inco-svm
Inco SVM — Confidential Computing on Solana
Inco Lightning is a confidentiality layer for Solana that enables developers to build applications where sensitive data remains encrypted even during computation. It uses Trusted Execution Environments (TEEs) to deliver verifiable confidential compute — no new chain, no new wallet required.
Note: Inco SVM is currently in beta on Solana devnet. Features are subject to change.
Overview
- Encrypted Types —
Euint128andEboolhandles representing encrypted values stored off-chain - Homomorphic Operations — Arithmetic, comparison, bitwise, and control flow on encrypted data via CPI
- Access Control — Allowance PDA system for granting per-handle decryption permissions
- Attested Decryption — Ed25519 signature-verified decryption through TEE covalidators
- Confidential SPL Token — Privacy-preserving token standard with encrypted balances and transfers
- Client SDK —
@inco/solana-sdkfor encryption, decryption, and utility helpers
Architecture
Client Solana Program Inco Covalidator (TEE)
│ │ │
├─ encryptValue() ──────────►│ │
│ ├─ CPI: new_euint128 ─────────►│
│ │◄─── handle (u128) ──────────┤
│ ├─ CPI: e_add / e_sub / ... ──►│
│ │◄─── result handle ──────────┤
│ ├─ CPI: allow() ──────────────►│
│ │ │
├─ decrypt([handle]) ───────────────────────────────────────►│
│◄─── plaintext + Ed25519 attestation ──────────────────────┤
Inco Lightning Program ID: 5sjEbPiqgZrYwR31ahR6Uk9wf5awoX61YGg7jExQSwaj
Quick Start
Installation
Rust Crate (on-chain):
Add to your Cargo.toml:
[dependencies]
inco-lightning = { version = "0.1", features = ["cpi"] }
Add to Anchor.toml:
[programs.devnet]
inco_lightning = "5sjEbPiqgZrYwR31ahR6Uk9wf5awoX61YGg7jExQSwaj"
JavaScript SDK (client-side):
npm install @inco/solana-sdk
Basic Program Setup
use anchor_lang::prelude::*;
use inco_lightning::cpi::accounts::Operation;
use inco_lightning::cpi::{e_add, e_sub, e_ge, e_select, new_euint128, as_euint128};
use inco_lightning::types::{Euint128, Ebool};
use inco_lightning::ID as INCO_LIGHTNING_ID;
declare_id!("YOUR_PROGRAM_ID");
#[program]
pub mod my_confidential_program {
use super::*;
pub fn deposit(ctx: Context<Deposit>, ciphertext: Vec<u8>) -> Result<()> {
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
Operation {
signer: ctx.accounts.authority.to_account_info(),
},
);
// Create encrypted handle from client ciphertext
let amount: Euint128 = new_euint128(cpi_ctx.clone(), ciphertext, 0)?;
// Add to existing balance
let new_balance = e_add(cpi_ctx, ctx.accounts.vault.balance, amount, 0)?;
ctx.accounts.vault.balance = new_balance;
Ok(())
}
}
#[derive(Accounts)]
pub struct Deposit<'info> {
#[account(mut)]
pub authority: Signer<'info>,
#[account(mut)]
pub vault: Account<'info, Vault>,
/// CHECK: Inco Lightning program
#[account(address = INCO_LIGHTNING_ID)]
pub inco_lightning_program: AccountInfo<'info>,
}
#[account]
pub struct Vault {
pub balance: Euint128,
}
Basic Client Usage
import { encryptValue } from "@inco/solana-sdk/encryption";
import { decrypt } from "@inco/solana-sdk/attested-decrypt";
// Encrypt a value before sending to program
const encrypted = await encryptValue(1000n);
await program.methods
.deposit(Buffer.from(encrypted, "hex"))
.accounts({ authority: wallet.publicKey, vault: vaultPda, incoLightningProgram: INCO_LIGHTNING_ID })
.rpc();
// Decrypt a handle (requires wallet signature)
const result = await decrypt([handleString], {
address: wallet.publicKey,
signMessage: wallet.signMessage,
});
console.log("Decrypted:", result.plaintexts[0]);
Encrypted Types & Handles
Handles are 128-bit references to encrypted values stored off-chain in the covalidator network.
| Type | Description | Rust Definition |
|---|---|---|
Euint128 |
Encrypted unsigned 128-bit integer | pub struct Euint128(pub u128) |
Ebool |
Encrypted boolean | pub struct Ebool(pub u128) |
Store handles directly in account structs:
#[account]
pub struct ConfidentialAccount {
pub balance: Euint128,
pub is_active: Ebool,
}
Input Functions
| Function | Description |
|---|---|
new_euint128(ctx, ciphertext, input_type) |
Create from client-encrypted ciphertext |
new_ebool(ctx, ciphertext, input_type) |
Create encrypted bool from ciphertext |
as_euint128(ctx, value) |
Trivial encryption of plaintext u128 (for constants like zero) |
as_ebool(ctx, value) |
Trivial encryption of plaintext bool |
Operations on Encrypted Data
All operations require a CPI context and return new handles.
