Runs inside the user’s Sovereign Vault or MPC nodes.

Steps:

  1. Vault extracts only necessary attribute(s)
  2. Generates a constraint system
  3. Converts constraints into circuits
  4. Runs GC, MPC, or ZK depending on template
  5. Signs the final proof with control_key

The compiler never leaks raw data.