Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Secret Network

A blockchain protocol that enables privacy-preserving smart contracts, allowing encrypted data inputs, outputs, and state using trusted execution environments (TEEs).
Chainscore © 2026
definition
BLOCKCHAIN GLOSSARY

What is Secret Network?

A technical definition of the Secret Network blockchain, its core privacy technology, and its primary use cases.

Secret Network is a layer-1 blockchain that enables smart contracts with private, encrypted inputs, outputs, and state, using Trusted Execution Environments (TEEs). Unlike transparent blockchains like Ethereum, Secret Network's secret contracts process data inside secure, hardware-isolated enclaves, allowing decentralized applications (dApps) to compute over sensitive information—such as personal data, financial records, or proprietary algorithms—without exposing it to the public, nodes, or even the developers. This architecture provides data privacy by default, a critical feature for applications requiring confidentiality.

The network's privacy is powered by a technology stack centered on Intel SGX (Software Guard Extensions) TEEs. Validator nodes run secret contracts inside these secure enclaves, which cryptographically attest that the code is running unaltered on genuine hardware. Data is encrypted with a key unique to each contract and only decrypted inside the TEE for computation, with the results re-encrypted before being committed to the chain. This model, often called compute-over-encrypted-data, ensures end-to-end confidentiality while maintaining the verifiable and permissionless nature of a public blockchain.

Secret Network facilitates a range of privacy-preserving applications impossible on transparent chains. Key use cases include private decentralized finance (DeFi) with shielded transactions and lending positions, confidential non-fungible tokens (NFTs) with hidden metadata or access-gated content, and secure decentralized identity and data management solutions. By providing a programmable privacy layer, it aims to unlock Web3 adoption in regulated industries like healthcare and finance, where data sovereignty and compliance are non-negotiable requirements for decentralized systems.

how-it-works
TECHNICAL OVERVIEW

How Secret Network Works

Secret Network is a privacy-focused, programmable blockchain that enables smart contracts to compute on encrypted data, a concept known as confidential computing.

At its core, Secret Network operates as a sovereign Proof-of-Stake (PoS) blockchain built using the Cosmos SDK and secured by the Tendermint consensus engine. Its defining feature is the integration of Trusted Execution Environments (TEEs), specifically Intel SGX, into its validator nodes. These secure hardware enclaves allow the network to process data—termed "secret data"—in an encrypted state, shielding it from the validators themselves, the network, and even the application developers. This mechanism ensures that sensitive inputs, outputs, and the internal state of a smart contract remain confidential throughout computation.

Developers write secret contracts in Rust, which are then compiled to WebAssembly (WASM). When deployed, these contracts are encrypted and executed inside the TEEs. The process involves several key steps: a user submits an encrypted input, validators reach consensus on the transaction, the designated executor processes the encrypted data inside its secure enclave, and finally, an encrypted output or a state change is committed to the blockchain. This architecture enables novel use cases impossible on transparent chains, such as private decentralized finance (DeFi), confidential voting, and secure data marketplaces where raw data never needs to be exposed.

The network's native token, SCRT, serves multiple critical functions: it is used for staking to secure the network, paying gas fees for transactions and computations, and participating in on-chain governance. Unlike many privacy coins, Secret Network provides privacy at the smart contract layer, offering programmability. This design allows developers to create applications with customizable privacy features—determining exactly what data is kept secret, what is revealed, and to whom—through the use of viewing keys and selective disclosure mechanisms.

key-features
PRIVACY-PRESERVING BLOCKCHAIN

Key Features of Secret Network

Secret Network is a Layer-1 blockchain that enables private smart contracts, allowing developers to build applications where data is encrypted on-chain and can be computed over without being revealed.

02

Trusted Execution Environment (TEE)

The hardware-based privacy technology at the network's foundation. Each validator node runs a secure, isolated enclave (like Intel SGX) that acts as a black box for computation. Data enters encrypted, is processed inside the TEE, and only authorized results are output. This ensures data confidentiality and integrity, even if the node operator is malicious. The network's consensus enforces that all validators must use TEEs.

