Skip to main content

How Is the Data Request Authenticated in a DON?

Data requests are authenticated cryptographically. The smart contract sends a request that is cryptographically signed and verified by the oracle nodes.

The nodes, in turn, use their private keys to cryptographically sign the data they provide, proving that the data originated from a legitimate oracle node within the network. This ensures the integrity and non-repudiation of both the request and the response.

How Does a DON Mitigate the Risk of a Sybil Attack?
How Do Different Blockchain Consensus Mechanisms (E.g. Proof-of-Stake Vs. Proof-of-Work) Impact the Level of Non-Repudiation?
How Do Digital Signatures Provide Cryptographic Proof of a Contract’s Originator?
What Is the Difference between Authentication and Non-Repudiation?