ZKP Query
A zero-knowledge proof is a way for one party to demonstrate the truth of a statement to another party without revealing any additional information beyond the statement itself.
Tau allows your dApp to execute query logic against encrypted Tau data and return a result.
Query
{
"action":"zkp-query",
"where":
[
{"field":"room", "value":"Billiards Room","logic":"=="},
{"field":"weapon", "value":"Candle Stick","logic":"=="},
{"field":"suspect", "value":"Miss Scarlett","logic":"=="}
],
"from": "answer",
"select" : "##COUNT## Answers right"
}
Result
{
"game_id": "83fb4cca-46ea-42d6-b3b3-e1374ffe9fb1",
"answer":{
"room":"Billiards Room",
"weapon":"Candle Stick",
"suspect":"Miss Scarlett"
},
"prize_fund":"5USD",
"first_prize":"3USD",
"second_prize":"2USD"
}
The Nine Steps of
Tau ZKP Query
Step
01
JSON storage, Encrypted at rest
Step
02
Write query logic
Step
03
dApp request
Step
04
Oracle request
Step
05
Decryption
Step
06
Read blockchain query
Step
07
Query execution
Step
08
Return result
Step
09
dApp decision
Find out more at:
www.tauoracle.com
Asset Trading
Designed for freelancers & online auction houses working in the blockchain space, Tau brings you the ability to transfer an unlimited volume of digital product between 2 parties instantly.
You dApp can now transfer digital product securely, the contents remain private, and is never revealed to the blockchain.
Decentralized, Immutable Storage
All cloud storage providers suffer from the same weakens, data can be modified by at least 1 person.
Immutable data, stored on the blockchain cannot be tampered with.
Your solution can now leverage Tau storage to guarantee Immutable storage. Combine this with long term storage or permanent storage options, you clients know what once data is stored in Tau, they don’t need to worry about it.
Post quantum
decentralised
SECURITY
AES-256 Storage
Nearly impervious to brute-force attacks, requiring millions of years with current computing capabilities to crack. Ensuring secure storage on public blockchains.
kyber-768
Quantum-resistant key generation approved by the National Institute of Technology (NIST) for asymmetric
encryption vault
The primary storage of the asymmetric key parts. Each users data is uniquely encrypted, so only the owner can read it.
Omnitechture
Secondary storage of the asymmetric key parts AKA “Local Storage”, can be in phone, wallet, server, cloud to handle any deployment scenario.
chamelion protocol
When breached, users receive a new seed phrase. Upon acceptance, we begin re-encrypting their Encryption Vault, avoiding blockchain rewriting costs and reducing breach exposure.
Omnitechture
Request
Connection
Cryptography
Storage
ao
Mobile
Desktop
Server
Orbit
SDK
API
API
TAU
Encrypted Arweave
The Vision for Tau is to become the infrastructure that unites all technology.
All technology solutions rely on data, whether for storage or interaction.
Tau aims to be the fabric that seamlessly integrates it all.
Follow Us!
Registered in Ireland, 768038, Reg. Name
TAU ORACLE LIMITED