_____ _ _ ______ | __ \| | | | |___ / | |__) | |__ __ _ _ __ | |_ ___ _ __ ___ / / ___ _ __ ___ | ___/| '_ \ / _` | '_ \| __/ _ \| '_ ` _ \ / / / _ \| '_ \ / _ \ | | | | | | (_| | | | | || (_) | | | | | | / /_| (_) | | | | __/ |_| |_| |_|\__,_|_| |_|\__\___/|_| |_| |_| /_____\___/|_| |_|\___|
Our latest blog Poulpy v0.1 🐙 is out
Phantom zone is a R&D org with the goal to make cryptographic encrypted computer practical. We work with multiple cryptographic primitives, like fully homomorphic encryption (FHE), program obfuscation, that are the building blocks of the encrypted computer.
We’re developing Phantom, an encrypted risc-v virtual machine that executes encrypted risc-v binaries on encrypted inputs. Phantom is easy to use: developer writes the program in rust and compiles it to an encrypted risc-v binary. The encrypted binary is then executed on encrypted inputs using phantom. Encrypted programs - programs with hidden constants, instructions, and states - open a new paradigm for applications (for instance, they allow for global encrypted state, i.e. encrypted social networks, smart contracts, etc.)
Poulpy is a fast & modular FHE library written in Rust. It uses bivariate polynomials to represent torus polynomials, thus provides a common plaintext space for all FHE schemes. Poulpy is backend agnostic and, thus, developers can implement FHE circuits and lattice cryptography independent of the backend. Then choose backend of choice at compile time. Poulpy also has a well-defined hardware abstraction layer (HAL) making addition of new hardware accelerated backends seamless.
Our research aims to improve efficiency of FHE, make public verifiable FHE practical, and practical cryptographic program obfuscation. State of the art FHE schemes are multiple order of magnitudes faster than publicly verifiable counterparts. Our aim is to bridge the gap.
Cryptographic program obfuscation is at a very preliminary stage and there exists no provably secure and practical construction. Our work investigates multiple approaches to program obfuscation, some of which are completely new. Our priority, for now, is to understand obfuscation for relatively simple class of functions.
Send an email to j@phantom.zone mentioning how you can help us. Internships work too!