Technology

The Foundation of Partisia Infrastructure

Explore the revolutionary combination of multiparty computation and blockchain technologies within the Partisia infrastructure.

no alt text

Combine Multiparty computation and blockchain technologies

The Partisia Infrastructure

The Partisia infrastructure combines multiparty computation and blockchain technologies. Both technologies disrupt the basic concept of “trust” by not relying on “a single point of trust”. On one hand, MPC solves for confidentiality by enabling computation directly on encrypted data without sharing the data with any of the involved computation nodes at any time. On the other hand, blockchain technologies provide efficient immutable consensus and transparency into both encrypted and unencrypted (cleartext) computations. In both cases, none of the involved computation nodes can intended nor unintended change or block the agreed-on computation or computational protocol. Hence the Partisia infrastructure solves the very basic objectives for any digital infrastructure; confidentiality, integrity, and availability, with no single point of trust.

These properties may be hard to grasp as it seems almost counter intuitive. It is nevertheless true, and the methods furthermore belong to a class of cryptography dubbed “provable secure”, which means that all properties are represented in maths and every property can be formally proven to satisfy specific guarantees.

no alt text
Simplifying the use of advance cryptography is paramount

We develop and extend existing programming languages to align ourselves with industry efforts while keeping the complexity contained while unleashing the powers of our own technology stack.

Jesper Balman Gravgaard Vice President of Engineering
no alt text

Shared Infrastructure

All of Partisia’s products are built on this basic infrastructure and exist both as a private infrastructure operated by a given set of nodes as well as a publicly available infrastructure operated by all applicable node operators. This is similar to how you can deploy a docker container in a modern operating system, on the Partisia infrastructure every component can act as a docker container that can be installed and run - thereby defining the configuration. 

no alt text

Protocols

The Partisia infrastructure has a number of different components that implement different underlying protocols. 

MPC is usually seen via a Threshold Signature Scheme (TSS) where an MPC cluster is able to manage and use a private key for signatures. The Partisia infrastructure comes with protocols for these, one of these is the Large Oracle protocol.

Partisia infrastructure MPC provides completely programmable privacy when working on data and the infrastructure supports different security models (majority trust or self-trust) as well as arithmetic and binary circuits.

Tailored protocols allow for the most efficient execution of different computations with the generic translation mechanism allowing for precise translation between computations.

Providing a seamless serialisation of events is a key problem for blockchains, the Partisia infrastructure is born with several variants, in our public blockchain the extended version of the FastTrack protocol is our consensus mechanism.

Tech Stack

The Partisia infrastructure is built on different key components. 

The Partisia infrastructure has various languages supporting the different use cases. Defining the computation with programmable privacy is done via the Rust programming language, where the transparent part of the computations is programmed in standard Rust and the confidential part in ZkRust. Query is the language we use when working with data and defining the data computation.

The core of the Partisia infrastructure is a shared ledger upholding a shared and agreed upon state. This ledger is the core component that can change the public state as well as active different components. These components run in a sandboxed environment, more specially a execution container - an example of MPC that is activated on the respective nodes via the Ledger, the container is started to provide the necessary confidential part of the computation.

A standard deployment is provided as docker images and is deployable raw or using any container orchestration technology eg. Kubernetes.

no alt text