🍄 Smart Contracts, General Conditions and Private Decryption
‼️ All code within this tutorial is purely educational, and it is up to the readers discretion to build their applications following industry standards, practices, and applicable regulations.
This tutorial will guide you through using private decryption with general conditions. It builds off of the concept of preparing, encrypting, decrypting, and executing simple transactions natively within the Fairblock blockchain, FairyRing. The repo can be found here.
Instead of a bash script being used to interact directly with the FairyRing network, this tutorial uses a bash script that interacts with a newly deployed rust smart contract to prepare transactions, generates unique tIBE-related ids for them with FairyRing, and carries out the typical encryption process. This is all happening within the FairyRing chain. Decryption is carried out such that the keyshares from the FairyRing validators are encrypted with a specific public key associated to a user's wallet.
A walk through of this demo is show in the video below. Feel free to watch it and follow along with the rest of this page.
To run this demo, simply download this repo, and switch to this specific feature branch, feat-auction
.
What is the Difference Between Public and Private Decryption?
A core concept within Fairblock is "Public, and Private, Decryption." Assuming that you have gone through the foundational parts of the docs, you know that the FairyRing validators generate keyshares that are ultimately aggregated to create the Master Decryption Key for a respective encrypted transaction. The default methodology has the Master Decryption Key fully public to anyone watching the FairyRing network, which is fine in certain applications. Some applications may want the Master Decryption Key to be encrypted for one specific user. When this is the case, the keyshares that are ultimately aggregated and used to create the Master Decryption Key, are actually encrypted by the calling user's wallet public key. The user then can decrypt the keyshares, aggregate them to get the Master Decryption Key, without anyone else onchain knowing. This step can be handled by the front-end so the user doesn't have to go through extra steps.
Thus we have the following definitions:
- Public Decryption - The typical user flow where encrypted messages have their Master Decryption Key exposed as soon as it is generated to anyone listening to the FairyRing.
- Private Decryption - The user flow where the validator keyshares, that are used to construct the Master Decryption Key ultimately, are encrypted using the calling user's wallet's public key.
What cApps can be Made With Private Decryption and General Conditions?
There really is an endless design space for cApps using Private Decription and General Conditions with FairyRing. Some prime examples could include:
- Private Data Marketplaces for AI Models (user-owned data for AI models) - AI models need data, insitutions and users do not want to give data without certain conditions (payment, ethtical integrity of the AI model or company, etc.). Private decryption and general conditions provides the tools to create market places where data sets can be encrypted and given conditions before it can be decrypted and used within an AI model.
- Content Behind Conditions and/or Paywalls - Example Idea: FairyFans: cApps where subscribers can pay and/or carry out certain conditions in order to decrypt access to content or the content itself. Imagine all your favorite crypto twitter content creators providing end to end encrypted access to their content, all using decentralized, onchain, tech.
- Trusted Solvers for Intent Systems - cApps that leverage intent systems but require that the solvers used follow specific conditions based on the prepared intent-based transaction. We already see intent apps provide the option to specify to use certain solvers, but that is all anchored in centralized systems. Private decryption and general conditions with fairblock unlocks this feature in a decentralized way.
For more cApp ideas make sure to check out our Ecosystem page.
Key Lessons from this Demo
1. Understood the high level difference between cApp design using "General Conditions" with:
- Public Decryption (a future tutorial)
- Private Decryption (this tutorial)
2. Walked through an example cApp (smart contract) going through a common payment-gate pattern where the UX flow includes:
- cApp providing a service, such as generating loot boxes, that are encrypted using FairyRing, and more specifically "FairyRing private decryption," where the contract sends encrypted keyshares (ultimately the decryption key) to users that pay the required service fee.
- User pays fee, and is able to request the transaction to be decrypted.
- Encrypted keyshares are sent to the user, where the user's wallet private key is used to encrypt the keyshares. The user then takes the encrypted keyshares, locally decrypts them using their wallet private key, and aggregates them, resulting in the decryption key needed to decrypt the unique passwords offered by the cApp to get through the payment gate.
Essentially within step 2, developers will walk through the motions of using a rust smart contract within a FairyRing cApp and leverage dynamic confidential computing.
The common payment-gate pattern is just one example for conditional decryption features. This is really up to you as the cApp developer!
Demo Quick Start
Imagine that you're building a FairyRing cApp that provides gamers unique loot boxes. These loot boxes are of course unknown until certain conditions are hit, players finally get 100 mushrooms in a side quest, etc. you know how it is.
Once the condition is hit and the FairyRing validators are notified, the keyshares are generated for the respective loot box. Since each loot box is unique, having a cApp design that uses private decryption makes sense. The gamer who earns the loot box will provide their public address, and that will be used to encrypt the newly generated keyshares. This way those keyshares won't be used to create the aggregated keyshare and thus the decryption key unless it is the appropriate gamer with the public-private key pairing for said wallet.
This is a powerful smart contract lego piece that pushes cApps into even more exciting territory.
