LeverFi
  • About LeverFi
    • LEVER Utility
  • OmniZK
    • OmniGPT
    • Discreet Log Contracts
    • zkOracles
    • Trusted Execution Environment
    • L0 Endpoints Integration
    • OmniRelayers
    • Application Use Cases
    • OmniZK SDK
    • Staking and Delegation Programs
  • LeverTrade
    • Trade-and-Earn
    • User Guides
      • Traders - Deposit and Trade
      • Lenders - Lend and Earn
      • Trade Account Settlement
    • Components
      • Collateral Manager
      • Trading Manager
      • Lending Manager
      • Risk Manager
    • Protocol Parameters
      • Supported Collateral List
      • Tradable Assets List
      • Lending Pools List
    • Product FAQ
    • Technical Docs
      • Contracts
      • Audits
      • Bug Bounty
    • Risk Warnings
  • LeverPro
    • Staking and Participation Rules
    • Initial Inscription Offerings (IIOs)
    • Initial Dex Offerings (IDOs)
    • Risk Warnings
  • Social Channels
Powered by GitBook
On this page
  1. OmniZK

Trusted Execution Environment

PreviouszkOraclesNextL0 Endpoints Integration

Last updated 1 year ago

Proof verification, CETs creation, DLC signature computations and transaction signing are secured and processed on Intel SGX, which provides a Trusted Execution Environment (TEE) within a private enclave.

(SGX) is a code set that allows a system to operate in "enclaves", which are private regions of memory where contents are encrypted and unreadable outside of any process or entity outside of the enclave itself.

Data and code originating in the enclave are decrypted on the fly within the CPU, protecting them from being examined or read by other code, including code running at higher privilege levels such as the operating system and any underlying hypervisors.

OmniRelayers are required to perform remote attestation to establish that their enclaves are running the correct code which has not been tampered with to ensure the integrity of proof generation, proof verification and contract signing.

Private keys are generated and stored within the SGX, which are not accessible to operators.

Intel Software Guard Extensions