Technical Details

Architecture Diagram

+-------------------------------+
|         User / dApp           |
+-------------------------------+
                |
                | (1) Input Task
                v
+----------------------------------------------+
|           TEE-Backed Nada Agent              |
|----------------------------------------------|
|  Confidential Runtime:                        |
|  - Agent logic                                |
|  - Private models (LLMs, ML, rules)           |
|  - Secure key-store                           |
|  - Context tracing + attention proofs         |
|  - Attestation API                            |
+----------------------------------------------+
                |
                | (2) Execution Receipt
                v
+----------------------------------------------+
|              Nada Verifier (SVM Program)     |
|  - Vendor signature checks                    |
|  - Measurement validation                     |
|  - Output signature validation                |
|  - Context proof verification                 |
|  - Replay protection                          |
+----------------------------------------------+
                |
                | (3) Verified State Transition
                v
+------------------------------+
|        SVM Blockchain        |
+------------------------------+

Execution Flow

Step 1 – User Submits a Task

A user or smart contract provides a structured request:

The request is sent directly to the TEE agent—never on-chain.


Step 2 – The Agent Executes in the TEE

Inside the TEE:

  1. The agent loads its verified binary.

  2. The enclave measures itself (computes SHA-256 hash of binary).

  3. The enclave loads private weights, tools, state.

  4. The input is processed with full confidentiality.

  5. The agent generates:

    • output

    • output hash

    • context provenance proofs

    • optional attention-check proofs

    • signature by enclave-bound key


Enclave-Bound Keys

Inside each agent enclave:

  • A private key is generated:

  • It never leaves the enclave.

  • The corresponding public key is included in the attestation.

This binds:

  • the agent identity

  • the execution environment

  • the measurement

together cryptographically.


Context Provenance & Merkleization

To prove what context/model inputs the agent used, the agent SDK:

  1. Hashes each context chunk.

  2. Constructs a Merkle tree.

  3. Uses Merkle proofs to show which items were used during inference.

This prevents:

  • hallucinations

  • unauthorized context injection

  • tampering or replacement

Example:


Execution Receipt Format

The TEE returns a self-contained, verifiable proof called the Execution Receipt:


Example: Agent Execution Pseudocode


Step 3 – On-Chain Verification

The SVM program calls the Nada verification library:

This runs:

  • Vendor signature validation

  • Measurement (binary hash) validation

  • Output signature verification

  • Context-proof validation

  • Replay prevention

If and only if all checks succeed:

The result is accepted as authenticated and originating from a genuine TEE running trusted code.


Security Guarantees

Confidentiality

Only the enclave sees the input, code, intermediate state.

Integrity

The result is authenticated by enclave-bound keys.

Execution Authenticity

Measurement + attestation prove exactly what code ran.

Verifiability

SVM programs can trust results without seeing raw data.

Last updated