03

Data Encryption & Viewing Keys

All sensitive data stored on-chain is encrypted. Users control access through a unique cryptographic system:

  • Transaction-level encryption: Inputs to Secret Contracts are encrypted to the contract's public key.
  • Viewing Keys: Users can generate and share specific keys to grant selective, read-only access to their private data (e.g., viewing private NFT metadata or wallet balances) to third parties, enabling compliant and user-controlled privacy.
04

Interchain Privacy with IBC

Secret Network is IBC-enabled, allowing its private smart contracts to interact with assets and data from other Cosmos-based chains and beyond. This creates interchain privacy, where assets like ATOM or OSMO can be transferred into Secret Network, transformed into privacy-preserving variants (e.g., sATOM), used in confidential DeFi applications, and then bridged back out. It acts as a privacy hub for the broader ecosystem.

05

Permissionless & Decentralized

Unlike many privacy solutions, Secret Network operates as a permissionless, proof-of-stake blockchain. Anyone can run a validator node (with the required TEE hardware), stake the native SCRT token, and participate in governance. This decentralization is critical for censorship resistance and security, distinguishing it from centralized mixing services or trusted setups used by some privacy coins.

06

Use Cases & Applications

The technology enables a new class of Web3 applications:

  • Private DeFi: Front-running resistant DEXs, confidential lending with private collateral.
  • Private NFTs & Gaming: Hidden metadata, traits, and in-game assets.
  • Private Governance & DAOs: Confidential voting and treasury management.
  • Private Data Oracles & Compute: Processing sensitive real-world data (credit scores, medical data) on-chain for use in contracts.
examples
SECRET NETWORK

Examples and Use Cases

Secret Network's programmable privacy enables a range of applications where data confidentiality is paramount. These use cases leverage its Trusted Execution Environments (TEEs) to process encrypted inputs and produce verifiable outputs without exposing the underlying data.

ecosystem-usage
SECRET NETWORK

Ecosystem and Adoption

Secret Network is a blockchain enabling private smart contracts (Secret Contracts) using trusted execution environments (TEEs). Its ecosystem focuses on privacy-preserving applications in DeFi, NFTs, and Web3.

02

SCRT Token & Governance

SCRT is the native utility and governance token of Secret Network. Its primary functions are:

  • Gas Fees: Paying for computation and storage on the network.
  • Staking: Used to secure the Proof-of-Stake (PoS) network via validators.
  • Governance: SCRT holders vote on-chain to decide protocol upgrades, treasury spending, and network parameters through the Secret Network DAO.
03

Privacy-Preserving DeFi (Secret DeFi)

A suite of applications that bring confidentiality to decentralized finance. Key examples include:

  • Secret Swap: An AMM DEX where trade amounts and liquidity provider positions are kept private.
  • Sienna Network: A platform for private lending, borrowing, and yield generation.
  • Shade Protocol: A suite of private DeFi products, including the algorithmic stablecoin SILK. These tools protect against front-running and position sniping.
04

Private NFTs & Data

Extends privacy to digital assets and data. Secret NFTs can have encrypted metadata and traits viewable only by the owner or permitted parties. This enables:

  • Private art galleries and collectibles.
  • Confidential medical or identity records stored on-chain.
  • Gaming assets with hidden attributes. The network also supports private data storage and computation through services like Secret Vault.
05

Inter-Blockchain Communication (IBC)

Secret Network is a Cosmos SDK chain and a core member of the IBC ecosystem. This allows:

  • Cross-chain privacy: Users can transfer assets from chains like Cosmos Hub and Osmosis to Secret Network, where they become privacy coins (e.g., sSCRT, sATOM).
  • Interoperability: Secret Contracts can interact with and provide privacy services to other IBC-connected chains, acting as a privacy hub for the Cosmos ecosystem.
06

Developer Tools & Grants

The ecosystem supports builders through specialized tools and funding.

