Threat Model
The Duce protocol is designed to address multiple attack vectors, including:
Miner Extractable Value (MEV): Mitigated by rollup batching and encrypted transaction processing.
Side-Channel Attacks on FHE: Addressed through careful parameter selection and secure hardware integration.
On-Chain Vulnerabilities: Such as reentrancy or integer overflow, mitigated via formal verification tools.
The platform utilizes established FHE libraries and follows rigorous cryptographic best practices to secure all operations.
Using zk-SNARKs and related techniques, Duce ensures that:
Investment computations are verifiable.
Regulatory compliance can be achieved without compromising investor privacy.
Last updated 11 months ago