WebsiteDiscordGithubSecret University
Search…
⌃K
Links
🤫
Overview, Ecosystem and Technology
Introduction
Secret Network Overview
Ecosystem Overview
Secret Network Techstack
Consensus For Secret Transactions
Steps Of A Private Transaction - Overview
Blockchain Technology
Privacy Technology
Encryption - Key Management
Trusted Execution Environments  (TEE) —  Intel SGX
Access Control
Design of private smart contracts
Plans Beyond SGX
Potential Attacks
💻
Development
Getting Started
Secret Contracts Overview
Secret Contracts By Example
Connecting to the Network
Tools & Libraries
dApp ideas / usecases
SNIP - reference contracts
Versioning & Changelog
🔧
Infrastructure
Node Runners
Upgrade Instructions
Changelog
Postmortems
Contribute to the documentation
Powered By GitBook

Plans Beyond SGX

Please refer to the Secret 2.0 / Cryptography section in the roadmap to learn more about the long-term secure computation plans for Secret Network.
You can also read about the vision of Guy Zyskind on Secure computation in our serie called #BeyondZK.
Previous
Input data verification
Next
Potential Attacks
Last modified 1mo ago
Export as PDF
Copy link
Edit on GitHub