Methods and their use cases

Mishti Network is a versatile tool for wallets + identity. Currently, it supports three methods:

  • OPRFSecp256k1, for deriving keys from low-entropy data such as security questions, passwords, or biometrics. It performs a threshold oblivious pseudorandom function (OPRF). It is oblivious to the user's input but can still add entropy to it to help the user derive a secure key which cannot be easily cracked.

  • JWTPRFSecp256k1, for securely deriving keys from web accounts. Numerous solutions exist but have permissioned sets of nodes. Mishti Network's novel contribution is of a novel ZKInjectedMask protocol developed by Holonym Foundation to derive these keys permissionlessly and efficiently.

  • DecryptBabyJubJub, for provable decryption within a SNARK with decentralized decryption rights. From this, a couple important use cases can be built. Private identity verification can be built on this, where custom decryption conditions can be set for compliance events. Undercollaterlized lending could also be built on this, by ensuring somebody's identity is only decrypted if they default on a loan. The protocol doesn't determine who (if anyone) you allow to decrypt it -- this is something controlled by users or developers.

Future updates may add more methods to Mishti network.

Last updated