TEE with FHE and MPC
Introduction
Fully Homomorphic Encryption (FHE) and Multi-Party Computation (MPC) are foundational technologies for privacy-preserving computation, enabling operations on encrypted data without decryption. However, their adoption in real-world systems, particularly blockchain and decentralized networks, faces challenges such as computational overhead, key management risks, and trust assumptions. This chapter explores how Phala Network's TEE can act as a 2FA mechanism to enhance the security and practicality of FHE/MPC workflows.
Check out earlier thoughts on SGX as 2FA for FHE/MPC and Drawbacks in FHE Blockchain and how TEE can help
Challenges in FHE/MPC Systems
Key Management Risks
Secure key generation, storage, and usage are critical vulnerabilities
Key compromise threatens data confidentiality and computation integrity
Software-based solutions remain susceptible to memory attacks and insider threats
Performance Limitations
FHE introduces significant computational overhead, impractical for time-sensitive applications
MPC reduces individual computation but increases network communication and coordination costs
Both technologies face scalability challenges in high-throughput environments
Trust Vulnerabilities
Systems rely on honest-majority assumptions that weaken with participant count
Collusion attacks become feasible when economic incentives align for malicious actors
Lack of accountability mechanisms when malicious behavior occurs
Threshold schemes vulnerable to withholding attacks that prevent result finalization
TEE as a 2FA Mechanism: Architectural Overview
TEEs provide hardware-enforced isolation for sensitive operations, combining the benefits of secure enclaves (e.g., Intel TDX) with cryptographic protocols. When integrated with FHE/MPC, TEEs act as a secondary trust layer, ensuring:
Secure Key Generation/Storage: Cryptographic keys are generated and stored within the TEE, isolated from the host OS or untrusted applications.
Computation Integrity: Critical operations (e.g., decryption of FHE results or MPC coordination) are verified within the TEE.
Attestation: Remote parties can cryptographically verify that computations were executed in a genuine TEE.
Workflow Example
MPC nodes build a docker image and deploy it to Phala Cloud, see the tutorial.
A master key is generated inside an TEE and never exposed externally.
The MPC node signs a public verification key, which is shared with the network.
The MPC node generate a attestation proof that prove the key generation and storage are done in a genuine TEE.
For FHE Computation:
Users encrypt data using FHE and send to FHE server.
FHE finished the computation and encrypt the result with the MPC key.
The MPC nodes in TEE decrypting intermediate results and return the result to users.
Case Studies
Last updated
Was this helpful?