_____  _                 _                    ______
|  __ \| |               | |                  |___  /
| |__) | |__   __ _ _ __ | |_ ___  _ __ ___      / / ___  _ __   ___
|  ___/| '_ \ / _` | '_ \| __/ _ \| '_ ` _ \    / / / _ \| '_ \ / _ \
| |    | | | | (_| | | | | || (_) | | | | | |  / /_| (_) | | | |  __/
|_|    |_| |_|\__,_|_| |_|\__\___/|_| |_| |_| /_____\___/|_| |_|\___|

Read our latest blog Phantom, risc-v FHE VM (pre-alpha release)

Home Blog Github


PZ is a R&D org that developes cryptographic tools for a better world of the future.

Given below are our active projects. To stay up to date, check our blog.

Poulpy

Poulpy is a production ready, fast & modular fully homomorphic encryption (FHE) library written in Rust. Poulpy has 3 core features:

  1. Common plaintext space for all FHE schemes. This allows to write more efficient FHE circuits that compose across multiple FHE schemes (a.k.a. scheme switching).
  2. Backend agnostic. FHE circuits abstract over the backend, so that developers can choose the hardware backend at compile time. That is, swap one backend for another by modifying only a couple lines.
  3. Well defined hardware abstraction layer (HAL) that makes addition of new hardware accelerated backends seamless.

To learn more about poulpy, check its codebase here.

Phantom

Phantom is an experimental risc-v FHE virtual machine (FHE-vm). Indeed, it’s an entirely encrypted vm and showcases the trajectory of modern cryptography.

In particular, Phantom executes excrypted risc-v programs ( result of compilation from rust to risc-v ) on encrypted inputs. We call such programs “encrypted programs” - programs with hidden constants, instructions, and states.

Checkout Phantom’s codebase to learn more.

Local mixing program obfuscation

Practical program obfuscation is an open problem and we’re tackling it head on. We’re part of a research team investigating local-mixing approach to obfuscation. The local mixing approach seems to be practical, but not yet proven secure. Our goal, for now, is to develop better understanding of the properties of the approach to, hopefully, argue its security.

However, it’s not merely theoretical. We’re constantly running experiments to gain better understanding of the approach. Find our experiments here.

Contact

Reach out to us at j@phantom.zone.