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
Operation { signer: ctx.accounts.authority.to_account_info() },
);
let result = e_add(cpi_ctx, a, b, 0)?;
The last parameter (scalar_byte) is 0 for encrypted-encrypted operations, 1 when the left operand is plaintext.
Arithmetic → Euint128
e_add, e_sub, e_mul, e_rem
Comparison → Ebool
e_ge, e_gt, e_le, e_lt, e_eq
Bitwise → Euint128
e_and, e_or, e_not, e_shl, e_shr
Control Flow (Multiplexer)
// Cannot use if/else on encrypted values — use e_select instead
let result = e_select(cpi_ctx, condition, if_true, if_false, 0)?;
Random Number Generation
let random_value = e_rand(cpi_ctx, 0)?;
See resources/rust-sdk-reference.md for the complete API.
Access Control
Decryption permissions are managed through Allowance PDAs derived from [handle.to_le_bytes(), allowed_address].
use inco_lightning::cpi::accounts::Allow;
use inco_lightning::cpi::allow;
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
Allow {
allowance_account: ctx.accounts.allowance_account.to_account_info(),
signer: ctx.accounts.authority.to_account_info(),
allowed_address: ctx.accounts.user.to_account_info(),
system_program: ctx.accounts.system_program.to_account_info(),
},
);
allow(cpi_ctx, handle.0, true, user_pubkey)?;
Important: Operations produce new handles, and allowance PDAs depend on the handle value. You must simulate the transaction first to get the result handle, derive the PDA, then submit with remaining_accounts.
See resources/access-control.md for the full simulation-then-submit pattern.
Attested Decryption
Two modes:
| Mode | Purpose | Returns |
|---|---|---|
| Attested Reveal | Display values in UI | result.plaintexts |
| Attested Decrypt | Verify values on-chain | result.ed25519Instructions + program IX |
import { decrypt } from "@inco/solana-sdk/attested-decrypt";
const result = await decrypt([handle], {
address: wallet.publicKey,
signMessage: wallet.signMessage,
});
// Reveal: use plaintext directly
console.log(result.plaintexts[0]);
// Decrypt: verify on-chain
const tx = new Transaction();
result.ed25519Instructions.forEach(ix => tx.add(ix));
tx.add(yourProgramVerifyInstruction);
await sendTransaction(tx);
On-chain verification:
use inco_lightning::cpi::is_validsignature;
use inco_lightning::cpi::accounts::VerifySignature;
let cpi_ctx = CpiContext::new(
ctx.accounts.inco_lightning_program.to_account_info(),
VerifySignature {
instructions: ctx.accounts.instructions.to_account_info(),
signer: ctx.accounts.authority.to_account_info(),
},
);
is_validsignature(cpi_ctx, 1, Some(handles), Some(plaintext_values))?;
Confidential SPL Token
A full privacy-preserving token implementation. See resources/confidential-spl-token.md.
Key functions: initialize_mint, create_account, mint_to, transfer, approve
// Encrypt and transfer
const encrypted = await encryptValue(500_000_000n);
await program.methods
.transfer(Buffer.from(encrypted, "hex"), 0)
.accounts({ source: srcAta, destination: destAta, authority: wallet.publicKey })
.rpc();
Best Practices
- Always call
allow()after operations that produce handles you want to decrypt later - Use
remaining_accountsto pass allowance PDAs and grant access in the same transaction - Grant minimal permissions — only allow specific addresses to decrypt what they need
- Use the multiplexer pattern (
e_select) instead of if/else on encrypted conditions - Trivial encryption only for constants (like zero) — use client-side encryption for sensitive values
- Verify the intended handle in attestations to prevent handle-swap attacks
- Simulate transactions first to get result handles before deriving allowance PDAs
Resources
- Inco SVM Docs
- Rust SDK Reference
- JS SDK Reference
- Concepts Guide
- Confidential SPL Token
- Private Raffle Tutorial
- Next.js Template Repo
- Lightning Rod Solana Repo
Skill Structure
inco/
├── SKILL.md # This file — main reference
├── docs/
│ └── troubleshooting.md # Common issues and solutions
├── examples/
│ ├── basic-operations/
│ │ └── encrypted-operations.ts # Arithmetic, comparison, select
│ ├── confidential-spl-token/
│ │ ├── mint-and-transfer.ts # Mint & transfer confidential tokens
│ │ └── reveal-balance.ts # Decrypt and reveal token balance
│ └── private-raffle/
│ └── raffle-client.ts # Full raffle lifecycle client
├── resources/
│ ├── rust-sdk-reference.md # Complete Rust CPI API
│ ├── js-sdk-reference.md # JS SDK encryption & decryption
│ ├── access-control.md # Allowance PDAs & simulation pattern
│ └── confidential-spl-token.md # SPL token program reference
└── templates/
└── inco-svm-setup.ts # Starter template with helpers