Blockchain Confidentiality by Trusted Computing
Phala.Network offers Turing-Complete confidential smart contract for any blockchain. It guarantees the reliable execution of smart contracts while keeping the data secretly.
Confidential contracts run in miner nodes with Trusted Computing capable hardware, which guarantees the secrecy of the contract data.
Cryptographic evidences are generated as the execution of the confidential contract for participants to validate.
Keep the world safe
In Phala.Network Gatekeepers are nodes that keep the security of the network like the Guardian of the Oracle in The Matrix. Since the contract data is encrypted, Gatekeepers are responsible to keep online and manage the secrets involved in the system.
Blockchains can connect to Phala.Network by a bridging channel. Phala aims to become a cross-chain interoperable trusted computing platform.
Anyone with trusted computing capable hardware (e.g. Intel® 6th-Gen or newer CPUs) can provide computing resources to Phala.Network by becoming a miner.
Miners earn money by providing computing resources like could computing. Phala.Network is energy efficient and green because no resource is wasted.
Phala.Network can be used in any CONFIDENTIAL and TRUSTLESS scenario
Privacy-preserving layer for Libra
Bring confidentiality capability to any blockchain
Hardware Level Isolation
The hardware enclave is the key of confidentiality and the integrity. In Phala.Network, trusted computing capable CPUs provide the low level isolation that can even resists OS and hardware level attacks. Users can only interact with confidential contracts in authorized ways. Hackers can't read or write the protected contract data in any way.
Phala.Network will support multiple TEEs including Intel SGX, AMD SEV, and ARM TrustZone.
Publicly Verifiable Execution
With Remote Attestation protocol, users can verify that all the transactions are executed in a trusted environment securely. In Phala.Network, all the execution can be traced to a set of cryptographic evidences. The evidences are produced and signed by the trusted computing protocol (e.g. Intel SGX) and available on the blockchain for users to verify.
Dates are subject to changes as the launch schedule of Polkadot
We are people from Google, Tencent, Didi and DJI.
Phala.Network © Copyright 2019