Privacy-preserving technology for
decentralized applications

Enterprise-level security & privacy for developers, startups, small businesses and enterprises

The Nulink technology platform consists of blockchain, access control (Proxy Re-Encryption, Attribute-Based Encryption) and secure computation (Zero-Knowledge Proof, Secure Multi-party Computation, Fully Homomorphic Encryption) as its technical core. It provides enterprise-level data sharing and computation services.

An ambitious project

NuLink is collaborating with NuCypher and has received a Polkadot Web3 Foundation grant. Version 1 of our core library and APIs will be released in 2022 - Q2.

2021 - Q4

Deploy the watcher network and complete NuLink Polkadot Pallet.

2022 - Q2

Release NuLink core library v.1, deploy NuLink application API and launch NuLink’s test network.

2022 - Q4

Release NuLink core library v.2, launch NuLink main network and start on-chain governance (DAO).

Overview of the NuLink Network

The NuLink network integrates the Application Layer, the Cryptograph Layer, the Storage Layer, the Blockchain Layer and the Watcher Network.

NuLink users can simply integrate into one single API and get access to multiple storage and BlockChain solutions. For key management we integrate into NuCypher

Miners can get the token NLK in the Storage Layer by providing decentralized storage services, and also in the Watcher Layer by relaying information from ETH.

How it works

1

The Application Layer gives the authorization to the Cryptograph Layer to encrypt or decrypt data. 

2

The Ursulas nodes, which can provide re-encryption service, would register in Ethereum.

3

The Cryptograph Layer uploads or downloads the encrypted data to the Storage Layer. 

4

The Watcher Network would relay the information of Ursulas nodes from Ethereum to the blockchain system such as Solana or Polkadot. 

5

The blockchain network would handle the policy management upon request.

Technical features

Proxy Re-encryption

The Watcher Network would relay the information of Ursulas nodes from Ethereum to the blockchain system such as Solana or Polkadot. 

Decentralized storage

Distributed storage is a storage method based on a P2P network. It uses cryptography technologies such as hash, which facilitates efficient file retrieval and file transfer.

Blockchain Interoperation

Blockchain interoperation is the technology that allows two or more different block chain systems to read, write and transmit information to each other.

Upcoming technical feature support

Zero Knowledge Proof

Zero Knowledge Proof (ZKP) is a proof mechanism that does not compromise privacy. The prover makes the verifier believe a certain conclusion without providing useful knowledge.

Secure Multi-party Computation

Secure Multi-Party Computation (MPC) is a computing method of multi-party cooperation. It means that multiple participants who hold private data jointly calculate a certain agreed function, and obtain the results safely.

Identity-Based Encryption

Identity-Based encryption (IBE) uses the user's identity as a part of the key; the sender can transfer a message that can only be decrypted by the recipient of the specified identity.

Attribute-Based Encryption

Attribute-Based Encryption (ABE) uses the user's attribute set as a part of the key, which can restrict the user's ability to access and decrypt the ciphertext.

Inspiration and use cases

Be inspired to build new types of solutions

Be inspired by how you can use the NuLink platform to build new solutions.

Stay updated on the latest NuLink news

Join our journey to provide privacy & encryption for everyone

Sign up for our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Read the latest updates
Join the discussion
Join the discussion
Build with us