  • Development Framework: The Secret Toolkit and CosmWasm-based environment for building Secret Contracts in Rust.
  • Grants Program: The Secret Network Foundation and DAO fund projects through ecosystem grants.
  • Privacy-as-a-Service: Developers from other chains can leverage Secret Network's privacy features via IBC and custom bridges.
BLOCKCHAIN DATA PRIVACY

Comparison: Privacy-Enhancing Approaches

A technical comparison of different cryptographic methods for achieving data confidentiality on public blockchains.

Feature / PropertySecret Network (TEEs + MPC)Zcash / ZK-SNARKsMonero / Ring Signatures

Core Privacy Mechanism

Trusted Execution Environments (TEEs) with Multi-Party Computation (MPC)

Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (ZK-SNARKs)

Ring Confidential Transactions (RingCT) with Stealth Addresses

Data Privacy

Encrypted inputs, state, and outputs

Encrypted transaction amounts and participants

Obfuscated transaction graph and amounts

Computation Privacy

Programmability (Smart Contracts)

Selective Transparency

On-Chain Verification Cost

Low (TEE attestation)

High (SNARK verification)

Medium (ring signature verification)

Trust Assumptions

Hardware/software integrity of TEEs

Trusted setup ceremony (for some parameters)

Trust in the anonymity set size

Anonymity Set

N/A (state is encrypted, not mixed)

Full anonymity set of shielded pool

Size of the ring (e.g., 11-16 decoys)

SECRET NETWORK

Technical Details

Secret Network is a privacy-focused blockchain that enables smart contracts with encrypted inputs, outputs, and state, using trusted execution environments (TEEs).

Secret Network is a privacy-preserving blockchain that executes smart contracts with encrypted data using Trusted Execution Environments (TEEs). It operates as a Cosmos SDK-based blockchain using Tendermint BFT consensus. The core innovation is the Secret Contract, where code runs inside a secure, isolated enclave (a TEE, specifically Intel SGX). This enclave can process encrypted data—keeping inputs, outputs, and contract state hidden from nodes, users, and developers—while still allowing verifiable, deterministic execution. The network's native token, SCRT, is used for fees, staking, and governance.

security-considerations
SECRET NETWORK

Security Considerations

Secret Network is a privacy-preserving blockchain that enables private smart contracts by using Trusted Execution Environments (TEEs). This architecture introduces unique security properties and attack vectors distinct from transparent blockchains.

02

Validator Node Security

Validator nodes must operate specialized hardware with TEE support. Key security responsibilities include:

  • Secure provisioning: Correctly initializing the TEE with the network's attested software.
  • Key management: Safeguarding the node's consensus and encryption keys.
  • Physical security: Protecting against physical attacks that could compromise the TEE's isolated memory. A compromised validator can lead to slashing or, in a worst-case scenario, a leak of private state if the TEE itself is breached.
03

Private State & Data Handling

Unlike transparent chains, Secret Network encrypts contract state and input/output data. This creates a need-to-know data model. Security considerations include:

  • Encrypted mempool: Transactions are encrypted before broadcast to protect user data from front-running based on content.
  • In-enclave decryption: Data is only decrypted inside the secure TEE.
  • Contract developer responsibility: Developers must correctly implement privacy logic; bugs can still leak data through improper access controls or output.
04

Trust Assumptions & Threat Model

Secret Network's security model incorporates both blockchain and trusted hardware assumptions:

  • Byzantine Fault Tolerance: Requires >2/3 of validators by stake to be honest and correct (standard for Cosmos SDK chains).
  • TEE Trust: Assumes the TEE hardware (Intel SGX) is secure and its remote attestation is valid. The network is vulnerable to large-scale TEE compromises (e.g., a critical CPU vulnerability) that could break privacy guarantees, though ledger integrity would remain.
05

Key Management for Users

Users interact with private contracts using a viewing key system. This is a symmetric key shared between the user and a contract to decrypt specific data. Critical user security practices include:

  • Viewing key custody: Users must securely store their viewing keys; losing them means losing access to their private data history.
  • Selective disclosure: Viewing keys are per-contract, allowing users to reveal data to specific dApps without exposing their entire transaction history.
06

Audits & Formal Verification

Given the complexity of private smart contracts and TEE integration, rigorous security auditing is paramount. The network's core technology stack and major contracts undergo:

  • Code audits: Independent reviews of the TEE module, cosmwasm integration, and contract code.
  • Attestation verification: Continuous on-chain verification of validator TEE attestations.
  • Formal verification: Applied to critical components to mathematically prove the correctness of privacy-preserving algorithms.
SECRET NETWORK

Common Misconceptions

Secret Network is a blockchain with programmable privacy for smart contracts, but its unique architecture often leads to confusion. This section clarifies the most frequent misunderstandings about its technology, security model, and use cases.

