TEE Computing
TEE (Trust Execution Environment) is a special hardware component isolated from the rest of the system. With independent registers, cache and encrypted memory area, its operation is completely independent of the operating system, virtual machine monitor (VMM) , BIOS and other core components. Separate TEE has limited functionalities, but Phala combines TEE and blockchain to complement the advantages of TEE and blockchain to form a secure and efficient distributed computing cloud.
Full lifetime
We have completed the construction of the TEE network through the full-lifetime trusted communication between “TEE - Blockchain - User”. All the TEE workers are registered on the blockchain and verified by the remote attestation protocol. The built-in GRANDPA light client in the TEE secures the communication between the blockchain and the TEE. Finally, the communication between the user and the TEE is end-to-en encryped with the Diffie-Hellman algorithm.
of consensus and
Phala adopts a distributed computing architecture that separates computation and consensus. Thanks to the flexibility of the TEE network, Phala achieves highly scalable confidential cloud computing.
Phala’s adopts the NPoS consensus consistent with Polkadot. The NPoS (Nominated Proof of Stake) consensus algorithm is used to elect the validator set that can make the system safer and more efficient. The Phragmén algorithm prevents any group from being over-representative or under-representative.
Phala’s computation layer adopts permissionless node registration, staking economics and random scheduling. Computation tasks are randomly dispatched to the TEEs around the world. The design of confidential contracts guarantees data availability.
of blockchains
and contracts
Phala is built on Substrate. Therefore it's naturally interoperabile with Polkadot ecosystem. We plan to become a Polkadot parachain, which can serve the entire Polkadot parachain ecosystem, as well as other blockchain developers.
The highlight of Phala Network's heterogeneous architecture is that Phala confidential contracts are designed with interoperability in our mind. It's based on XCMP to achieve interoperability and composability between contract and blockchains.
and use cases
Confidential DeFi and Dapps
Cross-chain Confidentiality Layer
Trustless Privacy Data Computation and Exchange
Artificial Intelligence & Healthcare
Joint Risk Control
Your first
In this tutorial, we will help you set up a "Hello World" development environment. You will deploy the complete core blockchain stack and connect the Web UI to the blockchain. At the end of this tutorial, you will be able to:

- Send a confidential transaction
- Get a ready-to-hack version of Phala Network to build your own confidential contract Dapp
check tutorial