PRV

Privacy Tech: TEE, FHE & MPC

Comparing approaches to confidential computation on blockchain

12 min read
Technical Concept
Intermediate

The Privacy Problem in Blockchain

Public blockchains are transparent by design—every transaction is visible to everyone. While great for trustlessness, this creates real problems:

  • Front-running — Bots see your trades and extract value
  • Competitive intelligence — Rivals can track your on-chain activity
  • Compliance barriers — Enterprises can't expose sensitive data
  • User privacy — Your entire financial history is public

This is where confidential computing comes in—technologies that enable computation on private data while keeping that data hidden.

Key Distinction

Privacy tech focuses on hiding data during computation, not just encrypting it at rest. The goal: perform useful operations on encrypted data without ever decrypting it.

The Three Main Approaches

Three technologies dominate confidential computing for blockchain. Each takes a fundamentally different approach:

TEE

Trusted Execution Environments

Hardware-based isolation. Uses specialized CPU features (Intel SGX, ARM TrustZone) to create secure "enclaves" where data is processed.

FHE

Fully Homomorphic Encryption

Cryptographic approach. Performs computations directly on encrypted data. Results decrypt to the correct answer without ever exposing plaintext.

MPC

Multi-Party Computation

Distributed approach. Splits secrets across multiple parties who jointly compute results. No single party ever sees the complete data.

TEE: Trusted Execution Environments

TEEs create isolated "enclaves" within the CPU where sensitive code and data are protected from the rest of the system—including the operating system, hypervisor, and other applications.

How TEEs Work

  1. Encrypted code and data loaded into isolated memory
  2. CPU executes within the enclave using special instructions
  3. Memory access controls prevent external reads
  4. Attestation proves code is running unmodified in genuine hardware

TEE Implementations

  • Intel SGX — Most common, but facing vulnerabilities
  • AMD SEV — VM-level isolation
  • ARM TrustZone — Mobile-focused
  • AWS Nitro Enclaves — Cloud-native option

Strengths

  • Fast execution (hardware-native)
  • Already deployed in production
  • Works for complex computations
  • Attestation provides proof of execution

Weaknesses

  • Trusts hardware manufacturers
  • Vulnerable to side-channel attacks
  • Not quantum-resistant
  • Physical access can compromise
Known Vulnerabilities

Recent attacks like WireTap and Battering RAM have demonstrated that physical access to hardware can extract SGX attestation keys. A16z's security guidance: "No existing TEE design can fully defend against a sophisticated attacker with physical access."

Blockchain Applications

  • Dark pools — Hidden order books for private trading
  • MEV protection — Block builders that hide transaction details
  • Confidential AI — Running models on private data
  • Key management — Secure custody solutions

FHE: Fully Homomorphic Encryption

FHE is often called the "holy grail" of encryption. It enables computations directly on encrypted data, producing encrypted results that decrypt to the correct answer.

How FHE Works

  1. Data is encrypted with FHE scheme (lattice-based cryptography)
  2. Computations performed on ciphertext (addition, multiplication)
  3. Results remain encrypted throughout
  4. Only the key holder can decrypt the final result
Example

Alice encrypts her salary as E(100k). Bob runs a computation E(100k) + E(50k bonus) = E(150k total). Bob never sees the actual numbers—only encrypted values—but Alice can decrypt to get her correct total.

Strengths

  • No hardware trust required
  • Immune to side-channel attacks
  • Quantum-resistant (lattice-based)
  • Data never decrypted during processing

Weaknesses

  • Computationally expensive (10-1000x slower)
  • Large ciphertext expansion
  • Complex to implement correctly
  • Limited practical deployments today

FHE Progress

FHE was long considered impractical, but recent advances are changing this:

  • GPU/FPGA acceleration reducing compute overhead
  • New schemes (TFHE, CKKS) more efficient for specific operations
  • Hybrid approaches combining FHE with TEE for performance

Research shows FH-TEE (combining both) can be 10x faster than pure FHE while maintaining stronger security guarantees.

MPC: Multi-Party Computation

MPC distributes computation across multiple parties so that no single party ever sees the complete data. Each party holds a "share" of the secret and collaborates to compute results.

How MPC Works

  1. Secret is split into shares (e.g., using Shamir's Secret Sharing)
  2. Each party holds one share—useless alone
  3. Parties interact through cryptographic protocols
  4. Final result reconstructed only when needed

Strengths

  • No single point of failure
  • No hardware trust required
  • Threshold security (k-of-n schemes)
  • Already deployed in production (wallets)

Weaknesses

  • High communication overhead
  • Collusion risk if parties cooperate
  • Latency from multi-party interaction
  • Complex coordination requirements

MPC Applications

  • MPC Wallets — Fireblocks, ZenGo split keys across parties. No single device holds the full private key.
  • Threshold signatures — k-of-n signing schemes for institutional custody
  • Private auctions — Bid without revealing your price
  • Cross-chain bridges — Distributed key management

Head-to-Head Comparison

Factor TEE FHE MPC
Speed Fast (hardware) Slow (10-1000x) Medium (coordination)
Trust Model Hardware vendor Cryptography only Distributed parties
Quantum Safe No Yes (lattice-based) Depends on primitives
Side-Channel Risk High None Low
Maturity Production ready Early production Production ready
Best For Performance-critical apps Maximum security Distributed trust
Key Insight

The future is likely hybrid. Projects are combining approaches: TEE for performance-critical operations, FHE for the most sensitive data, and MPC for distributed key management. Each technology addresses different threat models.