No, Secret Network is not a privacy coin; it is a privacy-preserving smart contract platform. While Monero focuses on private transactions of its native currency, Secret Network enables confidential computation for decentralized applications (dApps). Its smart contracts, called secret contracts, can process encrypted data inputs, execute computations on that data, and produce encrypted outputs, all without revealing the underlying data to the network nodes, developers, or users. This allows for complex private applications like sealed-bid auctions, private voting, and confidential decentralized finance (DeFi), which go far beyond simple private payments.

history
SECRET NETWORK

History and Evolution

The development of Secret Network is a story of cryptographic innovation, pivoting from a privacy-focused smart contract platform to a broader privacy layer for the Web3 ecosystem.

Secret Network originated as Enigma, a project co-founded by Guy Zyskind and Can Kisagun in 2017, which raised funds via an Initial Coin Offering (ICO). Its initial whitepaper, "Enigma: Decentralized Computation Platform with Guaranteed Privacy," proposed a second-layer protocol for Ethereum that would enable private smart contracts using secure multi-party computation. This early vision aimed to solve the critical problem of data privacy for decentralized applications, allowing computation on encrypted data.

The project underwent a significant pivot and rebranding following its mainnet launch in February 2020, becoming Secret Network. This launch marked a pivotal evolution from a layer-2 concept to an independent, Cosmos SDK-based blockchain utilizing Tendermint consensus. The core technological breakthrough was the implementation of Trusted Execution Environments (TEEs), specifically Intel SGX, to create "secret contracts." These contracts process data in encrypted, isolated hardware enclaves, ensuring inputs, outputs, and state remain confidential from nodes, users, and even developers.

A major milestone was the Secret-2 upgrade in late 2021, which introduced interchain privacy via the Inter-Blockchain Communication (IBC) protocol. This transformed Secret Network from a standalone privacy chain into a privacy hub for the Cosmos ecosystem and beyond, enabling private interactions with assets and data from other IBC-connected chains. Subsequent governance decisions, like the approval of Secret Ethereum Bridge (shETH), further expanded its reach to the Ethereum ecosystem.

The network's evolution is guided by a decentralized ecosystem of contributors, including the Secret Foundation and SCRT Labs. Key developments include the introduction of programmable privacy with viewing keys (allowing users to selectively disclose data) and ongoing research into multi-TEE frameworks and fully homomorphic encryption (FHE). These steps aim to reduce reliance on specific hardware and enhance the network's privacy guarantees for the long term.

Today, Secret Network's history reflects a strategic journey from a theoretical privacy solution to a foundational privacy-preserving infrastructure. It provides the tools for private decentralized finance (DeFi), non-fungible tokens (NFTs), and general-purpose computation, positioning itself as an essential privacy layer in the increasingly interoperable Web3 landscape.

SECRET NETWORK

Frequently Asked Questions

Secret Network is a blockchain protocol that enables privacy-preserving smart contracts. These FAQs address common questions about its core technology, use cases, and ecosystem.

Secret Network is a layer-1 blockchain that enables privacy-preserving smart contracts, known as secret contracts, which process encrypted data. It works by utilizing Trusted Execution Environments (TEEs), specifically Secure Enclaves, within its validator nodes. When a secret contract is executed, the encrypted input data is decrypted inside the secure, isolated hardware enclave, the computation is performed on the plaintext data, and the output is encrypted before being written back to the blockchain. This ensures that sensitive data (like user balances, transaction amounts, or algorithmic logic) remains confidential from the public, the validators themselves, and even other contract participants, while still being verifiable.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team