Attestation Mechanism
How Nada Chains Verify Hardware, Code Identity, and Agent Authenticity
Purpose of Attestation
Attestation is the process by which a TEE proves to an external verifier that:
It is running on genuine hardware.
It is executing a specific, unmodified binary.
It has generated an enclave-bound public key.
It is isolated and protected from tampering.
The output originates from that enclave.
Nada extends traditional TEE attestation into a blockchain-verifiable attestation format suitable for SVM programs.
High-Level Flow
+------------------------+ +----------------------------+
| Trusted Hardware | ---> | Vendor Signing Authority |
| (SGX / SEV / Nitro) | | (Intel / AMD / AWS) |
+------------------------+ +----------------------------+
| ^
| (1) Measurement Report |
v |
+----------------------------+ |
| Nada Agent Runtime (TEE) | |
+----------------------------+ |
| (2) Attestation Quote |
v |
+----------------------------+ |
| User / SVM Program | <------------+
+----------------------------+
(3) VerificationComponents of an Attestation
A vendor attestation bundle contains:
1. Measurement
A cryptographic hash of the enclave binary:
This defines the code identity.
2. Enclave Public Key
The enclave generates:
Only agent_pk is included in the attestation.
This binds:
the execution environment
the measurement
the agent identity
together.
3. Hardware Report
Vendor-specific:
SGX: REPORT + QE report
SEV-SNP: attestation report + platform certificate
Nitro: attestation document (JSON + signature)
Example (Nitro-like):
4. Vendor Signature
The vendor signs the attestation using their hardware root-of-trust:
Nada Attestation Format
Nada wraps the vendor data into:
This allows a Solana/SVM program to verify everything inside BPF constraints.
Verification Steps (On-chain)
Step 1 — Parse Quote
Extract fields depending on TEE type.
Step 2 — Verify Vendor Signature
Each vendor’s public key is stored in a sysvar or registry account.
Step 3 — Verify Measurement
Compare to approved measurements stored on-chain.
Step 4 — Verify Enclave-Bound Key
Ensure the public key inside attestation matches the signer.
Step 5 — Verify Output Signature
The enclave signed the output hash with its private key.
Step 6 — Replay Protection
Check timestamp or nonce.
Example On-Chain Verification Code
Security Guarantees
Hardware Authenticity The attestation proves execution happened on genuine hardware.
Code Authenticity Measurement ensures the exact binary is known and approved.
Key Authenticity The public key is generated inside the enclave and tied to the measurement.
Result Authenticity The enclave signs results with its private key — impossible to forge.
Data Confidentiality Hardware protects the request and internal agent data.
State Isolation No external process can access enclave memory.
Last updated