Arcium Docs
arcium.com@ArciumHQ
  • Documentation
  • Developers
  • Introduction
    • Overview of the Arcium Network
    • Key Features & Use Cases
    • Basic Concepts
  • Getting Started
    • How To Use This Documentation
    • Architecture Overview
    • Network Stakeholders
  • Multi-Party eXecution Environments (MXEs)
    • Overview
    • MPC Protocols
    • MXE Encryption
  • Clusters
    • Overview
    • Node Priority List & Alternative Selection Criteria
    • Cluster Forking & Migration
    • Sybil Resistance
    • Incentivization
    • Permissioned Clusters
  • Arx Nodes
    • Overview
    • Configuration and Security
    • Performance and Incentives
  • Computations
    • Computation Tasks
    • Defining & Commissioning Computations
    • Lifecycle of an Arcium Computation
    • Pricing and Incentives
    • Censorship Resistance & Fault Handling
  • Solana Integration & Multichain Coordination
    • Solana Integration: Orchestration and Execution
    • Multichain Expansion
  • Staking
    • Overview
Powered by GitBook
On this page
  1. Arx Nodes

Configuration and Security

PreviousOverviewNextPerformance and Incentives

Last updated 2 months ago

Each Arx node must declare its hardware capabilities, as this impacts the node's workload eligibility and potential revenue.

Accurate declarations are incentivized to ensure reliable performance, with penalties for nodes that overstate their capacity and fail to meet task requirements. Nodes can upgrade their specifications over time, but hardware reductions are subject to conditions to ensure that they do not impact the performance of their active Clusters. See the for more.

Keyshare Management and Security Considerations

Arx nodes handle key shares crucial for participating in MPC protocols within Clusters and these shares cannot be compromised.

These key shares are securely stored and managed, often utilizing Trusted Execution Environments (TEEs) for enhanced confidentiality and data integrity. TEEs provide isolated enclaves that safeguard key shares from unauthorized access, ensuring that only trusted processes within the node can interact with them.

Beyond this, other security considerations exist. This includes the integration of both physical and cloud-based systems to maximize uptime and prevent penalties for non-participation. The physical systems refer to the deployment of Arx node hardware in secure, redundant on-premise setups to ensure reliability. Meanwhile, cloud-based systems leverage scalable and distributed infrastructure provided by trusted providers to enhance failover protection and availability.

Staking Overview section