Skip to main content

What is Private Proving?

Private Proving is a method of generating cryptographic proofs inside a Trusted Execution Environment (TEE) that ensures input data (the witness) remains completely confidential during proof generation. This means neither the verifier nor the prover can see an application’s input data.
Private Proving Overview - Source: Succinct Labs

The Problem: Witness Data Exposure in Traditional ZK Proving

Traditional zero-knowledge proving systems verify computation correctness, but the witness data (private inputs) is exposed to the prover operator during proof generation:
  • Privacy-focused rollups: Prover operators can see user transaction amounts, recipients, and trading strategies
  • Private DeFi protocols: Witness data includes sensitive positions, balances, and trading logic
  • Confidential identity systems: User credentials and personal data are exposed to prover infrastructure
  • Private payments: Transaction amounts and sender/receiver information visible to prover
The core issue: Zero-knowledge proofs hide data from the verifier, but they don’t protect data from the prover. The prover sees all witness data during proof generation.

The Solution: Run ZK Provers Inside TEE

Private proving runs the proof generation process inside hardware-isolated environments, ensuring witness data never leaves the secure enclave:
Witness Data (Private) → TEE [zkVM Prover] → ZK Proof (Public)
How it works:
  • Witness data enters the TEE and remains hardware-encrypted throughout proving
  • The zkVM (like SP1) executes inside the TEE to generate the proof
  • Only the final proof leaves the TEE - witness data stays protected
  • TEE attestation proves the proving environment was secure
Key benefits:
  1. Complete Witness Privacy: No one, including the prover operator, can see witness data
  2. Hardware-Level Security: Data encrypted at the silicon level (Intel TDX, AMD SEV, AWS Nitro)
  3. Developer-Friendly: Write private applications in Rust using familiar zkVM frameworks
  4. Performance: GPU TEE (H200) provides hardware acceleration for fast proof generation
  5. Verifiable Security: Remote attestation cryptographically proves the secure execution environment
Impact: Private proving transforms privacy from a specialized technical challenge into a standard feature. As Succinct states: “With Succinct, privacy will be a standard rather than an exception.”
Learn more about Private Proving from Succinct Labs’ Private Proving announcement.

Benefits vs Traditional ZK

FeatureTraditional ZKPrivate Proving (ZK in TEE)
Proof Correctness✅ Cryptographic✅ Cryptographic
Witness Privacy❌ Exposed to prover✅ Hardware encrypted
Verifiable Execution❌ No guarantees✅ TEE attestation
Developer ExperienceCircuit development✅ No code changes (Rust/zkVM)
PerformanceFastMinimal overhead with GPU TEE
GPU Acceleration✅ Yes✅ Yes (H100/H200)
Trust AssumptionsCryptography onlyCryptography + hardware

Private Proving in Production

Phala Cloud: Hardware-Accelerated Private Proving

Phala Cloud provides production-ready infrastructure for private proving with GPU TEE:
🚀Phala Network: Run zk-Rollup STF (state transition function) in TEEUse-Cases-Multi-Proof.pngPhala SGXProver
🔒Primus: Build Trustless zkTLS with TEEtee_zktls.pngPrimus zkTLS
💾Running SP1 zkVM in TEE H200 with Low Overheadzkvm-sp1-in-gpu-tee.jpgSP1 zkVM in TEE

Multi-Proof Systems: Defense-in-Depth (SP1-2FA)

While private proving protects data privacy, some applications require maximum security through defense-in-depth. Multi-proof systems like Succinct’s SP1-2FA generate both ZK and TEE proofs in parallel:
SP1-2FA Multi-Proof Architecture - Source: Succinct Labs
How it differs from private proving:
  • Private Proving: ZK prover runs inside TEE (focus: data privacy)
  • SP1-2FA: ZK and TEE run in parallel (focus: maximum security)
When to use SP1-2FA:
  • Critical infrastructure (blockchain consensus, bridges)
  • High-value DeFi protocols (significant TVL at risk)
  • Defense against undiscovered ZK circuit bugs
  • Regulatory requirements for multiple independent proofs
Trade-off: SP1-2FA provides stronger security guarantees but doesn’t specifically protect data privacy during ZK proving. For most applications requiring data privacy, private proving is the right choice.
Learn more about SP1-2FA from Succinct’s blog post.
Resources:

References and Further Reading

I