To run this demo, simply download this repo, and switch to this specific feature branch, contracts
.
git clone https://github.com/Fairblock/fairyring.git
gco contracts
Now, simply run the following and you will have effectively carried out the tutorial. Below we'll discuss what is happening.
make devnet-up
./privateDecryptionFairyRingTutorial.sh
make devnet-up
spins up a local FairyRing chain on your machine using docker. The same devnet wallets are spun up everytime. As well, the rust smart contract contract.rs
is deployed on your local devnet, also at the same address everytime in these tests. That is the smart contract we will be interacting with, we'll call it the lootbox
contract.
Upon running the ./privateDecryptionFairyRingTutorial.sh
script, you will see transactions carried out on your devnet in the CLI. It is basically walking through the transaction flow for a lootbox creator encrypting the message containing details about the lootbox, and then a gamer coming along and decrypting it after passing some set of conditions (in this case, a payment).
It is important to check out the
contract.rs
file and the comments provided. It acts as a temporary reference for those interested in creating their own cApp using this design pattern.
The steps of the cApp are as follows:
All function calls outlined below are internal to the smart contract, and are done through the public function execute()
.
- The smart contract function
execute_request_identity()
is called. - FairyRing is queried to obtain the identities associated to the LootBox contract.
- The CLI will prompt you for the newly generated
pubkey
that will be used to encrypt the LootBox details. In this example, we simply represent it as a string. - The script then encrypts the transaction using FairyRing. This is an offchain event and it is usually carried out by a front end. The encrypted result will then be output to the CLI.
- The encrypted tx will then be input to the LootBox function
store_encrypted_data()
. - Now a user comes along who has earned the LootBox, and thus can call the LootBox contract function
execute_request_keyshare()
. In order to do this, the unique id for the respective lootbox needs to be known. You are asked for the pubkey to encrypt the keyshares with, and that will be the public address of your wallet. Simply pick a wallet from the fairyring wallet opsion spun up within your devnet. - The encrypted keyshares will be obtained.
- These keyshares are then locally decrypted using your respective wallet's private key, and then aggregated to obtain the LootBox decryption key.
- Now the script will call the contract function
decrypt()
which ultimately interacts with FairyRing to decrypt the transaction.
Assumptions:
- The actual details of how this LootBox would work, and the actual exchanging of tokens to the LootBox smart contract are not in scope for this tutorial. That is for the app developer, but we're happy to discuss ideas!
The details of each of the key steps carried out in the bash script are discussed in the next section.
Typical Transactions Carried Out by a Smart Contract Using this Pattern
Digging further into the underlying code within this tutorial, let's go over the general functions within this tutorial and how they can be used in a general sense for your own cApp.
Step 1: Generate Unique IDs for Each Transaction
Within this tutorial, the rust contract creates a unique ID for each transaction each time the function execute_request_identity()
is called.
Unique IDs are generated by creating whatever nomenclature you would like for your specific smart contract transaction, and then communicating with the pep
module within FairyRing to obtain further name appendices to ensure it is unique in FairyRing.
Unique IDs can be generated as needed, or they can be generated ahead of time. This is a design decision for the cApp developer.
KEY LESSON FOR DEVS: cApp contracts will need a function that communicates with the
pep
module to generate unique IDs for encrypted contract transactions.
The command that was ran to interact with this example's request_identity()
function is shown below:
Place holder values for education purposes:
fairyringd tx wasm execute $CONTRACT_ADDRESS '{"request_identity": {"price": {"denom": "ufairy", "amount": "1000"}}}' --from $ACCOUNT_NAME --gas 9000000 --home ./devnet_data/fairyring_devnet --chain-id fairyring_devnet --keyring-backend test
Actual values in the privateDecryptionFairyRingTutorial.sh
bash script:
fairyringd tx wasm execute fairy14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9stsyf7v '{"request_identity": {"price": {"denom": "ufairy", "amount": "1000"}}}' --from wallet1 --gas 9000000 --chain-id fairyring_devnet --home ./devnet_data/fairyring_devnet/ --keyring-backend test
Step 2: Query Contract for the Identity Supplied and Register the Contract Against the Identity
Now that private IDs can be generated from the smart contract, the next portion of the design flow for a developer is to obtain the public address. This is more-so done by the front end team likely. They would query the chain for the respective ids generated from the smart contract.
Place holder values for education purposes:
fairyringd q wasm contract-state smart $CONTRACT_ADDRESS '{"get_all_identity": {}}'
Actual values in the privateDecryptionFairyRingTutorial.sh
bash script:
fairyringd q wasm contract-state smart fairy14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9stsyf7v '{"get_all_identity": {}}'
- Register the contract against the identity
Place holder values for education purposes:
fairyringd tx pep register-contract $CONTRACT_ADDRESS $UNIQUE_ID --from $ACCOUNT_NAME --gas 9000000 --chain-id fairyring_devnet --home ./devnet_data/fairyring_devnet --keyring-backend test
Actual values in the privateDecryptionFairyRingTutorial.sh
bash script:
fairyringd tx pep register-contract fairy14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9stsyf7v fairy14hj2tavq8fpesdwxxcu44rty3hh90vhujrvcmstl4zr3txmfvw9stsyf7v/req-fairy1m9l358xunhhwds0568za49mzhvuxx9uxdra8sq-1 --from wallet1 --gas 9000000 --chain-id fairyring_devnet --home ./devnet_data/fairyring_devnet --keyring-backend test