Blue Purple Liquid Blur Gradient Background

ZKP Query

A zero-knowledge proof is a way for one party to demonstrate the truth of a statement to another party without revealing any additional information beyond the statement itself.

Tau allows your dApp to execute query logic against encrypted Tau data and return a result.

Query

{

"action":"zkp-query",

"where":

[

{"field":"room", "value":"Billiards Room","logic":"=="},

{"field":"weapon", "value":"Candle Stick","logic":"=="},

{"field":"suspect", "value":"Miss Scarlett","logic":"=="}

],

"from": "answer",

"select" : "##COUNT## Answers right"

}

Result

{

"game_id": "83fb4cca-46ea-42d6-b3b3-e1374ffe9fb1",

"answer":{

"room":"Billiards Room",

"weapon":"Candle Stick",

"suspect":"Miss Scarlett"

},

"prize_fund":"5USD",

"first_prize":"3USD",

"second_prize":"2USD"

}

The Nine Steps of

Tau ZKP Query

Step

01

JSON storage, Encrypted at rest

Step

02

Write query logic

Step

03

dApp request

Step

04

Oracle request

Step

05

Decryption

Step

06

Read blockchain query

Step

07

Query execution

Step

Return result

Step

09

dApp decision

Find out more at:

www.tauoracle.com

Asset Trading

Designed for freelancers & online auction houses working in the blockchain space, Tau brings you the ability to transfer an unlimited volume of digital product between 2 parties instantly.

You dApp can now transfer digital product securely, the contents remain private, and is never revealed to the blockchain.

Blue Purple Liquid Blur Gradient Background

Decentralized, Immutable Storage

All cloud storage providers suffer from the same weakens, data can be modified by at least 1 person.

Immutable data, stored on the blockchain cannot be tampered with.

Your solution can now leverage Tau storage to guarantee Immutable storage. Combine this with long term storage or permanent storage options, you clients know what once data is stored in Tau, they don’t need to worry about it.

Post quantum

decentralised

SECURITY

Secure, Information, Security, Documents, Files And Folder, Safety Icon

AES-256 Storage

Nearly impervious to brute-force attacks, requiring millions of years with current computing capabilities to crack. Ensuring secure storage on public blockchains.

Application Security Icon

kyber-768

Quantum-resistant key generation approved by the National Institute of Technology (NIST) for asymmetric


Cybersecurity Solutions Icon

encryption vault

The primary storage of the asymmetric key parts. Each users data is uniquely encrypted, so only the owner can read it.

Cyber Security

Omnitechture

Secondary storage of the asymmetric key parts AKA “Local Storage”, can be in phone, wallet, server, cloud to handle any deployment scenario.

Security Private Cloud

chamelion protocol

When breached, users receive a new seed phrase. Upon acceptance, we begin re-encrypting their Encryption Vault, avoiding blockchain rewriting costs and reducing breach exposure.

Omnitechture

Request

Connection

Cryptography

Storage

ao​

Mobile

Desktop

Server

Orbi​t

SDK

API

API

TAU

Encrypted Arweave

The Vision for Tau is to become the infrastructure that unites all technology.

All technology solutions rely on data, whether for storage or interaction.

Tau aims to be the fabric that seamlessly integrates it all.

Follow Us!

Paper Airplane Icon

Registered in Ireland, ​768038, Reg. Name

TAU ORACLE LIMITED