Play. Win ZEN. Take Rewards

Litepaper

Abstract

We present TEN, a decentralized Ethereum Layer-2 Rollup protocol designed to add encryption, achieve scalability and prevent Maximal Extractable Value.
The design of TEN ensures that existing Ethereum Dapps can move over to TEN for virtually no cost. Any developer familiar with Ethereum can build encrypted dApps on TEN that benefit from the adoption, legitimacy, security, developer tooling and liquidity of the entire Ethereum ecosystem.

End-users can continue to use MetaMask or their favourite Ethereum wallet. Interacting with a TEN application is the same as interacting with any Ethereum application. With a seamless user and developer experience, TEN changes the paradigm around encryption on the blockchain.

TEN leverages a pragmatic technology for encrypting the ledger, Secure Enclaves. Secure Enclaves provide robust confidentiality guarantees with certainty over the code running. They allow TEN to offer smart contracts, decentralisation, scalability and encryption in a way other technologies cannot.

TEN uses Confidential roll-ups, a new type of roll-up inspired by existing roll-up-based L2 offerings Optimistic and ZK roll-ups. The use of confidential computing techniques and economic incentives allows TEN to retain the performance and programming model simplicity of Optimistic roll-ups and attain confidentiality, short withdrawal periods, and address MEV. 

Users

TEN seeks to improve the experience for three groups. The first is retail users, who enjoy the benefits of DeFi (Decentralized Finance), but find that they are taken advantage of by Ethereum miners or stakers, who can observe their transactions and front-run those which represent profitable trades. Or they are keen to use DeFi, but won’t until it provides the same guarantees that TradFi (Traditional Finance) does.

While the cost of visibility of online activity charged by Big Tech in Web2 was exposure to targeted advertisements, in the “Internet of Value” Web3 world, the cost of visibility will be more expensive services. The adage “If you don’t know what the product is, you are the product” will be truer than ever. This blog post explores how the utopia we’re designing could quickly become a dystopia without encryption.

The second group is corporate users. The TEN core team being ex-R3, discovered early through building the leading consortium of global banks that encryption of sensitive trading details between counterparties is not a nice-to-have, it’s mandatory. This requirement underpinned the “need to know” philosophy of R3’s Corda. So far, corporate users have been slow to transact on Ethereum, despite the attraction of its innovation culture, and TEN believes that making an Ethereum network confidential will unleash a new category of business applications.

The third group is a set of applications which can’t work if the smart contracts don’t hold secrets. Until now, Ethereum contracts have had autonomy and agency; end-users can send Ether and ERC20 token value to a smart contract, and this contract determines how to distribute that value. With TEN, contracts now also hold secrets in the way human agents can, and have the power to surprise users. For example, a TEN contract can determine if an NFT can “shape-shift” or change shape based on external events such as a full moon, or be used to manage the game board of an interactive game in a way which prevents players from “seeing round the corner” or otherwise cheating. 

Example Use Cases

TEN supports encrypted transactions and confidential computing, which opens up a whole new world of use-cases.

Programmable encryption for DeFi

Liquidation Hunting is where whales hunt for loans close to liquidation and push prices down to force liquidation. This behaviour creates huge volatility for everyone and a miserable experience for users forced into liquidation.

TEN’s programmable encryption allows developers to choose what they want to keep hidden and what they want to make public at a granular level. How does this apply to Liquidation Hunting? A developer can take an existing borrowing protocol and choose to have everything public, except for individual liquidation levels. Only if the liquidation levels get hit do they become public — an example of a simple change resulting in a much fairer protocol.

Encrypted Name Service

ENS is a naming system that maps human-readable aliases like ‘bob.eth’ to Ethereum addresses. So when Alice asks for Bob’s address to send tokens, Bob can say ‘bob.eth’ instead of the cumbersome 0x Ethereum address.

The drawback to this is the lack of confidentiality. Alice can now see Bob’s complete account balance and entire transaction history. By using confidential smart contracts on TEN, the alias created cannot be linked to the underlying addresses allowing your balances to remain anonymous even on the L1.

Sealed Bid Auction

In a sealed bid auction, bidders privately submit their one best offer in writing in a sealed envelope. The bids are opened privately by the auctioneer and seller. They do not reveal the bids to any of the participants.

