Skip to main content

Table 2 Two approaches on secret-code execution through SGX enclaves

From: Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves

  Approach 1 Approach 2
Responsible for secrecy Algorithm Owner Hardware Owner
Secrecy ensured Before sending the code After receiving the code
Development type Enclave-aware coding Enclave-independent code
TCB/threat analysis In Section 6 In Section 4
Enclave developer The Private Algorithm must be developed for Enclave The Enclave must be made for Private Algorithm