TEN Protocol

IQ AI를 발표했습니다.

확인해보세요

TEN Protocol

TEN Protocol is a decentralized Layer-2 Rollup protocol designed to add encryption, achieve scalability, and prevent Maximal Extractable Value (MEV) in transactions. It enables developers to build encrypted while maintaining compatibility with the ecosystem. [1] [2]

Overview

TEN Protocol introduces a new type of rollup technology called "Confidential rollups" that combines encryption with the scalability benefits of Layer-2 solutions. The protocol leverages Secure Enclaves, particularly Intel's Software Guard Extensions (SGX), to provide robust confidentiality guarantees while ensuring certainty over the code execution. This approach allows TEN to offer smart contracts, decentralization, scalability, and encryption in ways that other technologies cannot currently achieve [1].

The protocol aims to improve the experience for three primary user groups: retail users who want protection from front-running and MEV attacks, corporate users who require encryption of sensitive trading details, and developers building applications that need to maintain secrets within smart contracts. By encrypting transactions and providing confidential computing capabilities, TEN creates opportunities for use cases that are impossible on transparent blockchains.

Unlike other Layer-2 solutions, TEN is designed to be trustless and decentralized from launch, with no reliance on centralized sequencers or aggregators. It synchronizes the publishing of rollups to the cadence of Layer-1 blocks to guarantee quick finality and solves the long withdrawal problem seen in optimistic rollups [1].

Technology

Confidential Rollups

TEN introduces Confidential rollups, which Secure Enclaves and the Proof of Inclusion (POBI) protocol. These rollups move computation off the Layer-1 while maintaining security through encryption. Key advantages include:

  • Shorter withdrawal delays compared to optimistic rollups
  • Complete decentralization from day one
  • Full Virtual Machine (EVM) compatibility
  • Total encryption over the entire Layer-2 network [1]

Secure Enclaves

Secure Enclaves are secure areas within a central processor that guarantee code and data loaded inside are protected with respect to confidentiality and integrity. TEN initially focuses on Intel's SGX technology, which provides:

  • Protection of cryptographic key material
  • Prevention of transaction spying, even by the enclave operator
  • Ability to search encrypted data
  • Secure code execution with complete privacy
  • Attestation to verify code integrity [1]

The team plans to expand to other Secure Enclave offerings and homomorphic encryption in the future to reduce dependency on Intel.

Proof of Block Inclusion (POBI)

The POBI protocol drives consensus for confidential rollups and is responsible for:

  • Ensuring fair selection of rollup round winners
  • Distributing rewards fairly to aggregators and verifiers
  • Managing edge cases where network compromise might occur, ensuring only temporary pauses to withdrawals until resolution [1]

Data Revelation

TEN implements a flexible policy for delayed transaction revelation, recognizing that the value of confidentiality decreases over time. Transactions are encrypted with different keys representing discrete revelation periods, which can be revealed independently. Initially, TEN has a maximum one-year reveal period for all transactions, though this may be adjusted through community governance in the future [1].

Use Cases

Programmable Encryption for DeFi

TEN allows developers to choose what information remains hidden and what becomes public at a granular . For example, in lending protocols, levels can remain encrypted until triggered, preventing hunting by whales who might otherwise push prices down to force liquidations [1].

Encrypted Name Service

Similar to Name Service (ENS), but with added privacy. When using an encrypted name service on TEN, aliases cannot be linked to underlying addresses, allowing users to maintain anonymity while still using human-readable names [1].

Sealed Bid Auctions

TEN enables truly sealed bid auctions where bids remain hidden until the auction concludes. This prevents auctioneers from colluding with bidders and ensures fair price discovery. The protocol's blog references how the ConstutionDAO experiment could have had a different outcome with encryption technology [1].

Dark Pools and OTC Trading

TEN supports dark pool trading where exposure is hidden until after execution and reporting. This allows investors to trade without revealing their intentions during the search for counterparties. Similarly, over-the-counter (OTC) trading for bespoke financial products can be conducted with guaranteed confidentiality [1].

Commercial Agreements

Service Agreements (SLAs) and other commercial contracts can be deployed on TEN with complete encryption, such that only participants know the contract exists. This enables automated payouts based on independently verified data from oracles while maintaining business confidentiality [1].

Gaming

Games that rely on hidden information, such as "fog of war" mechanics in strategy games, become possible on TEN. The protocol enables a shift from "Play to Earn" to "Pay to Play" models as AAA games can incorporate cryptoassets with hidden elements that even game developers cannot access [1].

Team

TEN's core team includes members who previously built Corda, which is described as "the world's most successful enterprise platform." Corda is used by leading banks, financial institutions, insurance companies, and telecommunications firms [1].

The team brings over five years of experience working with SGX technology in partnership with Intel, providing them with specialized knowledge in implementing secure enclave solutions for applications [1].

Tokenomics

The TEN network requires participation from various actors who incur costs in performing their roles and need compensation. The system's security partially depends on economically punishing malicious actors through a traditional model using a digital asset. While the litepaper mentions a separate paper for more detailed information, it indicates that the protocol has a to power the network and provide decentralized governance [1].

Ecosystem

TEN provides an experience for both application developers and end-users. Developers can port existing applications with minimal changes and build new applications using any -supported programming languages and developer tools. End-users can continue using or their preferred wallets without changing their experience [1].

The protocol includes a fully decentralized bridge between and TEN, backed by 's security. This allows users to move assets between the two networks while maintaining the privacy benefits of the TEN protocol [1]. [2] [3] [4] [5].

잘못된 내용이 있나요?

편집자

Profile picture of Anonymous userzainab

편집 날짜

April 24, 2025

편집 이유:

added social links

Loading...

참고 문헌.

카테고리순위이벤트용어집