Keeping the bids hidden helps ensure that if all bids are too low for any of them to be accepted by the seller, the property is not stigmatised by having a perceived low value in the marketplace. It also ensures that the auctioneer cannot collude and reveal a competing bid to another bidder privately or front-run a bidder and out-bid them.

We explore here how the outcome of the ConstutionDAO experiment could have been vastly different with the use of TEN. 

Dark pools and OTC Trading

A dark pool is a privately organised exchange for trading securities where exposure is hidden until after execution and reporting. This allows investors to trade without publicly revealing their intentions during the search for a buyer or seller and hiding any pricing data, which could result in investors receiving poorer prices.

Dark pools on TEN would be different from a typical DEX; direct peer-to-peer trading with a layer of ‘dark’ price discovery added.

Prices for assets can be derived from order flow within the TEN enclaves, guaranteeing fair price discovery and leveraging oracles such as Chainlink to ensure prices are within a fair band. The eventual revelation is also essential, as trades eventually must be disseminated to all investors (a consolidated tape).

 Over-the-counter (OTC) trading is where bespoke products are tailored to specific client requirements. The most common usage of OTC is in financial derivatives, where “OTC” means the opposite of “Exchange-traded”.

They come in where there is a need for unique, idiosyncratic terms for, as an example, an option, such as non-standard length of time, strike price, market conventions, or payoff structure and are negotiated between a buyer and issuer. TEN can guarantee confidentiality in both negotiating and structuring such products.

This type of trading is made possible with TEN. 

Commercial Agreements

Commercial agreements, such as a Service Level Agreement (SLA) between a supplier and buyer, are incredibly sensitive. They reveal commercial relationships and impact reputation where an SLA has failed. Agreements deployed to TEN can be entirely encrypted, such that aside from the participants, nobody even knows the contract exists. These commercial agreements on Ten ushers in more efficient handling of automated payouts based on independently verified data supplied by oracles.

Gaming

Games that rely on player actions and positions being secret are impossible on today’s transparent blockchains without confidential computing and encryption. With TEN, games such as Civilization, Starcraft and other “fog of war” type games become a reality. The paradigm can begin to shift from “Play to Earn’ to ‘Pay to Play’ as AAA games start to emerge with embedded cryptoassets in the game mechanics and prizes that are kept hidden, with absolute certainty, even from the developers of the games.

TEN Public Events

Ethereum application developers can use a confidential L2 like TEN for some jobs that are not possible otherwise.

For example, an L1 smart contract organises a fair lottery that needs a reliable random number generator that the miners cannot game.

Another example is publishing the result of a poker game played inside TEN, which the L1 contract can use to make a payment or update the tournament results.

The challenge for achieving this functionality is that the data originating in L2 has to be final. Luckily TEN has this mechanism already in place for processing withdrawals.

TEN introduces

TEN introduces a new type of roll-up called ‘Confidential roll-ups’. When combined with the Proof of Block Inclusion (POBI) protocol, they provide several advantages over existing Layer-2s and other L1 networks:

  • Unlike other Layer-2s, TEN is trustless and decentralized from day one. It takes processing from the Ethereum Layer-1 (L1) and allows lower transaction costs similar to other Layer-2 (L2) networks.
  • All transaction intentions on Ethereum are visible to everyone. However, TEN keeps all transactions and the internal state of application contracts encrypted and hidden.
  • Front runners rely on transactions being out in the open to achieve MEV at the end user’s expense. Given that TEN keeps all transactions and the internal state of application contracts encrypted, MEV is eradicated
  • By providing an encrypted Ethereum Virtual Machine (EVM), deploying existing Ethereum smart contracts to TEN is trivial.
  • TEN leverages Secure Enclaves for encryption but not for integrity and is not affected by the limitations of hardware-based confidential computing.
  • TEN guarantees quick finality by synchronising the publishing of roll-ups to the cadence of the L1 blocks.
  • TEN solves the long withdrawal problem seen in fraud-based roll-ups (Optimistic).
  • The user experience is critical to the success of TEN and encrypted networks in general. TEN provides a seamless Ethereum experience for both app developers and end-users. App developers can fork over existing Ethereum applications and build new applications using any of the Ethereum supported programming languages and developer tooling. End users can continue to use Metamask or their favourite wallets. There is no change in their experience.
  • TEN provides both encrypted transactions and confidential computing.
  • A fully decentralized bridge between Ethereum and TEN backed by the complete security of Ethereum.
  • Being entirely decentralized provides a genuine need for a utility token to power the network and provide decentralized governance.

