คลังคำศัพท์

Confidential Computing

Moderate

At its core, it's a technology that enables data to remain encrypted and protected even while being actively used for calculations and analysis.

What Is Confidential Computing?

Confidential computing represents an important shift in how sensitive data can be processed in modern computing environments. At its core, it's a technology that enables data to remain encrypted and protected even while being actively used for calculations and analysis. Unlike traditional encryption methods that only protect data when it's stored or in transit, confidential computing maintains security throughout the entire data lifecycle, including during processing.

How Does It Work?

The technology works through specialized hardware components called Trusted Execution Environments (TEEs), which create isolated regions within a computer's processor. Think of these as secure vaults within the CPU itself, completely separated from the rest of the system - including the operating system and other applications. When data enters these protected regions, it's decrypted only within this secure enclave, allowing computations to occur while ensuring the data remains invisible to anyone or anything outside the TEE. This hardware-based isolation is backed by cryptographic keys embedded directly into the processor during manufacturing, establishing what's known as a "hardware root of trust" that prevents the TEE from being compromised by software-based attacks.

Who Is Adopting It?

Major technology companies are increasingly adopting confidential computing as data privacy concerns grow. NVIDIA now includes TEEs as standard in their latest H100 GPUs, recognizing the critical need for secure processing in artificial intelligence and machine learning applications. Google has implemented TEEs in its advertising infrastructure to enhance privacy in ad targeting and measurement, allowing it to process sensitive user data while maintaining confidentiality. 

Applications in Blockchain/Web3

In the blockchain space, confidential computing is opening up new possibilities for privacy-preserving applications. Traditional public blockchains face a fundamental challenge: all transaction data and smart contract operations are visible to everyone, making them unsuitable for applications that need to handle sensitive information. Confidential computing helps bridge this gap by enabling "confidential smart contracts" - programs that can process private data while still maintaining the trust and transparency benefits of blockchain technology.

Several blockchain platforms have integrated confidential computing into their core architecture to enable private smart contract execution. This makes possible use cases that were previously impractical on public chains, such as private lending protocols that can evaluate creditworthiness without revealing personal financial information, or gaming applications that can keep certain game states hidden from other players.

Beyond gaming and finance, confidential computing in blockchain enables secure cross-chain communication, private oracle computations, and scalable off-chain processing. It allows sensitive computations to occur outside the main blockchain while maintaining security guarantees, effectively addressing both privacy and scalability challenges that have historically limited blockchain adoption.

AI and Confidential Computing

The intersection of AI and confidential computing opens up new possibilities for privacy-preserving machine learning. One key application is protecting AI models themselves - preventing unauthorized access to proprietary algorithms while still allowing them to process data and return results. This is particularly important as AI models become valuable intellectual property.

The technology also enables "private inference," where users can interact with AI models without exposing their input data. For example, a medical diagnosis AI could analyze patient data within a TEE, providing results while keeping sensitive health information encrypted and secure. Similarly, AI trading agents can make decisions based on private market data without exposing their strategies or the data they're analyzing.

Another emerging use case is the creation of decentralized AI agents with private "thoughts." These agents can maintain encrypted internal states while interacting with public blockchain networks, enabling more sophisticated decision-making processes without compromising security. This approach could revolutionize how autonomous systems operate in decentralized environments.

How Does Confidential Computing Compare to Zero-Knowledge Proofs?

In web3, zero-knowledge proofs have become a popular way to achieve privacy and confidentiality. However, TEEs and ZK proofs approach privacy in fundamentally different ways. While TEEs create secure hardware environments where private computations can occur, ZK proofs use pure mathematics to prove something is true without revealing the underlying information.

These differences lead to distinct trade-offs. TEEs generally perform better for complex computations and can handle a wider range of operations, making them more flexible for general-purpose applications. They can also process large amounts of data in real time. In contrast, ZK proofs often require specific circuits to be designed for each use case and can be computationally expensive to generate, though verification is typically fast.

The trust models also differ significantly. TEEs require trust in hardware manufacturers and the integrity of the physical components. ZK proofs rely solely on mathematical principles and don't require trust in any third party. However, this mathematical purity comes at the cost of complexity - scaling ZK proofs for multi-party scenarios can be challenging, while TEEs can handle multiple users and applications concurrently with relative ease.



Marko Stokic, Head of AI at Oasis Protocol Foundation

Marko Stokic is the Head of AI at the Oasis Protocol Foundation, where works with a team focused on developing cutting-edge AI applications integrated with blockchain technology. With a business background, Marko's interest in crypto was sparked by Bitcoin in 2017 and deepened through his experiences during the 2018 market crash. He pursued a master’s degree and gained expertise in venture capital, concentrating on enterprise AI startups before transitioning to a decentralized identity startup, where he developed privacy-preserving solutions. At Oasis, he merges strategic insight with technical knowledge to advocate for decentralized AI and confidential computing, educating the market on Oasis’ unique capabilities and fostering partnerships that empower developers. As an engaging public speaker, Marko shares insights on the future of AI, privacy, and security at industry events, positioning Oasis as a leader in responsible AI innovation.

About Oasis

Oasis Network is a Layer 1 blockchain platform focused on privacy, scalability, and versatility. It offers the first production-ready confidential EVM (Ethereum Virtual Machine) called Sapphire, enabling privacy-preserving smart contracts and decentralized applications. The network is expanding its focus to include AI applications, positioning itself at the intersection of blockchain, privacy, and artificial intelligence.