Confidential Computation with TEE

Build on World's largest Trusted Execution Environment (TEE) network

Our state-of-the-art open GPU TEE infrastructure empowers developers to build secure, confidential, and decentralized applications in both AI and blockchain.

Read Docs

Contact Us

Online Workers
0
Online Workers
Compute
0 vCPU
Compute
Cross-Chain TX
0
Cross-Chain TX
TX
0
TX

Current Limitations of Computation in Web3

Limitations of single ZKP-based proving system

ZK can not guarantee privacy in public state sharing scenario, the rollup sequencer can see all data even if they prove the computation done correctly.

Limitations of single FHE-based proving system

FHE cannot prove that the computations performed as expected, also the decryption integrity can not guaranteed by the companioned MPC.

The Need for TEE

What is TEE?

Trusted Execution Environments (TEE) create secure enclaves for processing sensitive data, allowing applications to execute securely in an isolated environment, without trust the privileged software, such as hypervisors or host operating systems.

Data Sharing

Phala TEE supports confidential data exchange use cases, such as MEV (Maximal Extractable Value), blockchain games, and AI model training.

Availability

With 35,000 TEE workers, Phala’s Phat Contract is programmable to meet the needs of various blockchain projects, ensuring robust availability.

Trust of Multiple Parties

Phala TEE ensures your application, project, or blockchain use case remains operational and free from legislative risks, maintaining trust across multiple parties.

Out-of-Box SDK

Our SDKs for Rust and JavaScript enable developers to launch their applications on our TEE network quickly, often within hours.

Use causes for utilizing TEE to bring full privacy and security

Practical Real-world Applications of TEE

Build Confidential dAGI

  • Run AI Models Inside TEE
  • RedPill by Phala Network runs AI models securely in a TEE, ensuring data privacy and integrity.

Learn more

Build Secure Web3 Consumer Apps

  • Gaming: Use Phala TEE for secure, confidential blockchain games, protecting player data and in-game assets from unauthorized access.
  • Social Apps: Develop social apps with Phala TEE to ensure user privacy and secure data exchanges, keeping interactions private.
  • MEV DeFi: Integrate Phala TEE in DeFi apps to safeguard against MEV exploits, ensuring secure and transparent financial transactions.

Build Coprocessor for FHE

TEE can eliminate the collusion risk exist in MPC network, and prove the validity of encryption and decryption without rely on ZK.

Learn more

Build 2FA for zkRollups

To hedge the bugs in ZK implementation, TEE can be used as a 2-factor verifier to zk-Rollups. Inspired by Vitalik Buterin's presentation and a recent post by Justin Drake.

Learn more

Start Building with Phala TEE Multi-Proof SDK

Simplify Task Execution and TEE-Proof Generation with the Multi-Proof JS SDK!

Latest Developments

Confidential Computing on Nvidia H100 GPU: A Performance Benchmark Study

Confidential Computing on Nvidia H100 GPU: A Performance Benchmark Study

Phala’s Defense in Depth Solution with TEE

Phala’s Defense in Depth Solution with TEE

Verifying TEE Onchain with RiscZero zkVM

Verifying TEE Onchain with RiscZero zkVM

Docs

Discover how Phala's AI Agent Contract offers the essential tools to develop and profit from intelligent applications.

Explore Now