Encryption with TEN

The encryption TEN provides can be split into encrypted transactions and confidential computing.

Encrypted transactions

Encrypted transactions are the ability to maintain transactions in an encrypted state on the L2. For example, keeping user token balances, participants of a transaction and the amounts transferred encrypted is the primary use of encrypted transactions.

TEN provides encrypted transactions and keeps token contract calls entirely confidential by encrypting transactions from the point of origination, the wallet.

Confidential computing

In addition to encrypted transactions, TEN provides another technique, confidential computing. This is complete and absolute encryption over the entire computation of smart contracts and the network.

With confidential computing, it’s possible to keep inputs and outputs from contracts encrypted and any logic executed within the smart contract. This opens up huge possibilities across DeFi, NFTs, Gaming, DAOs, the Metaverse and things yet to come.

The example of the Commercial Agreement, Gaming and NFT use-cases are only possible with confidential computing.

Secure Enclaves

A Secure Enclave is a secure area of a central processor or CPU. It guarantees that code and data loaded inside are protected with respect to confidentiality and integrity as it is processed.

Secure Enclaves solve a notoriously difficult problem – How to provide secure execution for critically sensitive data?

To solve this problem, Secure Enclaves provide the ability to:

  • Keep cryptographic key material secret.
  • Prevent other people from spying or seeing transactions happen, including the owner or operator of the Secure Enclave.
  • Search encrypted, sensitive data.
  • Sign with cryptographic keys.
  • Execute code with complete privacy.
  • Attest to the code to provide guarantees that what you think is running really is running.

Solving all of the above is an unsolved problem without the use of Secure Enclaves. Zero-knowledge proofs cannot solve this set of problems, and homomorphic encryption is still in its infancy. Secure Enclaves provide a pragmatic, elegant solution.

Intel SGX

There exist multiple Secure Enclave options. These include:

  • Intel’s platform called Software Guard Extensions, or SGX for short.
  • AMD’s SEV, which is similar to SGX.
  • ARM’s TrustZone, which lives inside the majority of ARM chips.

TEN focuses initially on Intel’s SGX. This decision is based on the depth of the SGX solution and how battle-hardened it has become over the years. In addition, Intel has recently announced they are doubling down on their server-side SGX offerings in response to the huge number of new use-cases arising.

SGX is being employed by Secret Network, Oasis Network, Corda and Avalanche, amongst others in the blockchain space.

Finally, the TEN team brings over five years of experience working with SGX in partnership with Intel. In the longer term, to decentralise away this dependency on Intel, TEN will expand to other Secure Enclave offerings and homomorphic encryption once it evolves further.

Roll-ups

Roll-ups are fast becoming the de-facto approach to scaling L1 blockchains. They aim to move execution away from the L1 but tie back to it for security, data availability and access to liquidity.

Users engage with contracts on a second-layer network of nodes, where transaction processing work takes place. L2 transactions are verified and posted in compressed form in a single roll-up transaction to the L1 blockchain. An L1 contract provides the bridge between the two and processes deposits and withdrawals.

The two prevalent forms of roll-up today are fraud proofs and validity proofs.

The best-known example of fraud-proof roll-ups is Optimistic roll-ups. They present an optimistic view of the world based on lightweight verification of transactions on the L2. All transactions are assumed to be correct until a user provides a fraud-proof to challenge an invalid transaction. To provide this functionality, a challenge window of seven days (Dispute Time Delay) is provided in which state transaction is considered not final. Actions like withdrawals are delayed until after this window.

The above challenge requires the parties that are part of an invalid transaction to be present (liveness) and engage in an interactive process to resolve the invalid transaction.

