Confidential Computation with TEE

Build on World's largest Trusted Execution Environment (TEE) network

Our state-of-the-art open GPU TEE infrastructure empowers developers to build secure, confidential, and decentralized applications in both AI and blockchain.

Read Docs

Contact Us

Online Workers
33,664
Online Workers
Compute
81,234 vCPU
Compute
Cross-Chain TX
19,539
Cross-Chain TX
TX
228,232,090
TX

Current Limitations of Computation in Web3

Limitations of single ZKP-based proving system

ZK can not guarantee privacy in public state sharing scenario, the rollup sequencer can see all data even if they prove the computation done correctly.

Limitations of single FHE-based proving system

FHE cannot prove that the computations performed as expected, also the decryption integrity can not guaranteed by the companioned MPC.

The Need for TEE

What is TEE?

Trusted Execution Environments (TEE) create secure enclaves for processing sensitive data, allowing applications to execute securely in an isolated environment, without trust the privileged software, such as hypervisors or host operating systems.

Data Sharing

Phala TEE supports confidential data exchange use cases, such as MEV (Maximal Extractable Value), blockchain games, and AI model training.

Availability

With 35,000 TEE workers, Phala’s Phat Contract is programmable to meet the needs of various blockchain projects, ensuring robust availability.

Trust of Multiple Parties

Phala TEE ensures your application, project, or blockchain use case remains operational and free from legislative risks, maintaining trust across multiple parties.

Out-of-Box SDK

Our SDKs for Rust and JavaScript enable developers to launch their applications on our TEE network quickly, often within hours.

Use causes for utilizing TEE to bring full privacy and security

Practical Real-world Applications of TEE

Build Confidential dAGI

  • Run AI Models Inside TEE
  • RedPill by Phala Network runs AI models securely in a TEE, ensuring data privacy and integrity.

Learn more

Build Secure Web3 Consumer Apps

  • Gaming: Use Phala TEE for secure, confidential blockchain games, protecting player data and in-game assets from unauthorized access.
  • Social Apps: Develop social apps with Phala TEE to ensure user privacy and secure data exchanges, keeping interactions private.
  • MEV DeFi: Integrate Phala TEE in DeFi apps to safeguard against MEV exploits, ensuring secure and transparent financial transactions.

Build Coprocessor for FHE

TEE can eliminate the collusion risk exist in MPC network, and prove the validity of encryption and decryption without rely on ZK.

Learn more

Build 2FA for zkRollups

To hedge the bugs in ZK implementation, TEE can be used as a 2-factor verifier to zk-Rollups. Inspired by Vitalik Buterin's presentation and a recent post by Justin Drake.

Learn more

Start Building with Phala TEE Multi-Proof SDK

Simplify Task Execution and TEE-Proof Generation with the Multi-Proof JS SDK!

Latest Developments

Phala Network and Vana Network Join Forces to Usher in New Era for Decentralized Data Privacy

Phala Network and Vana Network Join Forces to Usher in New Era for Decentralized Data Privacy

NeurochainAI Partners with Phala Network to Revolutionize Trustless Computing and GPU Access

NeurochainAI Partners with Phala Network to Revolutionize Trustless Computing and GPU Access

aICO - A Path to Unruggable Money

aICO - A Path to Unruggable Money

Docs

Discover how Phala's AI Agent Contract offers the essential tools to develop and profit from intelligent applications.

Explore Now