About Livy
Find developer guides, code examples, API references, and more.
Livy is the verifiable computing platform that brings cryptographic guarantees to off-chain applications. Think of it as HTTPS for applications—while HTTPS secures data in transit, Livy secures computation itself, providing mathematical proof that your code executed exactly as intended.
Built on Intel TDX (Trusted Execution Environment), Livy abstracts away the complexity of hardware-based attestations, making verifiable computing as simple as deploying a serverless function. Every execution generates an individual attestation—cryptographic proof that links your specific input, program, and output together.
Key Benefits:
- Zero Infrastructure Management: Deploy and scale automatically
- Predictable Pricing: Tier-based pricing with clear limits, no surprise bills
- Individual Attestations: Every execution is independently verifiable
- Enterprise Ready: Built for compliance, transparency, and auditability
Architecture
Verifiability
Every Livy Function execution generates a cryptographic attestation proving that your output came from your exact input and program. This creates an immutable audit trail that can be verified by anyone, anywhere.
Traceability
Complete execution history with cryptographic provenance. Track how data flows through your application, when operations occurred, and who initiated them. Perfect for compliance requirements, debugging, and audit trails.
1-Click Deployment
The Livy Console handles everything—infrastructure provisioning, scaling, monitoring, and attestation management. Deploy existing applications with minimal code changes.
Architecture
Execution Layer
Intel TDX Integration: Every Livy Function runs inside a Trusted Execution Environment, ensuring code integrity and preventing tampering even from privileged system access.
Individual Attestations: Each function execution generates its own cryptographic proof, containing:
- Input data hash
- Program binary hash (your application's unique identifier)
- User identifier
- Execution timestamp
- Output state
Ready to make your applications verifiable? Every program deserves cryptographic guarantees.