unique use-cases it enables. To start, check out Secret Networkβs Confidential Computing Layer landing page to get an overview of how it works, and example use-cases for inspiration. From there youβll find multiple links to Secret's CCL documentation:
Basics - explains the cross-chain communication technologies used, and how to connect a MetaMask wallet to Secret Network.
Use-cases - provides tutorials showing how to build various types of EVM applications using Secretβs CCL. All of these tutorials can be used to deploy a contract on Cronos zkEVM.
Supported Networks - provides a list of gateway contract addresses. This is how your Cronos zkEVM application will communicate with Secret.
Get Supportβ
To get CCL development help, you can join the Secret Network Discord or Telegram. You can also get in touch with the Secret Network team directly.
Last updated