Wallet-Based Encryption
How Eroteme uses wallet-based cryptography to secure user data.
Overview
Eroteme uses wallet-based cryptography to secure sensitive operations. Your Ethereum wallet serves as both your identity and your encryption key — no passwords, no email/password combos, no centralised auth.
How It Works
Signing
Every authenticated action requires a wallet signature. When you perform an action (placing a bet, claiming a refund, creating a prediction), you sign a message with your wallet's private key. The server verifies this signature to confirm you control the wallet.
Encryption
Sensitive content can be encrypted using ECIES (Elliptic Curve Integrated Encryption Scheme) — the same cryptographic curve used by Ethereum wallets. This means:
- Content is encrypted with the recipient's public key
- Only the recipient's private key can decrypt it
- Private keys never leave the client — all decryption happens in the browser
Private keys never leave the client. All decryption happens in the browser. The server never has access to private keys or unencrypted sensitive content.
Security Properties
| Property | Guarantee |
|---|---|
| Confidentiality | Only the intended recipient can decrypt |
| Integrity | Tampering is detectable via ECIES MAC |
| Non-repudiation | Wallet signatures prove who performed an action |
| Key binding | Encryption is tied to Ethereum wallet identity |
Eroteme