Shuttle Docs
  • Trusted Execution Environments
    • Confidentiality
    • Execution Integrity
    • Remote Attestation
    • Threat Models
    • Side-Channel Attacks
    • Side-Channel Attack Mitigation
    • Model Types
  • Foreword
    • Shuttle
  • Solution #1
    • Blockchain | Framework Alignment
    • Enarx
    • Web Assembly System Interface(WASI)
  • Solution #2
    • Attestation
      • SGX DCAP
      • Intel Trust Authority
    • Decentralizing Attestation
      • It’s Butterfree!
      • Decentralized Public Key Infrastructure(DPKI)
      • Our Tool: Cryptographic Accumulator
      • Re-attestation
  • Blockchain
    • Reducing Computational Overhead
    • Ekiden
    • Verifier's Dilemma
    • Independent Layers
    • Security of Enclaves & Consensus
    • Non-Byzantine Computation
      • Discrepancy Detection - Good Idea Oasis!
    • Roughtime
  • Avalanche
    • Multi-dimensional Fees
    • Stakeless?
  • Privacy
    • Confidential Blockchain
    • Secret Network Vulnerability - 2022
  • Summary
    • Market Potential
    • Cosmos, Polkadot, Avalanche
Powered by GitBook
On this page
  1. Trusted Execution Environments

Confidentiality

If TEE’s are part of the hardware specification for the nodes of the network they can guarantee those nodes are unable to view computations that occur within the trusted environment - preserving the privacy of the underlying data during the computation.

Confidentiality unlocks a range of new use cases on blockchain by allowing personal or sensitive data, such as a social security number, bank statements or health information to be used by apps.

PreviousTrusted Execution EnvironmentsNextExecution Integrity

Last updated 8 months ago