The Oasis Network: A Privacy-Enabled Blockchain Platform for Open Finance

Authors Cheng, Dawn; Lund, Gareth; Yin, Maofan; et al. (Oasis Labs / Oasis Foundation)
Year 2020
Project Oasis Network
License Apache 2.0
Official Source https://oasisprotocol.org/papers

This page is an educational summary and analysis of an official whitepaper or technical paper, written for reference purposes. It is not a verbatim reproduction. CryptoGloss does not claim authorship of the original work. All intellectual property rights remain with the original author(s). The official document is linked above.

“The Oasis Network: A Privacy-Enabled Blockchain Platform for Open Finance” is the 2020 whitepaper by Oasis Labs and the Oasis Foundation describing the Oasis Network — a Layer 1 designed by cryptographer Dawn Song (UC Berkeley) and her team. The network’s defining feature is its separation of consensus and compute into distinct layers: a BFT consensus backbone (the “Consensus Layer”) and modular execution environments called ParaTimes, which can optionally use Intel SGX Trusted Execution Environments (TEEs) for confidential computation.

The design targets a “responsible data economy” — enabling applications where sensitive data (medical records, financial data, user behavior) can be processed without being visible to the compute provider.

> Papers: Available at oasisprotocol.org/papers.


Publication and Context

In 2020, DeFi was exploding but entirely transparent — every trade, loan, and liquidation was visible to all on-chain observers. This transparency creates front-running (MEV bots seeing your transaction and inserting their own before it), loss of financial privacy, and constraints on enterprise adoption (businesses cannot share proprietary data with a public blockchain).

Oasis’s hypothesis: a blockchain with configurable confidentiality — where some execution environments are fully transparent and others are privacy-preserving via hardware enclaves — could attract enterprise and DeFi users who need privacy without sacrificing verifiability.


Consensus Layer

The Oasis Consensus Layer is a Delegated Proof of Stake BFT network using Tendermint-based consensus:

  • Validators lock ROSE tokens (the network’s native token) as stake
  • Delegators can delegate ROSE to validators to earn staking rewards
  • The consensus layer finalizes blocks, commits transaction results, and manages ParaTime state root updates
  • Consensus nodes do NOT execute smart contracts — they only finalize the results reported by ParaTimes

This separation means the consensus layer is deliberately simple and easy to audit.


ParaTimes: Modular Execution Environments

ParaTimes are independent execution environments that each define their own VM, state, and (optionally) confidentiality model. Multiple ParaTimes can run simultaneously:

Standard (Transparent) ParaTimes:

  • Execute smart contracts with full state visibility
  • Sapphire (EVM-compatible) and Cipher (WASM-based) are the primary transparent ParaTimes
  • Any standard DApp can deploy here

Confidential ParaTimes (using SGX):

  • Execution happens inside Intel SGX enclaves — isolated CPU memory regions where even the node operator cannot read the computation inputs/outputs
  • The enclave produces a remote attestation certificate proving the code ran inside genuine SGX hardware
  • State is encrypted; smart contract inputs and outputs are encrypted in transit and at rest
  • Sapphire ParaTime (confidential EVM) allows Solidity contracts to declare variables as confidential

ParaTime-to-Consensus interaction:

  • ParaTime nodes execute a batch of transactions and submit the resulting state root and execution receipts to the Consensus Layer
  • If a ParaTime uses SGX, the receipts are accompanied by attestation proofs

Intel SGX Threat Model

The SGX security model is nuanced:

  • Protected from: ParaTime node operators (they cannot read encrypted inputs/outputs or tamper with execution)
  • NOT protected from: Physical hardware attacks, Intel itself (Intel controls SGX microcode and attestation root of trust), side-channel attacks (Spectre, Meltdown, cache timing attacks on SGX enclaves)

The whitepaper acknowledges these limitations. Side-channel attacks on SGX are a real risk — multiple academic papers have demonstrated leakage of SGX-protected secrets via timing and power analysis. Oasis mitigates some risks by encrypting enclave I/O and using memory-safe languages, but SGX-based confidentiality is not equivalent to cryptographic security.


ROSE Token Economics

  • ROSE is the native token for staking, gas fees, and ParaTime compute payment
  • Consensus validators earn ROSE rewards for block production
  • ParaTime nodes earn ROSE fees for execution
  • Initial supply: 10 billion ROSE, with ~2.3 billion allocated to foundation, team, and investors

Reality Check

Oasis’s architecture is technically interesting, but confidential compute via SGX has significant security caveats that the whitepaper undersells:

  • SGX has been broken repeatedly via side-channel attacks (SGAxe, CrossTalk, PLATYPUS, etc.) by academic researchers. Running a financial protocol in SGX means trusting Intel’s hardware and firmware.
  • Enterprise adoption of the confidential data economy has not materialized at scale. The “responsible data economy” narrative attracted little real enterprise usage.
  • Developer adoption: The confidential EVM (Sapphire) is a novel offering but requires developers to reason carefully about what state is confidential vs. public, which is complex.
  • Network activity: Oasis has not achieved significant DeFi or application activity relative to its market cap.

Legacy

Oasis provided an early production implementation of TEE-based confidential blockchain compute and influenced later thinking on privacy-preserving smart contracts. Sapphire’s confidential EVM is a unique offering that no other major EVM chain replicates. The ParaTime separation-of-concerns model influenced other heterogeneous execution architecture designs.


Related Terms


Research

  • Cheng, D., Lund, G., Yin, M., et al. (2020). The Oasis Network: A Privacy-Enabled Blockchain Platform for Open Finance. Oasis Foundation.

— Primary whitepaper. Section 3 defines the ParaTime model; Section 4 details SGX integration.

  • Costan, V., & Devadas, S. (2016). Intel SGX Explained. IACR ePrint 2016/086.

— Comprehensive analysis of SGX architecture and threat model; essential context for understanding Oasis’s confidentiality guarantees.

  • Van Bulck, J., et al. (2018). Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security 2018.

— Demonstrates a practical side-channel attack on SGX; context for the whitepaper’s security limitations section.