Approach 1 | Approach 2 | |
---|---|---|
Responsible for secrecy | Algorithm Owner | Hardware Owner |
Secrecy ensured | Before sending the code | After receiving the code |
Development type | Enclave-aware coding | Enclave-independent code |
TCB/threat analysis | In Section 6 | In Section 4 |
Enclave developer | The Private Algorithm must be developed for Enclave | The Enclave must be made for Private Algorithm |