The best-known example of validity proof-based roll-ups is Zero-knowledge roll-ups. Similar to Optimistic roll-ups, they verify transactions on the L2 but then generate proof that the transactions are valid and post proof to the L1. While there exist many ways of doing this, ZKPs are leveraged for their succinctness qualities.

Given that ZKPs are used to prove from one user to another that they have information without revealing the specific information, ZKPs are used in the context of L2s to prove to the L1 that a group of transactions are valid without the overhead of providing all of the transactions. Once the L1 has verified the proof provided by the L2, the state transition is made.

A disadvantage of ZKPs, compared to Optimistic roll-ups, is that proofs are required for every state transition and not just contested ones. In addition, generating proofs is computationally expensive and must be done off-chain.

Confidential roll-ups

Confidential roll-ups are an innovation in TEN that leverages Secure Enclaves and the Proof of Block Inclusion (POBI) protocol.

Like those based on fraud and validity proofs, confidential roll-ups move computation off of the L1 and over to the L2.

The problems confidential roll-ups solve include:

  • Some L2s have long withdrawal delays. TEN solves this as it is not dependent on submitting fraud proofs. Instead, a much smaller time delay window is required to allow for the improbable scenario of every TEN node being taken offline and supported Secure Enclaves being hacked. This window will eventually settle to be a small number of Ethereum blocks.
  • Most L2s in the space require a centralized sequencer/aggregator/proof generator creating a single point of failure. TEN is entirely decentralized from day one through Secure Enclaves and POBI. Run by its users, TEN is unstoppable, uncensorable and will never go down.
  • The ability to use the entire Ethereum Virtual Machine as provided by GETH. There is no need to build a custom EVM with limited functionality or a requirement for developers to change how they build Ethereum applications.
  • Last but not least, total encryption over the entire L2.

Proof of Block Inclusion (POBI)

TEN introduces a novel protocol called Proof of Block Inclusion. It is this protocol that drives the consensus for confidential roll-ups.

The protocol is responsible for:

  • Ensuring that roll-up round winners are selected fairly.
  • Rewards are fairly distributed to aggregators and verifiers who secure the network.
  • Edge cases where the network is compromised only ever result in a temporary pause to withdrawals to protect the network until the protocol resolves the issue

Data Revelation

TEN introduces a revelation period that allows developers to one of five fixed periods for when data should be made public. TEN provides encryption as experienced in the non-blockchain world without building a platform for nefarious activity.

An important insight in this direction is that the value of confidentiality decays over time, to the point where transactions may just be of historical interest. For many transactions involving value, it is critical that they are not public when processed and cannot be front-run (MEV), but for others, they are price-sensitive for a more extended period. TEN uses this insight and implements a flexible policy for delayed transaction revelation. The knowledge that transactions become public in the future is a deterrent for users to engage in criminal behaviour because law-enforcement agencies will eventually catch up.

TEN transactions are encrypted with different keys representing discrete revelation periods, which can be revealed independently.

Initially, TEN has a maximum one-year reveal period for all transactions. In other words, developers can select a revelation period of up to a year.

It can be argued that this is insufficient for some use-cases, e.g. government secrets are withheld for 20-30 years. As such, the decision of the maximum revelation period will eventually fall to the TEN community to determine. Including the ability to whitelist some dApps to maintain encryption in perpetuity if the community votes on it.

Tokenomics

The network requires the participation of several types of actors, some of whom incur costs in performing their roles and need to be remunerated. Furthermore, the system’s security depends partly on the ability to economically punish those who can be proved, within the protocol, to have acted maliciously. This is achieved through a traditional staking model, and a digital asset, Ether, is used for these purposes.

See the separate Tokenomics paper for a more in-depth discussion.

Team

TEN’s core team is part of the team that built Corda, regarded as the world’s most successful enterprise blockchain platform. Corda is used by the world’s leading banks, financial institutions, insurance institutions and telecommunications.

Thank you to Jommi and Polo for contributing their use-case ideas.

TEN Protocol
All rights reserved.
This Website Is Using Cookies

This website uses cookies to enhance your browsing experience and provide personalized content. By clicking the “Agree” button, you agree to the use of cookies. For more information on how we use cookies and your choices regarding them, please see our Privacy Policy.