TEE (Trust Execution Environment) is a special hardware component isolated from the rest of the system. With independent registers, cache and encrypted memory area, its operation is completely independent of the operating system, virtual machine monitor (VMM) , BIOS and other core components. Separate TEE has limited functionalities, but Phala combines TEE and blockchain to complement the advantages of TEE and blockchain to form a secure and efficient distributed computing cloud.
We have completed the construction of the TEE network through the full-lifetime trusted communication between “TEE - Blockchain - User”. All the TEE workers are registed on the blockchain with verified by the remote attestation protocol. The built-in GRANDPA light client in the TEE secures the communication between the blockchain and the TEE. Finally, the communication between the user and the TEE is end-to-en encryped with the Diffie-Hellman algorithm.
of consensus and
Phala adopts a distributed computing architecture that separates computation and consensus. Thanks to the flexibility of the TEE network, Phala achieves grate scalability that is capable for confidential cloud computing.
Phala’s adopts the NPoS consensus consistent with Polkadot. The NPoS (Nominated Proof of Stake) consensus algorithm is used to elect the validator set that can make the system safer and more efficient. The Phragmén algorithm prevents any group from being over-representative or under-representative.
Phala’s computation layer adopts permissionless node registration, staking economics and random scheduling. Computation tasks are be randomly dispatched to the TEE around the world. The design of confidential contract guarantees the data availability.
Phala is built on Substrate. Therefore it's naturally interoperabile with Polkadot ecosystem. We plans to become a Polkadot parachain, which can serve the entire Polkadot parachain ecosystem, as well as other blockchain developers.
The highlight of Phala Network's heterogeneous architecture is that Phala confidential contracts are designed with interoperability in our mind. It's based on XCMP to achieve interoperability and composability between contract and blockchains.
and use cases
Confidential DeFi and Dapps
Cross-chain Confidentiality Layer
Trustless Privacy Data Computation and Exchange
Artificial Intelligence & Healthcare
Joint Risk Control
In this tutorial, we will help you set up a "Hello World" development environment. You will deploy the complete core blockchain stack and connect the Web UI to the blockchain. At the end of this tutorial, you will be able to:
- Send a confidential transaction
- Get a ready-to-hack version of Phala Network to build your own confidential contract Dapp