Transact confidently, knowing your transactions are private and protected by zero-knowledge proof. You can transact with network members while keeping your identity and token balances private. Apply complex technologies like zero-knowledge proof and advanced cryptography in a simple and intuitive use case of anonymous token transfers. Kaleido removes the complexity so you can focus on how to apply the technology for your use case.
Zero Knowledge Token Transfer makes use of the latest technologies around zero-knowledge proofs and advanced cryptography.
Incorporate ERC20 (fungible) tokens for any use case requiring privacy and anonymity.
Transact with members of your network without disclosing the details of token amounts or parties involved.
Avalanche Subnets are fully customizable. You can define the number of validators and how they are incentivized. This makes it a highly flexible scaling solution for enterprises that want an application-specific chain that can grow with their business.
When you run Subnets on Kaleido, you get the added benefit of an enterprise-grade, compliant platform and a team of web3 experts committed to helping you realize business value quickly.
Our platform matches the customizability of Polygon Supernets with unlimited connectivity, pluggable web3 tools and services, and bountiful APIs, making Kaleido the premier platform for building and scaling applications quickly.
When you run Polygon Supernets on Kaleido, you realize the benefits of Polygon’s scaling solutions on our enterprise-grade, highly secure infrastructure that is trusted by blockchain teams around the globe.
Kaleido makes it easy to build applications that go beyond a simple login to create an identity layer that gives people more control and portability of their data.
Kaleido offers identity as a service with hosting of both claim and verifier servers. Our platform then brings identity solutions to life with pre-built, pluggable services like wallets, tokens, and public and private connectivity. Meet the demands of the most complex use cases with fully customizable identity apps.
Built for permissioned networks
Data isolation and strict governance enabled by Hyperledger Fabric certificate authority
Unique Execute-Order-Commit endorsement model where transactions are initially executed on a set of peers while ordering service handles packaging and delivery
Ordering can be switched based on the needs of the environment with pluggable consensus algorithms
Go, Java, Node.js
Since launching in 2015, Hyperledger Fabric has been a top choice for enterprises looking to build apps on permissioned blockchain networks. The modular architecture is capable of powering large-scale applications that require enterprise-grade data security.
The ability to protect certain details of peer transactions has made Hyperledger Fabric a go-to protocol for industries like financial services, supply chains, and the insurance industry. It works for complex use cases that involve personally identifiable information and proprietary business data.
Hyperledger Fabric is one of the many protocol choices available on Kaleido. With a full suite of plug and play services, flexible cloud deployment options, and powerful APIs, Kaleido is the easiest way to run a Fabric network anywhere.
Hyperledger Fabric is an open source project designed to handle enterprise-grade use cases. Key differentiators are its quick transaction throughput and its modularity, allowing for more innovation and optimization regardless of industry use cases. Other benefits include scalability and security, key pillars of any enterprise application.
Hyperledger Fabric is a modular blockchain framework that allows you to plug in different components, such as consensus algorithms and membership services, and tailor networks to your needs
Part of the Hyperledger project of the Linux Foundation, Hyperledger Fabric is an open source protocol that allows the enterprise to build custom applications and limit vendor risks
With a high level of security for enterprise users, Fabric uses a permissioned network to prevent unauthorized access
Kaleido is a Hyperledger Certified Service Provider (HCSP) with a deep expertise in helping enterprises successfully adopt Hyperledger tools. Our founding partners are also active with the Hyperledger Foundation. Sophia Lopez is a General Member representative on the Hyperledger Foundation Governing Board and Jim Zhang is a member of the Hyperledger Foundation Technical Oversight Committee.
Talk to an ExpertQuorum is a blockchain protocol specially designed for use in a private blockchain network, where there is only a single member owning all the nodes or a consortium blockchain network where multiple members each own a portion of the network.
Quorum is designed to be highly scalable, with low transaction latencies and the ability to support a higher number of transactions per second than other blockchain protocols. This makes it well-suited for use in high-volume applications.
Quorum includes a number of security features that are designed to protect sensitive or proprietary data, like private transactions that allow network participants to transact without revealing the details of their transactions to the rest of the network.
Quorum is based on the Ethereum protocol and can support a wide range of decentralized applications and smart contracts. It is also highly modular and customizable so that it can be tailored to the needs of specific use cases.
