notes
notes copied to clipboard
Virtual Enclaves
Does this concept exist?
You have Alice generating a language interpreter I which signs the result of the computation combined with a timestamp t of the enclave generation and is itself signed by Alice. Bob can now use I for t+s seconds. Charlie will trust the result if it was generated within that timeframe.
Admittedly, this is security through obscurity/complexity of reverse engineering, but so is the Intel TCB.
I'm trying to find out if this is practically secure.