{"id":591868,"date":"2021-01-23T05:35:00","date_gmt":"2021-01-23T13:35:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&#038;p=591868"},"modified":"2025-07-07T05:29:57","modified_gmt":"2025-07-07T12:29:57","slug":"confidential-consortium-framework","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/confidential-consortium-framework\/","title":{"rendered":"Confidential Consortium Framework"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background- card-background--inset-right\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"608\" height=\"554\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/01\/Hero.png\" class=\"attachment-full size-full\" alt=\"CCF Hero\" style=\"object-position: 79% 38%\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/01\/Hero.png 608w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/01\/Hero-300x273.png 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/01\/Hero-198x180.png 198w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/>\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 align-self-center\">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h1 class=\"wp-block-heading h2\" id=\"confidential-consortium-framework\">Confidential Consortium Framework<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<p><b>What is Confidential Consortium Framework (CCF)?<\/b><\/p>\n<p>Confidential Consortium Framework (CCF) is an open-source framework for building highly available stateful services that leverage centralized compute for ease of use and performance, while providing decentralized trust. It enables multiple parties to execute auditable compute over confidential data without trusting each other or a privileged operator.<\/p>\n<ul type=\"disc\">\n<li>Governance: Transparent, programmable consortium-style proposal and voting based governance that supports enterprise operating models<\/li>\n<li>Service Integrity: Hardware-backed integrity for application logic and data<\/li>\n<li>Confidentiality & Privacy: All transactions are confidential by default<\/li>\n<li>Performance: Database-like throughput, low latency, deterministic commits<\/li>\n<li>Efficiency: Minimal execution overhead compared to traditional solutions<\/li>\n<li>Resiliency: High availability and secure disaster recovery<\/li>\n<\/ul>\n<p>CCF powers the\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-gb\/services\/azure-confidential-ledger\/#overview\">Azure Confidential Ledger (ACL)<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> service. For those who are interested in CCF and would like to learn more about it, please visit our <a class=\"fui-Link ___m14voj0 f3rmtva f1ern45e f1deefiw f1n71otn f1q5o8ev f1h8hb77 f1vxd6vx f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f9n3di6 f1ids18y fygtlnl f1deo86v f12x56k7 f1iescvh ftqa4ok f50u1b5 fs3pq8b f1hghxdh f1tymzes f1x7u7e9 f1cmlufx f10aw75t fsle3fq\" title=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=http%3A%2F%2Fccf.dev%2F&data=05%7C01%7CNeeltje.Berger%40microsoft.com%7C685ca9262739495f300708daacfcc5f8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638012499025809846%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ArVvcIsHb2PQQcGkCc8idpQl8PXJxMJoRgItzYsu1C8%3D&reserved=0\" href=\"https:\/\/github.com\/microsoft\/CCF\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"Link CCF website\">open source repository<\/a>\u00a0and our\u00a0<a class=\"fui-Link ___m14voj0 f3rmtva f1ern45e f1deefiw f1n71otn f1q5o8ev f1h8hb77 f1vxd6vx f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f9n3di6 f1ids18y fygtlnl f1deo86v f12x56k7 f1iescvh ftqa4ok f50u1b5 fs3pq8b f1hghxdh f1tymzes f1x7u7e9 f1cmlufx f10aw75t fsle3fq\" title=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fccf-app-samples&data=05%7C01%7CNeeltje.Berger%40microsoft.com%7C685ca9262739495f300708daacfcc5f8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638012499025809846%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=gW3h2f45zcfR2Gq0HHvFJCIbT5bzns0dAvsMyQHJWMw%3D&reserved=0\" href=\"https:\/\/github.com\/microsoft\/azureconfidentialledger-app-samples\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"Link sample CCF application\">sample ACL applications<\/a>.<\/p>\n<p>Read our blog post here: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/blog\/ccf-bringing-efficiency-and-usability-to-a-decentralized-trust-model\/\">CCF: Bringing efficiency and usability to a decentralized trust model &#8211; Microsoft Research<\/a><\/p>\n<div>\n\t<a\n\t\thref=\"https:\/\/microsoft.github.io\/CCF\/main\/\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"Technical Documentation\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tTechnical Documentation\t<\/a>\n\n\t \n\t<a\n\t\thref=\"https:\/\/github.com\/microsoft\/CCF\"\n\t\tclass=\"button cta-link\"\n\t\tdata-bi-type=\"button\"\n\t\tdata-bi-cN=\"GitHub repository\"\n\t\tdata-bi-tN=\"shortcodes\/msr-button\"\n\t\ttarget=\"_blank\" rel=\"noopener noreferrer\">\n\t\tGitHub repository\t<\/a>\n\n\t\u00a0<\/div>\n\n\n\n\n\n\t\t\t<div class=\"ms-grid \">\n\t\t\t<div class=\"ms-row\">\n\t\t\t\t\t<div  class=\"m-col-12-24\" >\n\t\t<h3><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/amp-authentication-of-media-via-provenance\/\">AMP \u2013 Authentication of Media via Provenance<\/a><\/h3><p>Advances in graphics and machine learning algorithms have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens democracies around the world by enabling widespread distribution of false information to billions of individuals via social media platforms, and by casting doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media via the use of pattern recognition methods, including statistical