Skip to main content
Fig. 2 | EURASIP Journal on Information Security

Fig. 2

From: Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves

Fig. 2

This figure shows the three separate stakeholders in running private algorithms inside enclaves and two approaches to secret code protection. Approach 1: Enclave Developer (ED) works with the Algorithm Owner (AO) to protect the code within a secret part of the enclave. This requires the AO to perform early operations on the private algorithm before release. Approach 2: The ED works with the Hardware Owner (HO) to develop a publicly known interpreter enclave. This does not require the AO to perform early operations on the private algorithm

Back to article page