Secret Network

Introduction

On blockchains, all data is public by default.

Decentralized confidential computing (DeCC) enables use cases like private voting for DAOs, secure random number generation for gaming, encrypted databases for various applications, encrypted data tied to NFTs, sealed-bid auctions, and encrypted order books for DeFi applications. All of this can be built on Cronos by utilizing Secret Networkโ€™s Confidential Computing Layer, as long as these use cases are permitted by your country's laws and regulations.

Integrating Secret's Confidential Computing Layerโ€‹โ€‹

You can integrate Secretโ€™s CCL into an existing Cronos application, or design a new application from the ground up to take advantage of the unique use-cases it enables. To start, check out Secret Networkโ€™s Confidential Computing Layer landing page to get an overview of how it works, and example use-cases for inspiration. From there youโ€™ll find multiple links to Secret's CCL documentation:

  1. Basics - explains the cross-chain communication technologies used, and how to connect a MetaMask wallet to Secret Network.

  2. Use-cases - provides tutorials showing how to build various types of EVM applications using Secretโ€™s CCL. All of these tutorials can be used to deploy a contract on Cronos EVM.

  3. Supported Networks - provides a list of gateway contract addresses. This is how your Cronos EVM application will communicate with Secret.

Get Supportโ€‹

To get CCL development help, you can join the Secret Network Discord or Telegram. You can also get in touch with the Secret Network team directly.

Last updated