ErotemeEroteme

Wallet-Based Encryption

How Eroteme uses wallet-based cryptography to secure user data.

Overview

Eroteme uses wallet-based cryptography to secure sensitive operations. Your Ethereum wallet serves as both your identity and your encryption key — no passwords, no email/password combos, no centralised auth.

How It Works

Signing

Every authenticated action requires a wallet signature. When you perform an action (placing a bet, claiming a refund, creating a prediction), you sign a message with your wallet's private key. The server verifies this signature to confirm you control the wallet.

Encryption

Sensitive content can be encrypted using ECIES (Elliptic Curve Integrated Encryption Scheme) — the same cryptographic curve used by Ethereum wallets. This means:

  • Content is encrypted with the recipient's public key
  • Only the recipient's private key can decrypt it
  • Private keys never leave the client — all decryption happens in the browser

Private keys never leave the client. All decryption happens in the browser. The server never has access to private keys or unencrypted sensitive content.

Security Properties

PropertyGuarantee
ConfidentialityOnly the intended recipient can decrypt
IntegrityTampering is detectable via ECIES MAC
Non-repudiationWallet signatures prove who performed an action
Key bindingEncryption is tied to Ethereum wallet identity

On this page