Recommendation ITU-T F.751.9 (09/2023) Trusted execution environment based confidential computing on distributed ledger technology systems
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of confidential computing in a DLT system
7 Security requirements
     7.1 Security assurance of computing elements
     7.2 Security assessment to guarantee secure implementation
8 Technical requirements of TEE-based confidential computing
9 General framework of TEE-based confidential computing
10 General procedures to realize TEE-based confidential computing
     10.1 Preliminary
     10.2 Key management
          10.2.1 Key generation
          10.2.2 Key synchronization
          10.2.3 Key utilization
          10.2.4 Key backup and recovery
     10.3 Transaction initiation
     10.4 Confidential computing execution
          10.4.1 Transaction code instalment
          10.4.2 Computing code operation
          10.4.3 Computing code updating
     10.5 Receipt return
Appendix I  Example of key specification
     I.1 Root key specification example
Bibliography