Skip to content

What is Escrin?

Escrin is a smart worker runtime that gives smart contracts the ability to privately interact with private off-chain data, and push the results back on chain.

Escrin is a key enabler of autonomous computing, bridging "self-executing" autonomy from smart contracts to secure serverless workers.

If you have ever wished for a trusted third party that could run some private computation for you, Escrin is the answer.

Features

  • Familiar serverless JavaScript computing environment
  • Worker inputs and outputs are end-to-end encrypted
  • Transparency and integrity are guaranteed by decentralized ledgers
  • Confidentiality and encryption keys are guarded by decentralized secret sharing networks
  • Infinitely extensible through EVM-compatible plugins

Key Concepts

Decentralized Computing

Decentralized computing refers to the distribution of computing resources across a network of computers, rather than relying on a single centralized entity. This provides a number of benefits, including improved fault tolerance, greater scalability, and increased security. In Escrin, decentralized computing allows algorithms and data to be run on trustworthy hardware anywhere, and allows anyone to contribute to the network.

Trusted Execution Environments

A trusted execution environment (TEE) is a secure hardware environment that provides a high level of protection for executing code and managing data. In Escrin, TEEs are used to protect algorithms and data from unauthorized observers, ensuring that inputs and outputs are end-to-end encrypted. These hardware enclaves provide strong privacy guarantees and enable fully autonomous computation.

Decentralized Key Management

Decentralized Key Management refers to the use of smart contracts to trigger key release from decentralized key management networks that hold secrets using techniques like secret sharing and threshold encryption. Escrin uses decentralized key management to ensure that keys are always available, but only to the authorized party or hardware enclave. This approach provides a high level of security and privacy, even in a decentralized computing environment.

How It Works

Decentralized LedgerTask ExecutorEscrin Worker(in a TEE)Task SchedulerSmart Contract(escrin)  acceptTaskResults(results,proof)public state(escrin)  acquireIdentity(id,credentials)1. detect tasks& policiesTaskTask...2. dispatch tasks4. acquire identity  Secret Sharing Network6. verify identityStorage Subsystem                     8. update shared state3. fetch program & inputs    7. post side effects 5.  fetch secret