Encrypted Trading
- Encrypted Orders:
- An application can integrate Fairblock to encrypt limit and stop loss orders. Encrypting orders prevents traders’ strategies from being picked off by competitors and removes the need for liquidity to sit idly in an order book before a match is made.
- NFT marketplace with leaderless NFT auctions
- Auction off a Rare NFT on Arbitrum without the risk of last-look attacks from auction leaders. In a leaderless auction, all votes are encrypted and bound to be submitted before a the expiry of a synchronous clock.
- In addition to the surprise and unpredictability factor, leaderless auctions solve fundamental risks such as block proposer’s last look problem, censorship based on contents of bids, and game theoretically offers better value to bidders.
- Pre-execution encrypted lending and borrowing
- DeFi strategies should not be leaked to counterparties before they are executed. If alpha is identified, we can preserve a user's actions until execution with pre-execution encryption. We propose building a borrowing and lending protocol with pre-execution encryption enabled to protect user strategies from competitors.
- Frontrunning Resistant Monitoring
- Incident response protocol that leverages hidden security intents to contain and mitigate exploits. These protocols generally rely on smart contract calls triggered by onchain events for damage control. These smart contract calls can be exploited by bots observing trap contracts. Encrypting the incident response before execution can protect them against frontrunning.
- Parimutuel betting:
- Encrypted live events betting. Users can deposit funds into a Yes or No pool. The winner is paid using the deposits of the loser pool. The amounts in the Yes and No pools are kept hidden until the result is finalized. The total amount of deposits are known, just not the specifics in each direction.
- To discourage the users from waiting until the market is almost resolved, can payout in a non-linear way. For example, have the payout factor be higher the earlier you deposit into the pool.
- Post-execution auditable transfers:
- In a threshold network, compliance and accountability are enforced without relying on central authorities. The system is based on independent entities such as Revokers and Guardians. Malicious behavior can lead to selective de-anonymization, but only under lawful conditions, ensuring integrity without compromising user privacy unjustly. Accountable De-Anonymization ensures that de-anonymization requests are public and traceable, requiring cooperation between Revokers and Guardians, thus preventing unauthorized disclosure.
- Encrypted Launchpads
Gated-Access Applications: AI, Subscription, DIDs, Legal
- ID-Locked Content in Subscription Application
- Content creators need their permissioned content to live onchain without giving non-paying customers access.
- Or, it’s a dapp that only let’s you sign in if you’re a paying customer. Images live on the dapp and aren’t minted as NFTs.
- Encrypted DID Access: only DIDs with designated IDs are able to decrypt certain data like p2p payments (Private Venmo)
- A payments rollup that uses HE to give only Alice and Bob access to their related payment data, built with an accumulator (breaks the onchain payment graph between Alice and Bob), but they’re able to see their data with a wallet sign-in.
- AI Models with ID-gated Access
- AI protocol where models are gated to only people with certain IDs - IDs could be proof of payment, employees of companies or groups of people with onchain credentials (attestations or soul-bound tokens, for example).
- Encrypted Will or Legal Documents:
- An application where users can write wills that will be decrypted under programmable conditions, such as a multi-sig signing, a wallet goes inactive for a year, or you’re reported dead by some committee of oracles based on news).
Games
- Highest-hand-wins multiparty betting games: Blackjack & Poker
- Encrypted games built with IBE can program certain elements of them game to decrypt at designated times or under certain conditions. This conditional decryption can power games where some sort of secrecy is involved, such as Blackjack or poker.
- A simple encrypted blackjack game can be designed where the dealer’s second card is encrypted until all players in the game finalize their hands. Once all players’ hands are final, the dealers second card is decrypted.
- Poker games can be built using the end of a round (or after the final card is dealt and the players have stopped raising) as the condition to decrypt and reveal the hands of all remaining players in a round.
- BS - Card Game:
- BS is a card game where a deck of cards is split between all participants. Players bluff (1) how many and (2) what type of cards you’re putting down in a pile (face down) until a player has no cards left. Users are incentivized to lie about the quantity and type of cards they’re putting down. If someone calls correctly calls a player’s bluff, they have to pick up the whole deck of trashed cards put down before them. If a player incorrectly calls a bluff, they have to pick up the deck. The game is a race to hold no cards. Decryption would happen under the condition that one player calls a bluff on another, which would trigger the revealing of the hand.
- Trivia:
- In encrypted trivia, a question is asked. People submit their encrypted answers. When a block height is reached, all answers, as well as the final answer, will get decrypted.
- Jeopardy:
- In encrypted trivia, a question is posed to the group with the answer encrypted and invisible from the players. People race to answer the question. The final answer only gets revealed if someone answers correctly or if no one answers correctly after the allotted time.
- Diplomacy
- Diplomacy can be brought onchain with encryption in the ordering and resolution phases of the game. Orders made by each player are encrypted and then revealed simultaneously and resolved. For an overview of how this game works, check out the instructions.
- Craps
- Craps is a popular dice game where players wager on the final results of a dice roll. For this game to be possible onchain, a dice result would need to be randomly generated, but also protected from being revealed prematurely. In onchain craps, a dice roll would be randomly generated (using Fairblock’s randomness) and encrypted. A synchronous clock would reach an expiry point, at which time bettors can no longer bet on the outcome of the dice roll. The expiry point is also the decryption trigger for the game. The results are then decrypted and revealed to the players, which trigger the pool to be distributed among the winner/s.