@suuey4557
2. The Core Stack of Zama
π Fully Homomorphic Encryption (FHE)
FHE is the crown jewel of Zama. It allows smart contracts to perform computations on encrypted data without decrypting it. This means usersβ private information stays hidden, but their interactions remain valid and verifiable.
π Access Control List (ACL)
ACL defines who is allowed to compute or decrypt encrypted values.
There are two main modes:
Permanent access: granted to an address across all transactions.
Transient access: only valid during a single transaction.
This makes encryption not just secure, but programmable and flexible for developers.
π§ Multi-Party Computation (MPC)
Zama uses MPC to split decryption power across multiple parties. No single node can access private data alone. Itβs the ultimate safeguard against centralized breaches or leaks.
π Zero-Knowledge Proofs (ZKPs)
ZKPs are used to prove that encrypted data has been computed correctly β without revealing the data itself.