Runs inside the user’s Sovereign Vault or MPC nodes.
Steps:
- Vault extracts only necessary attribute(s)
- Generates a constraint system
- Converts constraints into circuits
- Runs GC, MPC, or ZK depending on template
- Signs the final proof with control_key
The compiler never leaks raw data.