classifiers developed via machine learning&#8230; <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/amp-authentication-of-media-via-provenance\/\">Read more ><\/a><\/p><p>\t<\/div>\n\t \t<div  class=\"m-col-12-24\" >\n\t\t \t<\/div>\n\t<\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\n<p>&nbsp;<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Confidential Consortium Framework &#8211; a framework to build secure, highly available, and performant applications that focus on multi-party compute and data https:\/\/github.com\/microsoft\/ccf<\/p>\n","protected":false},"featured_media":886113,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558,13547],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-591868","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[591904,796963,978444,1058205,1058211],"related-downloads":[],"related-videos":[],"related-groups":[559983],"related-events":[],"related-opportunities":[],"related-posts":[984711,1138612],"related-articles":[],"tab-content":[{"id":0,"name":"Videos","content":"[row]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\n<a href=\"https:\/\/mybuild.techcommunity.microsoft.com\/sessions\/77268?source=sessions\"><img class=\"aligncenter wp-image-647223 size-full\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/06\/CCFvid2.jpg\" alt=\"Watch Simplifying blockchain development with Azure Blockchain Service video\" width=\"1198\" height=\"670\" \/><\/a>\r\n<p style=\"text-align: center\"><a href=\"https:\/\/mybuild.techcommunity.microsoft.com\/sessions\/77268?source=sessions\">Watch Simplifying blockchain development with Azure Blockchain Service<\/a><\/p>\r\n[\/column]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\n[\/column][\/row]\r\n[row]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\n[\/column]\r\n\r\n[column class=\"m-col-12-24\"]\r\n<p style=\"text-align: center\">[\/column][\/row]<\/p>"},{"id":1,"name":"Related Projects","content":"[row][column class=\"m-col-12-24\"]\r\n<h3><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/amp-authentication-of-media-via-provenance\/\">AMP \u2013 Authentication of Media via Provenance<\/a><\/h3>\r\nAdvances in graphics and machine learning algorithms have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens democracies around the world by enabling widespread distribution of false information to billions of individuals via social media platforms, and by casting doubt on the veracity of all media. One approach to thwarting the flow of fake media is to detect modified or synthesized media via the use of pattern recognition methods, including statistical classifiers developed via machine learning... <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/amp-authentication-of-media-via-provenance\/\">Read more &gt;<\/a>\r\n\r\n[\/column] [column class=\"m-col-12-24\"] [\/column][\/row]\r\n\r\n&nbsp;"}],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Eddy Ashton","user_id":39102,"people_section":"Current Team","alias":"edashton"},{"type":"user_nicename","display_name":"Amaury Chamayou","user_id":38362,"people_section":"Current Team","alias":"amchamay"},{"type":"user_nicename","display_name":"Sylvan Clebsch","user_id":36368,"people_section":"Current Team","alias":"syclebsc"},{"type":"user_nicename","display_name":"Antoine Delignat-Lavaud","user_id":31056,"people_section":"Current Team","alias":"antdl"},{"type":"user_nicename","display_name":"Heidi Howard","user_id":41512,"people_section":"Current Team","alias":"heidihoward"},{"type":"guest","display_name":"Chris Jensen","user_id":1143992,"people_section":"Current Team","alias":""},{"type":"guest","display_name":"Max Tropets","user_id":1143993,"people_section":"Current Team","alias":""},{"type":"user_nicename","display_name":"Manuel Costa","user_id":32794,"people_section":"Sponsors","alias":"manuelc"},{"type":"guest","display_name":"Matt Kerner","user_id":592048,"people_section":"Sponsors","alias":""},{"type":"guest","display_name":"Mark Russinovich","user_id":591880,"people_section":"Sponsors","alias":""},{"type":"user_nicename","display_name":"Dominic Ayre","user_id":42042,"people_section":"Collaborators","alias":"dominicayre"},{"type":"user_nicename","display_name":"Mahati Chamarthy","user_id":42156,"people_section":"Collaborators","alias":"mchamarthy"},{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Collaborators","alias":"fournet"},{"type":"guest","display_name":"Sid Krishna","user_id":591892,"people_section":"Collaborators","alias":""},{"type":"user_nicename","display_name":"Thomas Moscibroda","user_id":32999,"people_section":"Collaborators","alias":"moscitho"},{"type":"user_nicename","display_name":"Takuro Sato","user_id":42252,"people_section":"Collaborators","alias":"takurosato"},{"type":"guest","display_name":"Brent Truell","user_id":648129,"people_section":"Collaborators","alias":""},{"type":"user_nicename","display_name":"Shoko Ueda","user_id":41913,"people_section":"Collaborators","alias":"shokoueda"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/591868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":46,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/591868\/revisions"}],"predecessor-version":[{"id":1143995,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/591868\/revisions\/1143995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/886113"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=591868"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=591868"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=591868"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=591868"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=591868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}