There is no cost required to submit transactions to a Quorum network, unlike Ethereum, which requires the payment of high and unpredictable gas fees to submit transactions.
Kaleido is a Hyperledger Certified Service Provider (HCSP) with a deep expertise in helping enterprises successfully adopt Hyperledger tools. Our founding partners are also active with the Hyperledger Foundation. Sophia Lopez is a General Member representative on the Hyperledger Foundation Governing Board and Jim Zhang is a member of the Hyperledger Foundation Technical Oversight Committee.
Talk to an ExpertTransfer tokens with complete privacy using the Zero Knowledge Tokens service. The service is based on the Anonymous Zether implementation by JPMC, which is an extended implementation of the Zether design jointly published by Stanford University and Visa Research.
The service supports transfer of ERC20 tokens with zero knowledge proofs, so that the transaction payload appears to be random bytes to the participants in the blockchain, except for the designated sender and receiver.
Anonymity is achieved by using a group of decoy accounts to mix together with the sender and receiver accounts, so that non-parties of the transfer can not decipher the real impacted accounts.
The design of the user experience is modeled after the "fund - transfer - withdraw" flow. A summary of how this works is as follows:
Hyperledger Fabric is a private blockchain that allows developers to create subnets, or channels, meaning that certain proprietary or personal information can remain confidential. This makes Fabric a protocol of choice for industries like financial services, insurance, and supply chain management.
Businesses reach production faster when they combine Avalanche Subnets with the full suite of web3 development tools offered on the Kaleido platform.
When you launch Polygon Supernets on Kaleido, you access the unique scaling solutions Polygon has to offer and an array of pluggable tools to mint tokens, create assets, and monitor activity—making it easier than ever to stand up ambitious web3 apps.
Quorum is a protocol of choice for industries like financial services, insurance, and supply chain management where enterprise-grade.
Zero knowledge proofs, or ZKPs, are a type of cryptographic proof that allows one party (the prover) to prove to another party (the verifier) that a statement is true, without revealing any information about the statement itself.
In a zero knowledge proof, the prover can convince the verifier that a statement is true, without revealing any information about the statement other than the fact that it is true. This is achieved by allowing the prover to interact with the verifier through a series of challenges and responses, without revealing any information about the statement itself. The prover's ability to respond correctly to the verifier's challenges serves as proof that the statement is true, without revealing any information about the statement itself.
Zero knowledge proofs have a number of potential applications, including enabling secure authentication and proving the possession of certain knowledge or information without revealing the actual knowledge or information. They are an important tool in the field of cryptography and are used in blockchain networks to provide security and privacy.
Zero knowledge proofs work by allowing the prover to interact with the verifier through a series of challenges and responses, without revealing any information about the statement being proven.
The prover begins by stating the statement that they wish to prove is true (for example, "I know the secret password"). The verifier then challenges the prover by asking them to perform certain tasks or provide certain information, without revealing the actual statement being proven. The prover responds to the challenges by performing the tasks or providing the required information.
If the prover is able to correctly respond to the challenges, the verifier is convinced that the statement is true, without learning any information about the statement itself. This is because the prover's ability to correctly respond to the challenges demonstrates that they possess the knowledge or information required to prove the statement, without revealing the actual knowledge or information.
Zero knowledge proofs are usually interactive, meaning that the prover and verifier must communicate back and forth in order to complete the proof. They can also be non-interactive, using techniques such as zero-knowledge proofs of knowledge (ZKPOK), which allow the prover to generate a proof that can be verified by the verifier without any further interaction.
There are many different types of zero knowledge proofs, each with its own specific set of challenges and responses. Some common types of zero knowledge proofs include proof of knowledge, proof of identity, and proof of possession.
There are several benefits to using zero knowledge proofs:
Privacy: Zero knowledge proofs allow a prover to prove the truth of a statement without revealing any information about the statement itself, providing a high level of privacy.
Security: Because zero knowledge proofs do not reveal any information about the statement being proven, they can help to prevent against information leaks and other security vulnerabilities.
Efficiency: Zero knowledge proofs can be more efficient than other methods of proving the truth of a statement, as they do not require the transfer of large amounts of data.
Applications: Zero knowledge proofs have a wide range of potential applications, including enabling secure authentication, proving possession of certain knowledge or information without revealing the actual knowledge or information, and enabling secure and private transactions.