01_
TEE Computing
Environment
TEE (Trust Execution Environment) is a special hardware component isolated from the rest of the system. With independent registers, cache and encrypted memory area, its operation is completely independent of the operating system, virtual machine monitor (VMM) , BIOS and other core components. Separate TEE has limited functionalities, but Phala combines TEE and blockchain to complement the advantages of TEE and blockchain to form a secure and efficient distributed computing cloud.
02_
Full lifetime
trusted
communication
We have completed the construction of the TEE network through the full-lifetime trusted communication between “TEE - Blockchain - User”. All the TEE workers are registered on the blockchain and verified by the remote attestation protocol. The built-in GRANDPA light client in the TEE secures the communication between the blockchain and the TEE. Finally, the communication between the user and the TEE is end-to-en encryped with the Diffie-Hellman algorithm.
03_
Separation
of consensus and
computation
Phala adopts a distributed computing architecture that separates computation and consensus. Thanks to the flexibility of the TEE network, Phala achieves highly scalable confidential cloud computing.
Phala’s adopts the NPoS consensus consistent with Polkadot. The NPoS (Nominated Proof of Stake) consensus algorithm is used to elect the validator set that can make the system safer and more efficient. The Phragmén algorithm prevents any group from being over-representative or under-representative.
Phala’s computation layer adopts permissionless node registration, staking economics and random scheduling. Computation tasks are randomly dispatched to the TEEs around the world. The design of confidential contracts guarantees data availability.
04_
Composability
of blockchains
and contracts
Phala is built on Substrate. Therefore it's naturally interoperabile with Polkadot ecosystem. We plan to become a Polkadot parachain, which can serve the entire Polkadot parachain ecosystem, as well as other blockchain developers.
The highlight of Phala Network's heterogeneous architecture is that Phala confidential contracts are designed with interoperability in our mind. It's based on XCMP to achieve interoperability and composability between contract and blockchains.
05_
Applications
and use cases
06_
Your first
confidential
contract
In this tutorial, we will help you set up a "Hello World" development environment. You will deploy the complete core blockchain stack and connect the Web UI to the blockchain. At the end of this tutorial, you will be able to:
- Send a confidential transaction
- Get a ready-to-hack version of Phala Network to build your own confidential contract Dapp
Technology