Cointegrity

Confidential Computing

Web3 / privacy technology

Confidential computing protects sensitive data even while it's being processed, using hardware-based trusted execution environments (TEEs) or advanced cryptographic techniques to ensure data remains encrypted throughout computation. Unlike traditional security that protects data at rest and in transit, confidential computing encrypts data in use—the moment when it's most vulnerable. This is achieved through secure enclaves (Intel SGX, AMD SEV) or homomorphic encryption, which allow operations on encrypted data without decryption. In blockchain contexts, confidential computing enables private smart contract execution and sensitive computations without exposing intermediate values. Example: Oasis Protocol operates a privacy-preserving blockchain using confidential computing through secure enclaves, allowing developers to build applications where smart contracts and their data remain encrypted during execution, creating private smart contracts impossible on public chains. Why it matters for privacy technology: Confidential computing addresses the "weakest link" in data security—the processing stage. By keeping data encrypted during computation, it enables enterprises and users to leverage blockchain's transparency benefits while protecting sensitive information from being exposed even to operators, validators, or other observers.

Category: privacy technology, infrastructure applications

Explore the full Web3 Glossary — 2,062+ expert-curated definitions. Need guidance? Talk to our consultants.