Platform Strength

Secure Architecture

EdenChain's platform has sound infrastructure powered seamlessly by three distinctive layers : Distributed Ledger, Validation Layer and Bridge Layer. Together, they provide our blockchain platform exceptional security.

Bridge Layer

This layer consists of an e-bridge that connects EdenChain with external data sources through secured interoperability, enabling the on-chain smart contract to interact with the off-chain modules. As nodes exist on both the on-chain and the off-chain, an E-Protocol uses an encryption process called Elliptic Curve Cryptography (ECC) – Threshold Cryptography (TC) for trusted connectivity.

Validation Layer

Transactions are executed and verified in this layer. Using a Transaction Execution Scheduler, it forwards transactions to corresponding nodes based on namespaces. Automation of transaction routing allows efficient resource management across transactions and nodes. One can also operate the blockchain with optimal resources and computing power through real-time monitoring of the workload allocated to the Trusted Execution Environment (TEE). By grouping related transactions into batches, the validation layer ensures efficient execution and eliminates any data dependency issues.

Distributed Ledger Layer

Based on Linux Foundation’s open source project, Hyperledger Sawtooth, the distributed ledger layer provides the decentralized database functionality for EdenChain. Proof-of-Elapsed-Time (PoET) is a consensus algorithm that integrates a CPU command in the Software Guard Extensions (SGX) to select a leader randomly without utilizing large amounts of energy to solve a hash problem. SGX allows applications to run trusted code in a protected environment.

EdenChain is engineered to lead the new digital economy

Technological Superiority

EdenChain has three major technological strengths that support decentralized financial investments: scalability, security and effortless tokenization. Those are inevitable factors when it comes to real world blockchain service applications. EdenChain considered those factors from the very beginning to meet the needs of serious De-Fi users.

Scalability (Performance)

Scalability is the biggest technical obstacle for blockchain adoption asofnow. Without achieving scalability, it is hard to process transactions in high performance. Edenchain uses namespace technology for the scalability. It is proven technology in various areas.

Security between On-Off Chain

E-Oracle and ECC-TC based E-Protocol provide trust and security for external system interworking. Median Voter Theorem (MVT) is adopted as a Consensus Algorithm to prevent data manipulation.

Easy Tokenization

We support users to create and trade tokenized assets effortlessly, while allowing them to customize the number of owners and the metadata of those assets in any way that will best serve the purpose.