
Opening up advanced cryptography to millions of developers
Real-world privacy and utility require privacy to be programmable, costs to be predictable, and development lifecycles to be rapid. The Midnight network delivers this functionality through programmable privacy, a dual-component architecture that separates the utility token from the transaction resource, alongside the developer-friendly Compact language.
The launch of the Midnight network establishes state continuity and permanence in the network that delivers 4th generation blockchain technology with the foundational features needed to enable real-world adoption of blockchain.


Midnight abstracts the complexity of ZK proofs cryptography for developers to:

Midnight makes sophisticated cryptography accessible through Compact, a statically-typed domain-specific language based on TypeScript. This allows both Web2 and Web3 engineers to implement programmable privacy as a standard part of their development workflow without needing advanced knowledge of cryptography.
The network architecture separates public on-chain states from private local states at the protocol level. This native dual-state ledger system allows for selective disclosure, where users can prove assertions about private data without ever revealing the data itself. The data never leaves their local system.

Midnight network feature overview


Block Production
Finality
The primary hash function used is Blake2 256, which provides strong cryptographic guarantees and is employed for general-purpose hashing — including block hashes and within various state transition functions. It strikes a balance between performance and security, making it suitable for runtime-critical operations.
For signature verification, Midnight uses three distinct schemes depending on the role:
This runtime is composed of modular components known as FRAME pallets. Each pallet encapsulates a specific domain of logic and can include storage definitions (maps, multi-key maps, lists, values), events, dispatchable functions (transactions), offchain workers, hooks, host-exposed functions, and RPC methods. This modular design allows for a flexible and extensible on-chain execution environment, similar in spirit to a smart contract framework but compiled ahead of time and governed at the chain level.
Midnight’s runtime integrates both upstream pallets from Polkadot SDK and components developed by Cardano Partner-Chains. Examples include:
Midnight is built using the Polkadot SDK (formerly Substrate), and uses ParityDB as its default database backend.
Midnight relies on a proof-based verification model, tightly coupled with the design of the Midnight Ledger.
Most transactions on Midnight are unsigned and adhere to a format defined by the Midnight Ledger itself. Rather than relying on traditional signature-based authorization, these transactions embed a cryptographic proof that attests to the validity of a specific action. This action may be a contract invocation, a contract deployment, or a ZSwap transaction. The presence of this proof allows the network to validate state transitions without needing to expose sensitive data or signatures directly.

Opening up advanced cryptography to millions of developers