jetchev1.jpg
jetchev1.jpg

XOR | Inpher


We do the {math} so you don't have to.

SCROLL DOWN

XOR | Inpher


We do the {math} so you don't have to.

Inpher’s XOR Secret Computing® Engine.

XOR secret computing engine vendor

Compute without ever exposing or transferring the underlying sensitive data.

Inpher’s XOR Secret Computing® Engine (or XOR, for short — pronounced ‘ex-or’) is built from our proprietary advances in secure multiparty computation. Leveraging encryption in-use technologies, XOR securely distributes a computation across multiple parties where no individual party can see the other parties’ data during the process.  

Benefits of XOR include, but are not limited to:

  • Commercially-ready: Secure multiparty computation is no longer a data scientist’s dream; it is a proven reality. Check out our Case Studies page to learn how data scientists are using XOR in production today.

  • No trusted third-parties: It is no longer necessary to trust a third-party to keep data safe and broker exchanges. Clients never transfer data outside their internal firewalls.

  • Eliminates tradeoff between data usability and data privacy: There is no need to mask or drop any features in order to preserve the privacy of data. All features may be used in an analysis, without compromising privacy.

  • GDPR and sovereign data privacy compliance: XOR meets and exceeds requirements for cross-border data transfer (because the data never moves).

  • High accuracy and precision: Results meet and exceed client requirements for accuracy and precision.

  • Quantum-safe: Data is said to be encrypted in-use because it is broken up and distributed across players (or “secret shared”) during the computation, which makes it safe against quantum attacks.

XOR is available as software-as-a-service for both on-premise and hybrid cloud implementations. Contact us to start secret computing!


TFHE: Inpher’s Fully Homomorphic Encryption library.

Homomorphic encryption machine learning

TFHE is the world's fastest open-source fully homomorphic encryption library — and it keeps getting faster. It was built in part by Inpher’s own Nicolas Gama and Mariya Georgieva.

The underlying scheme is described in the best paper of the IACR conference Asiacrypt 2016: “Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds,” presented by Ilaria Chillotti, Nicolas Gama, Mariya Georgieva and Malika Izabachène.

Git your encrypted compute on below and join the conversation on Hacker News!