Ruby Protocol Joins The Confidential Computing Consortium

Ruby Protocol
3 min readJun 22, 2022

Fellow Rubies,

Welcome back to Ruby Protocol.

We are happy to announce Ruby Protocol has now officially entered the Confidential Computing Consortium. We are excited about the journey ahead.

The Confidential Computing Consortium is a group of projects that strive to define Confidential Computing, and accelerate its acceptance and adoption in the market. The Consortium will also develop building blocks with the latest technologies to enable easy development, and management of enterprise-grade confidential computing applications. In addition to their current efforts they are also looking to define foundational services and frameworks that are confidentially aware — while also minimizing the need for trust.

Its members are composed of some of the most advanced and well-known applications that have become the underlying technological infrastructure of the modern world. They serve billions of people, and countless organizations around the globe.

As companies and individuals are quickly moving their work as well as their lives to virtual environments they will need protection protocols for their data. Even further, more assurance and far greater transparency of these controls. Confidential computing will address data in use.

Confidential Computing

It is likely to be the next frontier of Data Security.

As defined by The Consortium, confidential computing helps build a resilient and secure enterprise by ensuring data integrity and confidentiality, and code integrity.

Confidential computing is a privacy-preserving computation principle that leverages hardware-based Trusted Execution Environments (TEE) to protect data being processed. A TEE is a secure area within the central processor that runs an isolated environment parallel to the central operating system, which guarantees the data and code uploaded into it cannot be tampered with by malicious agents.

With Ruby Protocol

Ruby Protocol is a cross-chain, privacy-first infrastructure powered by Polkadot. Our layer-1 protocol utilizes Functional Encryption (FE) cryptography, allowing users to adopt a modular data privacy and ownership approach. This solution will enable users to encrypt sensitive information on-chain, which can only be decrypted by holders of an approved private key.

Our mission and what we stand for align with The Confidential Computing Consortium. By joining the Consortium, Ruby Protocol hopes to support and, more importantly, learn from the development of many projects securing data in use and accelerating the adoption of confidential computing through open collaboration.

Organizations such as CCC and Ruby Protocol are the products of the current time and history. We are bound to spring up as we merely answer the calls to bring significant advances to the industry that will further the acceleration of data center solutions with computational trust and security.

We will, along with many other members — keep exploring the territory of confidential computing, data privacy, and ownership and ultimately make Web3 privacy accessible to all.

About Us

Ruby Protocol is a cross-chain, privacy-first infrastructure, powered by Polkadot. Our layer-1 protocol utilizes Functional Encryption (FE) cryptography, which allows users to adopt a modular approach to data privacy and ownership. This novel solution will allow users to encrypt sensitive information on-chain, which can only be decrypted by holders of an approved private key.

Ruby’s FE Substrate-pallet will serve as the building blocks for privacy-first smart contract DApps building on the native Ruby Chain, while also acting as a privacy layer for Parachains and Web3 DApps across the Polkadot ecosystem.

Contact

Telegram | Discord | Twitter | Github | Email

--

--

Ruby Protocol

Building a programmable privacy & access control middleware framework encrypted with zero-knowledge proofs (zkp) algorithms.