In this post, the Chainlink Labs Research team discusses how to hide the individual lengths of sensitive data from the verifier.| Chainlink Blog
This post discusses how to efficiently parse the TLS response and form claims about it while preserving the privacy of sensitive data within the response.| Chainlink Blog
Discover how the prover convinces the verifier that a TLS response is obtained from a particular server in Chainlink DECO.| Chainlink Blog
Read the latest foundational and applied research around blockchains, smart contracts, and oracles from leading academics.| Chainlink Blog
DECO Research Series #2: Provenance and Authenticity | Chainlink Blog
DECO Sandbox is now open to the public, enabling institutions to streamline user onboarding while maintaining data privacy and provenance.| Chainlink Blog