Introducing Bluwhale
  • Introducing Bluwhale
  • Architecture
    • Overview
    • ERC-7231
    • Data Authentication
    • Bluwhale Link
    • Data Provider
    • Third-party Verification
    • On-chain Attestation
    • Trusted Execution Environment Cluster
    • About Trusted Execution Environments
    • Zero-Knowledge Proof
  • Verifier Nodes
    • Verifier Node Sale
    • Purpose of Verifier Nodes
    • Verifier Node Operations & App
    • Node Rewards & Projections
    • Node Licenses
    • Node Delegration
    • Node FAQs
  • Tokenomics
    • Utility
    • Distribution/Vesting
    • Staking
  • Bluwhale Community
    • Community Activations
    • Social & Community Links
    • Distributor & Referral Programs
    • Media Coverage
  • Resources
  • General FAQs
  • Brand Guidelines
  • Media Kit
  • Contact Us
  • Personalization Protocol
    • Overview
    • Architecture
      • Overview
      • Identity Layer
      • Data Storage Layer
      • Computation & Training Layer
      • Execution Layer
      • Verification Layer
  • How to Purchase Nodes
    • How to Purchase Nodes on Solana
  • Buyback Program
  • Why Verifier Nodes
  • How do Verifier Nodes Work
  • Bluwhale NFT License
  • Bluwhale Protocol Service
  • Trusted Execution Environment (TEE)
  • Verifier Node
  • Attestation
  • Delegation
  • SGX Attestation Verification
  • Verifier Node Sale Dynamics
  • Smart Contract Addresses
  • License Key (NFT)
  • Delegation
  • Node Rewards
  • Join Alphanet Verifier Nodes
  • Prerequisites
  • Delegation Tutorial
  • Operating a Verifier Node
  • Running in VPS
  • Running in CLI
  • Running in Desktop App
  • Explorer
Powered by GitBook
On this page
  1. Architecture

On-chain Attestation

PreviousThird-party VerificationNextTrusted Execution Environment Cluster

Last updated 10 months ago

Note: On-chain attestation is different from TEE attestation.

On-chain attestation can be produced via Zero-Knowledge proofs or other attestation services, providing another layer of validation.

Privacy Inference Module

Computation is built on top of the Trusted Execution Environments / TEEs (e.g. Intel SGX). It ensures the user data is processed in privacy-enhancing technologies. With a combination of remote proof, identity authentication, session key exchange and data encryption, users can be guaranteed that the execution environment is expected. Then, a TEE node can process user's data and produce the TEE attestation, which can be verified by the verification layer to make sure the execution result posted on-chain is computed in the same trusted environment where users have submitted their data.

Bluwhale Protocol - Computation & Training Layer