Human Network
  • ☀️Welcome to Human Network
  • Overview
    • What is Human Network? What are Human Keys?
    • Methods and their use cases
      • Deriving keys from low-entropy data
      • Deriving keys from web accounts
      • Provably encrypting to Human Network, and setting custom decryption conditions.
    • FAQ
  • For Operators
    • Register and Run a Human Node
      • Use Keystore for private key encryption
      • Keyshare backup
    • Diagnostics using the Network UI
  • Decentralization
    • Architecture
      • Preventing Collusion
      • Scalability
      • Credit System
    • Mainnets and Testnets
  • Usage Instructions
    • Human Network Credits
    • Making Requests to Human Network
      • OPRF To Derive Keys From Low-Entropy Data
      • PRF to Derive Keys from JWTs
      • Decryption of Provably Encrypted Data
    • Sponsor Requests
Powered by GitBook
On this page
  1. Overview

Methods and their use cases

Human Network is a versatile tool for wallets + identity. Currently, it supports three methods:

  • OPRFSecp256k1, for deriving keys from low-entropy data such as security questions, passwords, or biometrics. It performs a threshold oblivious pseudorandom function (OPRF). It is oblivious to the user's input but can still add entropy to it to help the user derive a secure key which cannot be easily cracked.

  • JWTPRFSecp256k1, for securely deriving keys from web accounts. Numerous solutions exist but have permissioned sets of nodes.Human Network's novel contribution is of a novel ZKInjectedMask protocol developed by Holonym Foundation to derive these keys permissionlessly and efficiently.

  • DecryptBabyJubJub, for provable decryption within a SNARK with decentralized decryption rights. From this, a couple important use cases can be built. Private identity verification can be built on this, where custom decryption conditions can be set for compliance events. Undercollaterlized lending could also be built on this, by ensuring somebody's identity is only decrypted if they default on a loan. The protocol doesn't determine who (if anyone) you allow to decrypt it -- this is something controlled by users or developers.

Future updates may add more methods to Human Network.

PreviousWhat is Human Network? What are Human Keys?NextDeriving keys from low-entropy data

Last updated 2 months ago