V2
Confidential Prover Implementation
In Version 2, the market maker only needs to instruct Kalypso on how to generate proofs based on a given set of inputs—both public and private. This is achieved by implementing two main traits:
Both traits work within a secure enclave where sensitive operations (like decryption) occur.
Prerequisites
- Docker
- Nix
- Oyster CVM CLI: Installation instructions here
📄️ Implement the Traits
Implementing GeneratorTrait
📄️ Build the EIF
Build the docker image
📄️ Deploying the EIF
Uploading the EIF