We do the {math} so you don't have to.



We do the {math} so you don't have to.

Privacy, security and usability are no longer mutually exclusive.

Inpher’s Secret Computing™ technology enables search and advanced analytics on encrypted data without revealing the data.  Large enterprises in regulated industries are leveraging this capability to securely outsource workloads to the cloud, build privacy-compliant machine learning models on multiple sensitive data sources, and even monetize insights without giving away their data.  

Advances in cryptography and zero-knowledge computing have promised to revolutionize the way we securely and privately analyze sensitive data.  The XOR Secret Computing™ Engine provides the first practical and scalable commercial solution to run analytics and machine learning algorithms on private and confidential data sets without ever seeing them.  Check out how customers are using XOR today.

For more information about joining our private beta, please contact us below.


The Inpher _ultra development platform for encrypted data collaboration enables applications and devices to encrypt, index, search and share large unstructured data sets without decryption,  so plaintext information is never exposed to an untrusted host or attacker. Our client-side libraries and backend compatibility empower developers to quickly create secure applications without being crypto experts or changing their search and storage infrastructure.  

  • Developer portal access with full documentation
  • Native support for search platforms Elasticsearch and Solr
  • Backend integration with Azure, HDFS and S3 storage
  • Java libraries (Android and JS coming soon)
  • Encrypted sharing groups with granular data access
  • Embedded key management for recovery, revocation, etc.
  • Lightweight, deployable on IoT devices


TFHE is the world's fastest open-source fully homomorphic encryption library.  The underlying scheme is described in the best paper of the IACR conference Asiacrypt 2016: “Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds”, presented by Ilaria Chillotti, Nicolas Gama, Mariya Georgieva and Malika Izabachène.

Git your encrypted computation on at: