Why the Split Works
- Custody stays with the user until the very moment all validators agree the intent is valid; the TEE cannot act without the shards, and validators cannot act without the enclave.
- m-of-n secret sharing permits liveness with up to
n − moffline or malicious validators while preventing sub-threshold collusion. - Deterministic enclave code + remote attestation constrains the TEE to a publicly auditable state machine.
- Accountability means that any validator who withholds shards or signs a bad intent can be proven dishonest and penalised.
Security Assumptions
- The enclave’s hardware isolation (e.g. SGX or Nitro) prevents key extraction; compromised hardware would be detected via failed remote attestation.
- At least m validators are honest and responsive; liveness requires this quorum.
- Spark finality ensures that once the tx is signed the state transition is immutable and can be sequenced to Bitcoin.