How Does ZK Fit In?

Zero-Knowledge Proofs (ZKPs) are often mentioned alongside privacy tech, but they serve a different purpose:

Technology Purpose Example Use
ZK Proofs Prove something is true without revealing why "I'm over 18" without showing ID
TEE/FHE/MPC Compute on private data Calculate average salary without revealing individual salaries

ZK proves statements; TEE/FHE/MPC enables private computation. They're often combined—MPC can use ZK proofs for verification, and FHE results can be proven correct with ZK.

ZK Limitation

ZK proofs often require a "trusted setup" where parties must trust each other to generate initial parameters. Some newer ZK systems (like STARKs) avoid this, but it remains a consideration.

Privacy Pools & Regulatory Precedent

The intersection of blockchain privacy and regulation came to a head with the Tornado Cash sanctions — a watershed moment that reshaped how the industry thinks about privacy.

Tornado Cash: The OFAC Precedent

In August 2022, the U.S. Treasury's Office of Foreign Assets Control (OFAC) sanctioned Tornado Cash, a non-custodial Ethereum mixer. This marked the first time a government sanctioned open-source smart contract code rather than a person or organization. Key consequences:

  • USDC blacklisting — Circle froze ~$75K in USDC held in Tornado Cash addresses
  • Developer arrest — Tornado Cash developer Alexey Pertsev was arrested in the Netherlands and convicted under anti-money laundering laws
  • RPC censorship — Infura and Alchemy began blocking transactions to Tornado Cash contracts
  • GitHub removal — Tornado Cash repositories were initially removed from GitHub

The sanctions forced the industry to confront a fundamental question: can privacy and regulatory compliance coexist on public blockchains?

Privacy Pools: The Compliant Privacy Model

Vitalik Buterin, along with researchers, proposed Privacy Pools as a potential solution. The concept uses zero-knowledge proofs to create privacy with selective disclosure:

  1. Users deposit funds into a privacy pool (like a mixer)
  2. When withdrawing, users generate a ZK proof showing their deposit is in an association set — a set of "clean" deposits
  3. The proof demonstrates the funds did not come from a sanctioned or illicit source, without revealing which specific deposit is theirs
  4. Compliance is achieved without sacrificing individual privacy
Key Innovation

Privacy Pools separate the privacy guarantee (hiding which deposit is yours) from the compliance guarantee (proving your deposit is not illicit). This allows regulators to verify compliance without breaking individual privacy — a fundamental improvement over both full transparency and full anonymity models.

Privacy-Preserving Blockchain Projects

Project Approach Status
Aztec Network ZK-rollup with encrypted state — private by default, selective disclosure to regulators Testnet (Aztec Sandbox); mainnet expected 2026
Penumbra Private Cosmos chain using shielded transactions with IBC bridge support Mainnet launched 2024
Namada Multi-chain shielded pool supporting assets from any connected chain Mainnet launched 2024
Railgun On-chain privacy using ZK-SNARKs with Proof of Innocence (privacy pools implementation) Live on Ethereum, Polygon, Arbitrum
Regulatory Risk

Privacy technology remains in a regulatory gray zone. The Tornado Cash precedent shows governments are willing to sanction privacy tools. Projects like Aztec and Railgun that build compliance mechanisms into their privacy layers may face less regulatory risk, but the legal landscape is still evolving rapidly.

Investment Implications

Privacy tech is becoming critical infrastructure. Key trends for investors:

Growing Enterprise Demand

Enterprises need privacy for blockchain adoption. Financial institutions can't expose trade data. Healthcare can't put patient data on-chain without privacy guarantees. This creates real demand for production-ready solutions.

Infrastructure Plays

  • FHE-focused chains (Fhenix, Inco Network) building privacy-first infrastructure
  • MPC wallet providers (Fireblocks, ZenGo) already capturing institutional custody
  • TEE infrastructure (Secret Network, Oasis) live in production

Convergence with AI

AI on private data is a massive use case. Training models on sensitive data (healthcare, finance) without exposing it. FHE and TEE are essential for "confidential AI" which is emerging as a major narrative.

Regulatory Tailwinds

Privacy regulations (GDPR, etc.) push enterprises toward privacy-preserving solutions. Blockchain privacy tech that maintains compliance while enabling on-chain activity has strong product-market fit.

Key Takeaways

  1. TEEs provide fast, hardware-based privacy but require trusting chip manufacturers and have known side-channel vulnerabilities. Best for performance-critical applications with moderate trust requirements.
  2. FHE is the "holy grail"—pure cryptographic privacy with quantum resistance—but remains computationally expensive. Improving rapidly with new optimizations.
  3. MPC distributes trust across parties, eliminating single points of failure. Already production-ready for wallets and custody, but has coordination overhead.
  4. Hybrid approaches combine strengths. TEE + FHE can be 10x faster than pure FHE while maintaining stronger guarantees.
  5. ZK proves; TEE/FHE/MPC computes. They solve different problems but are often combined.
  6. Enterprise adoption is driving demand. Privacy-preserving computation is becoming essential infrastructure for institutional blockchain use.
Disclaimer: This is educational content about privacy technologies, not security advice or investment recommendation. Cryptographic implementations are complex and evolving. Consult specialists for production deployments.