Skip to main content

Why Need Primus?

image

Why Need Primus?

As our society evolves at an accelerated pace, the increasing reliance on sensitive data necessitates a balanced approach toward safeguarding this valuable asset. Existing systems cannot fully resolve the paradox of privacy protection and utilization of sensitive data, and various computational issues during data processing require further reliable integrity measures.

PADO creates a fortress of computational security through cryptography. Within the boundary of this fortress, any individual or organization can use Primus technologies like MPC-TLS and zkFHE to trust-lessly authenticate sensitive data and further process it with maximum programmability and security.

Essentially, the underlying Primus network supports privacy-preserving computations from multiple blockchains, and Primus developer toolkits provide user-friendly APIs, enabling developers to swiftly integrate diverse types of privacy-centric authentication and computation logic.

Who Should Use Primus?

Primus is a privacy-oriented data computation infrastructure presented specifically for workers, callers, and developers.

Primus encourages individuals or organizations to contribute their idle computing powers to provide the zkFHE computation capability to the network with incentives in return.

Callers can publish zkFHE computation tasks for preferred data confidentiality and computation integrity. They can also require the necessary data inputs from the other participants within this network.

Workers can deploy Primus nodes on different blockchains and perform the computation for callers.

Developers can simply create specialized applications that require complicated private data computation like numeric compare, blind metric, and even privacy-preserving model inference, without worrying about the underlying cryptography. In addition, Primus' innovative MPC-TLS solutions provide efficient and secure methods for integrating user data across multiple Internet platforms, eliminating the need for complex and time-consuming data synchronization processes whilst ensuring compliance with stringent data protection laws.

Beyond the core network participants, Primus's lightweight dApp, PADO extension, empowers users to manage their personal data, safeguarding privacy in all life spheres. Users can access this unique portal for importing, updating or deleting their internet data from various data sources, all while maintaining privacy and sharing benefits.

Core Advantages

Primus network contributes to the community developers and network participants with multiple benefits:

  • Chain-agnostic: Both Primus' data verification and computation capabilities are chain-agnostic, meaning all the dApps on different blockchains can seamlessly interacts with the cryptographic computation without technical barriers.

  • Openness: Primus' MPC-TLS and zkFHE techniques are open to all the developers. In addition, Primus network economically incentivizes developers from different communities like cryptography, distributed systems, DeFi, AI and others to contribute with their technical resources to co-build the trustless and privacy-centric ecosystem.

  • Authenticity: It is essential to ensure that user data originates from a specific source and remains unaltered during the sharing process. With Primus, the underlying cryptographic protocol proves the data origin and integrity for arbitrary web data from Internet.

  • Confidentiality: Primus' key goal is to handle private information appropriately in the whole lifecycle of the data. Specifically, Primus adheres to data minimization principles by using zero-knowledge proofs and fully homomorphic encryption when performing data computations to derive data confidentiality and protect user privacy.

  • Verifiability: The equipped zero-knowledge proofs of FHE computations ensure each operation within the computation task is publicly verifiable for integrity and correctness, which significantly reduces the trust assumption of the outsourced computation paradigm.

  • Performance: The MPC-TLS and zkFHE techniques use advanced cryptography with highly optimized implementation to achieve the practical web data provenance and outsourced computation for various applications.