🎉 Gate xStocks Trading is Now Live! Spot, Futures, and Alpha Zone – All Open!
📝 Share your trading experience or screenshots on Gate Square to unlock $1,000 rewards!
🎁 5 top Square creators * $100 Futures Voucher
🎉 Share your post on X – Top 10 posts by views * extra $50
How to Participate:
1️⃣ Follow Gate_Square
2️⃣ Make an original post (at least 20 words) with #Gate xStocks Trading Share#
3️⃣ If you share on Twitter, submit post link here: https://www.gate.com/questionnaire/6854
Note: You may submit the form multiple times. More posts, higher chances to win!
📅 July 3, 7:00 – July 9,
The Sui ecosystem is introducing sub-second MPC network Ika, and cross-chain interoperability capabilities are imminent.
Comparison of Ika, a Sub-Second MPC Network in the Sui Ecosystem, and Privacy Computing Technology
1. Overview and Positioning of the Ika Network
Ika Network is an innovative infrastructure strategically supported by the Sui Foundation, based on multi-party secure computing ( MPC ) technology. Its most notable feature is the sub-second response time, which is unprecedented in MPC solutions. Ika is highly compatible with Sui in underlying design concepts such as parallel processing and decentralized architecture, and will be directly integrated into the Sui development ecosystem in the future, providing plug-and-play cross-chain security modules for Sui Move smart contracts.
Ika is building a new type of security verification layer, serving both as a dedicated signature protocol for the Sui ecosystem and providing standardized cross-chain solutions for the entire industry. Its layered design balances protocol flexibility with development convenience, and is expected to become an important practical case for the large-scale application of MPC technology in multi-chain scenarios.
Core Technology Analysis 1.1
The technical implementation of the Ika network revolves around high-performance distributed signatures, with the main innovations including:
2PC-MPC Signature Protocol: An improved two-party MPC scheme is adopted, which decomposes the user's private key signing operation into a process involving both the "user" and the "Ika network".
Parallel Processing: Utilizing parallel computing to decompose a single signature operation into multiple concurrent subtasks executed simultaneously across nodes.
Large-scale node network: Supports thousands of nodes participating in signatures, with each node holding only a part of the key shard.
Cross-chain control and chain abstraction: allows smart contracts on other chains to directly control accounts in the Ika network (dWallet).
1.2 The potential impact of Ika on the Sui ecosystem
After Ika goes live, it may bring the following expansions to Sui:
1.3 Challenges faced by Ika
2. Comparison of projects based on FHE, TEE, ZKP, or MPC
2.1 FHE
Zama & Concrete:
Fhenix:
2.2 TEE
Oasis Network:
2.3 ZKP
Aztec:
2.4 MPC
Partisia Blockchain:
3. Privacy Computing: FHE, TEE, ZKP, and MPC
Overview of Different Privacy Computing Schemes 3.1
Adaptation scenarios of 3.2 FHE, TEE, ZKP and MPC
3.3 Differentiation of different schemes
4. Market View: "Is FHE Superior to TEE, ZKP, or MPC?"