Verity 🧪
Verity is an advanced ZK (Zero-Knowledge) and MPC (Multi-Party Computation) cryptography framework and network designed to maximise user trust and mitigate data security risks in sourcing and processing “real-world” data. This includes private, niche, or custom data in systems and APIs beyond blockchains. Verity ensures verifiable and privacy-preserving transparency in data flow, sources, security, and processing.
Think of it as a way to observe and verify data lineage.
Overview
Verity 🧪 secures data pipelines between the real world and blockchain, ensuring transparency and verification of data lineage. Data lineage refers to the flow of data as it transitions from a source to a destination.
With Verity, sovereign blockchains and data-driven protocols can verify:
- Data Authenticity: Ensure and incentivise data sourced from highly trusted entities.
- Data Integrity: Embed tamper-resistance to prevent bad data from being incorporated into the data pipeline and to prevent unauthorised data manipulation.
- Data Transformation: Advance data through state transitions to create compatibility for various destination systems in an expected and trust-minimised manner.
This removes the need for users to trust you in order to trust the outcomes of the data.
Benefits
-
Access to Private Data:
Verity allows access to private data gated by API keys, which can be redacted in these proofs. Examples include government and health-related systems, or public gated APIs such as esports results and blockchain RPC endpoints.
-
Offchain Data Requests:
Unlike traditional Oracle networks, Verity moves data requests and cryptography offchain, reducing error handling risk and computational load on blockchains. Proofs are portable; external data is requested offchain and verified onchain.
-
High-Frequency Data Provisioning:
Verity supports high-frequency data fetching and provisioning since data is requested offchain and proofs are generated asynchronously.
-
Cost Efficiencies:
Verity offers cost efficiencies for data providers by allowing for filters and other offchain logic over external data. As long as the original authentic data is processed verifiably within the Verity platform, it can be securely verified onchain.
Resources
- Demo Video: Verified Blockchain Indexing on Internet Computer
- Monologue Video: Purpose of ZK in Data Processing
- Demo Video: ZK Proof of X (Twitter) Data
- Demo Video: Decentralised Processing Proof of TLS Data
- Post: Secure Web3 with Trusted Data
- Architecture: View Architecture
- Architecture Video: General Purpose Architecture
- Architecture Video: Verifiable Data Processing
Getting Started
To get started with Verity, please reach out to the Usher Labs team through our Discord server or our direct contact page. We are actively collaborating with blockchain applications and Web3 teams to ensure the security of data, trust, and network operations. Our focus is on securing digital assets, both custodial and non-custodial, and maximizing user trust in outcomes by minimizing trust in data and pipelines between the real-world and blockchains.