Seal Officially Launches on the Sui Testnet

By: blockbeats|2025/04/07 08:00:03
分享
copy

Seal Officially Launches on the Sui Testnet

Mysten Labs' latest product Seal is a decentralized cryptographic management service that provides asymmetric encryption security, suitable for integration into various scenarios and applications. Seal combines on-chain access policies with off-chain services for key generation and decryption, enabling content encryption while ensuring authorized users can access the encrypted content.

Seal has launched on the Sui testnet for developers to familiarize themselves with the system and explore integration with their own applications.

Despite the substantial amount of data on-chain that requires security protection, existing solutions are often specific to certain scenarios (such as wallet services) or rely on Web2 (like AWS KMS and GCP Cloud KMS). Seal provides developers with a more universal, secure, scalable, and high-performance solution, suitable for data access control for almost any storage location.

Seal Architecture Components

The Seal architecture uses off-chain backend services to generate identity-based decryption keys and provides corresponding public keys for encryption. Applications can choose t-out-of-n backend services as part of the threshold encryption mechanism. Users interact with the backend services using the Seal SDK, decrypting content on the client side with their identity key.

The Seal client works in conjunction with the on-chain Seal policy, where policies are defined and managed in the Move language on Sui, used to establish access structures. These on-chain policies can be configured with various rules to suit various use cases.

Use Cases

Builders developing with Seal can integrate its flexible security architecture into their applications in various ways. Here are some examples demonstrating how Seal can protect sensitive data securely and scalably:

· Protecting personal data on Walrus or other storage infrastructure to ensure only the uploader can access it.

· Using time-locked encryption to transfer ownership of NFTs or other assets to another user within a specific time window.

· Storing encrypted content on Walrus or other storage infrastructure and controlling access for specific users through a whitelist.

· Publish premium content in a content subscription app, allowing access only to verified subscription users.

· Develop a chat application that supports end-to-end encrypted private messaging based on Sui and Walrus.

Developers interested in exploring real-world applications can check out this marketplace app (code) that showcases access control features based on whitelisting and subscription mechanisms using Sui, Walrus, and Seal.

Built for Security

The initial testnet release of Seal focuses on providing an end-to-end user experience for developers and users. This release is not only available for comprehensive testing of Seal's core features but also aims to gather community feedback to ensure that Seal's operations truly serve user needs.

This feedback will also determine the future development direction of Seal, with several features already identified to further enhance its usability. Potential future developments for Seal include:

· Multi-Party Computation (MPC): Allowing a multi-party computation committee to use a t-out-of-n distributed key to operate Seal's backend services.

· Server-Side Encryption: As an alternative to client-side encryption, allowing Seal's backend to perform data decryption, enabling developers to build lighter front ends.

· Digital Rights Management (DRM): Performing decryption in a secure trusted client environment to enable DRM functionality, similar to mainstream platforms like Netflix, YouTube, and HBO.

Developers interested in Seal can refer to the official documentation to start exploring its SDK and deploy applications based on the testnet.

Disclaimer: This content is for general educational and informational purposes only and should not be interpreted or relied upon as an endorsement or recommendation to buy, sell, or hold any asset, investment, or financial product, and does not constitute financial, legal, or tax advice.
This article is contributed content and does not represent the views of BlockBeats.

猜你喜歡

Trust Wallet 遭黑客攻擊最大損失達350萬美元

Key Takeaways 最大受害者損失了約350萬美元,該錢包已休眠一年。 第二大損失達140萬美元,該錢包已休眠兩年以上。 黑客共竊取超過600萬美元加密資產,其中超過400萬美元已轉移至CEX。 自托管錢包面臨基礎設施漏洞的潛在風險。 WEEX Crypto News, 26 December 2025 近期,Trust Wallet 發生了一起嚴重的黑客事件,此次事件引發了業界廣泛關注。在這起事件中,Trust Wallet的一個錢包損失了價值高達350萬美元的加密資產,該錢包在此次攻擊前已經休眠了一年多。此外,另一個損失較大的錢包也損失了約140萬美元,在攻擊發生前已經休眠超過兩年。 Trust Wallet…

项目方將40萬美元BDXN代幣注入多個交易所

Key Takeaways 三個BDXN項目方相關的錢包地址向多個交易所存入價值約40萬美元的BDXN代幣。 這些代幣於兩個月前從項目方的錢包轉出。 相關監測由onchainschool.pro 提供。 代幣轉移涉及的地址包括0xD5682dcA35D78c13b5103eB85c46cDCe28508dfB等。 WEEX Crypto News, 26 December 2025 BDXN項目方關聯錢包的最新動向 近期,BDXN項目方的部分地址將價值40萬美元的BDXN代幣注入多家交易所。據onchainschool.pro的監測顯示,與BDXN項目方相關的三個主要錢包在過去三小時內完成這一轉移操作,而這批代幣則早在兩個月前便從項目方錢包中轉出。 監測機構報告及相關地址詳情 這次轉移操作首次由onchainschool.pro監測到,並在ChainCatcher等多家媒體上披露。根據報告的數據,涉及到的三個錢包地址分別是:0xD5682dcA35D78c13b5103eB85c46cDCe28508dfB、0xD0Fc2894Dd2fe427a05980c2E3De8B7A89CB2672以及0xAc245a570A914C84300f24a07eb59425bbdC1B48。這些地址攜帶的代幣價值總計約40萬美元。 轉移代幣的未來意圖及市場影響…

# 龐貝與互聯網:Base 網絡上的 PancakeSwap V3 池中流動性獎勵啟動

Key Takeaways PancakeSwap 透過 Brevis Incentra 在 Base 網絡引入了 12 個 V3 池並開始提供流動性獎勵。 使用者可以在 Optimism 平台上通過 Incentra 添加流動性,不僅獲得交易費用,還能賺取…

代幣 VS 股權,Aave 爭議的來龍去脈

這是 Aave 要面對的問題,更是整個行業要面對的問題

12月26日市場關鍵情報,你錯過了多少?

1. 鏈上資金:本日有 7.8 百萬美元流入 Hyperliquid;5.5 百萬美元流出 Solana 2. 最大漲跌幅:$ISLM、$FTN 3. 熱門新聞:Trust Wallet 將確保所有受影響的用戶都能獲得退款,用戶需盡快完成程序升級

加密聖誕劫:損失超600萬美元,Trust Wallet 擴展錢包遭駭分析

Trust Wallet 瀏覽器擴充功能 2.68 版被發現存在惡意後門,導致用戶資金被盜,總損失超過 600 萬美元。

熱門幣種

最新加密貨幣要聞

閱讀更多