TACo Integration
Note that using TACo in production requires a unique DKG initialization ritual, DKG public key and cohort of nodes running TACo software – these are accessed via a unique ritualID
parameter in the third step below. Please see the beta program page for instructions on how to initialize a DKG ritual.
0. Pick an appropriate taco
version
taco
versionBefore we install taco
, we need to consider which domain we would like to use:
MAINNET
(mainnet
network) - production environmentTESTNET
(tapir
network) - stable testnet that matchesmainnet
DEVNET
(lynx
network) - bleeding-edge testnet used for internal development and future features
tapir
is the stable network recommended for developers.
Once you've picked a network, install @nucypher/taco
from npm.js with the appropriate tag based on the chosen network. To find the appropriate version, refer to the "Tags" column in the "Current Tags" section.
You can learn more about the current state of mainnet
and test networks here:
1. Install and integrate taco
taco
To begin, we need to install the taco
, and taco-auth
libraries:
For this guide, we'll need a few extra packages:
To use taco
, we have to call initialize
method first. This method takes care of initializing the WASM module for taco
dependencies.
With this out of the way, we're ready to use taco
in our app.
2. Define decryption conditions
Before we encrypt our data, we have to define the decryption conditions.
Conditions are the requirements for a data recipient to access the plaintext data – i.e. what they will need to prove later to gain decryption rights. There are multiple Condition
types we can use here, including predefined conditions such as ERC721Ownership.
The ERC721Ownership
condition checks the owner of a given token ID. It can be customized by using the ownerOf
contract method and comparing it with the requestor's signature. For more information, see the References section.
We will now specify the condition that must be met to access the data. In this tutorial, we will require that the requester owns an ERC721 token on Ethereum mainnet with a token ID of 5954
.
We can create more complex conditions by combining them with CompoundCondition
3. Encrypt the plaintext
We're ready to encrypt our plaintext and gate access to the encrypted contents with our conditions, NFTOwnership
.
The resulting messageKit
contains the encrypted data and associated conditions.
4. Request decryption
Finally, we will test the conditional access control service by requesting decryption:
At decryption time, the requester will be asked to verify their address by signing a message from their wallet. If the requester's address controls the minimum number (or greater) of the specified NFT, they are eligible to receive the requisite number of decryption fragments. By assembling these fragments, they can decrypt the encrypted data and view the plaintext.
Note that the requester does not need to manually sign the next time they seek access to the data, as the taco
client will cache their signature. Fresh plaintexts encrypted under any conditions involving the same wallet address are automatically accessible to any requester who has signed at least once, provided they still fulfill any requisite conditions, and the cached signature has not expired.
Complete example
This is the complete, end-to-end example of taco
integration
Last updated