Duce Security and Privacy

Threat Model

The Duce protocol is designed to address multiple attack vectors, including:

  • Miner Extractable Value (MEV): Mitigated by rollup batching and encrypted transaction processing.

  • Side-Channel Attacks on FHE: Addressed through careful parameter selection and secure hardware integration.

  • On-Chain Vulnerabilities: Such as reentrancy or integer overflow, mitigated via formal verification tools.

Robust Encryption Standards

The platform utilizes established FHE libraries and follows rigorous cryptographic best practices to secure all operations.

Privacy-Preserving Auditability

Using zk-SNARKs and related techniques, Duce ensures that:

  • Investment computations are verifiable.

  • Regulatory compliance can be achieved without compromising investor privacy.

Last updated