2FA zk-rollups using SGX

This point is very interesting, and to expand on it I think a multisig or TSS involving multiple enclave vendors could add an additional layer of security, arguably even 3FA.

Especially combined with this, I imagine it is significantly difficult or at least prohibitively expensive to attack multiple architectures and in the span of a single transaction.

There are attacks which can fake attestations of bad enclaves, so I don’t think key rotation alone would prevent those on a single architecture, but I’m not sure how easy it is to perform such attacks on multiple enclave architectures at once before one patches it.

This seems strictly better than a SNARK alone, especially with

  • enclaves from multiple vendors in a multisig
  • rotating keys every transaction
1 Like

I think in general for any use cases that focuses on integrity more than confidentiality, then the more alternate implementations, the better, because each implementation provides an additional check. N-of-N comprises are needed basically.

However, if only 1-of-N compromises are required (say in certain types of designs that focuses on confidentiality) where a single compromise would result in the secret leaking, then more might not be better.

1 Like

This thinking is probably going to be tested in production real soon. Interesting to see what happens!

1 Like

Yep… I do think it will be tested in production reaaaal soon. I’m also interested to see what happens :slight_smile:
BTW. We recently just released our block builder and the associated libraries…

1 Like

ok… “reaaaaal soon” ™ turned out to be 4 months later. XD but its better late then never.
For some weird reason it seems like I can’t add links in the post… but you can find the post on X or our blog @ blog.ata.network

we have also opensourced the implementation of the sgx-prover. again, check out the blogpost for the link.
as for the sgx attestation verification, it is done on-chain.

Excited to talk more about it :slight_smile:

While SGX 2FA can be removed, the question is how easy and practical its implementation is. Can this removal be done without additional security risks or significant complications?

I’m glad to see someone introduce the concept of “enclave” and consider a decentralized SGX to address the challenges.
Where can I see more research and specific plans?
Interested :slightly_smiling_face:

We have registration-based SGX (i.e. we need to manually trust your prover) in Taiko testnet at the moment Katla Testnet (Alpha-6) is now live! — Taiko Labs and we’re working on decentralizing that process.

Ideally we do need support for EIP-7212 / RIP-7212 in mainnet to make this not cost 1~2 million gas: EIP-7212: Precompiled for secp256r1 Curve Support - #76 by mratsim - Core EIPs - Fellowship of Ethereum Magicians

1 Like

How do you address the potential community concerns regarding the reputation of SGX and its perceived weaknesses while promoting its integration as a pragmatic hedge for zk-rollup SNARK vulnerabilities?