Use Elympics to introduce top notch security, publicly available game-data, and on-chain settlement.
Let players log in with ready-to-use wallet-agnostic signature authentication system. This way, you can integrate any Ethereum wallet in your game (regardless of its UI) by exposing a signature API. Verify player’s public address by signing a nonce message and authorize by verifying their on-chain account status.
Gameplays are hosted and executed off-chain. This way, gameplays can be treated as rollups in the blockchain space with the execution parameters (input data) being derived from on-chain state and off-chain computation. After the gameplay is finished, a replay file is generated and signed, verifying the validity of the particular gameplay.
Player’s inputs are signed at the application layer with the use of a gameplay-specific key derived from user’s private key. This solution ensures that no inputs can be forged either by other players or the malicious game server itself.
Set up an abstract requirement that needs to be fulfilled before player is allowed to enter a matchmaking queue. An example of such requirement can be putting a given amount of token into an escrow contract in order to let players in.
Let players log in with ready-to-use wallet-agnostic signature authentication system. This way, you can integrate any Ethereum wallet in your game (regardless of its UI) by exposing a signature API. Verify player’s public address by signing a nonce message and authorize by verifying their on-chain account status.
Gameplays are hosted and executed off-chain. This way, gameplays can be treated as rollups in the blockchain space with the execution parameters (input data) being derived from on-chain state and off-chain computation. After the gameplay is finished, a replay file is generated and signed, verifying the validity of the particular gameplay.
Player’s inputs are signed at the application layer with the use of a gameplay-specific key derived from user’s private key. This solution ensures that no inputs can be forged either by other players or the malicious game server itself.
Set up an abstract requirement that needs to be fulfilled before player is allowed to enter a matchmaking queue. An example of such requirement can be putting a given amount of token into an escrow contract in order to let players in.