Why EdenChain?

Our permissioned blockchain technology enable enterprises to customize their businesses based on their needs while retaining a high degree of control and privacy. EdenChain uses Merkle Tree and Namespace technology to solve performance issues by executing transactions in parallel, enabling it to handle an infinite number of TPS with affordable processing fee.

  • Permissioned Blockchain

    Customizable and scalable for ever-changing business needs while retaining a high degree of control, privacy and security.

  • Scalability

    Parallel execution through Namespace and Merkle Tree technology enables the platform to carry out a vast number of transactions simultaneously. A permissioned blockchain builds a trustworthy environment for smart contract execution, guaranteeing 100 percent processing of all transactions through the use of nodes within each Namespace. EdenChain leverages the Ethereum Virtual Machine (EVM) which is Solidity-friendly to increase accessibility to smart contracts.

  • Secured Interoperability

    E-Bridge architecture ensures zero-knowledge trusted connectivity between on-chain and off-chain modules.

  • Hardware & Software Protection

    The implementation of the consensus algorithm within Intel’s SGX Enclave provides a safe and secure environment.

  • Optimal Capacity

    Users can expect to have optimal resources for required computing power through Energy-efficient Proof of Elapsed Time (PoET) consensus. Cost is based on per transaction and each transaction processed on a first-in-first-our basis (FIFO).

The EDEN Architecture

A blockchain infrastructure powered seamlessly by three distinct layers: the bridge layer, validation layer, and the distributed ledger.

Bridge Layer

This layer consists of an e-bridge that connects EdenChain with external data sources through secured interoperability, enabling the on-chain smart contract to interact with the off-chain modules. As nodes exist on both the on-chain and the off-chain, an E-Protocol uses an encryption process called the Elliptic Curve Cryptography (ECC) – Threshold Cryptography (TC) for trusted connectivity.

Validation Layer

Transactions are executed and verified in this layer, which includes the Ethereum Virtual Machine (EVM). Using a Transaction Execution Scheduler, it forwards transactions to corresponding nodes based on namespaces. Automation of transaction routing allows efficient resource management across transactions and nodes. One can also operate the blockchain with optimal resources and computing power through real-time monitoring of the workload allocated to the Trusted Execution Environment (TEE). By grouping related transactions into batches, the validation layer ensures efficient execution and eliminates any data dependency issues.

Distributed Ledger Layer

Based on Linux Foundation’s open source project, Hyperledger Sawtooth, the distributed ledger layer provides the decentralized database functionality for EdenChain. Proof-of-Elapsed-Time (PoET) is a consensus algorithm that integrates a CPU command in the Software Guard Extensions (SGX) to select a leader randomly without utilizing large amounts of energy to solve a hash problem. SGX allows applications to run trusted code in a protected environment.