Technological implementation of the data disclosure protocol

  1. If the Buyer finds out that some data chunk is invalid, they can just identify that invalid chunk and reveal their private session key. Any user can then decrypt the chunk and apply the validation function. In order to prove that this chunk was indeed among the data that the Seller sent to the Buyer off-chain, the Buyer also provides a Merkle path of this chunk. In the event that the Buyer can prove the data is invalid, they receive their money back, along with the security deposit initially provided by the Seller.
  2. If all the data is valid, the Buyer acknowledges it through the on-chain transaction. If they fail to do so, the contract automatically sends the money to the Seller after a certain time period.

--

--

--

DISCIPLINA — the first blockchain to create verified personal profiles based on academic and professional achievements.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

GenerEOS interviews the CCO of ITAM games Damian Byon

Entry №2

Nebulas Reddit AMA Recap

SINOVATE confirms Mainnet Upgrade details

ENVELOP receives grant support from Harmony

DAOs Are Just Virtual Organizations

Hello World!

FAQs about UINP

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mr. DISCIPLINA

Mr. DISCIPLINA

DISCIPLINA — the first blockchain to create verified personal profiles based on academic and professional achievements.

More from Medium

How to build a modern outbound sales machine that grows your sales in a predictable way of scaling

The value of humanities in VC

Understanding the Metaverse Multiple

Safety Issues in End-to-End Conversational AI