Protocols

The Zyllion Network Blind Modulesarrow-up-right -- and the available SDKs that can be used to interoperate with them -- make it possible to leverage a number of secure data storage and computation protocols. These include what are broadly known as privacy-enhancing technologies (PETs).

Trust Assumptionsarrow-up-right

The Zyllion Network consists of clusters of nodes, and builders have the option to rely on a subset of one or more of these nodes to securely store and compute over data. When working with a single node in conjunction with a PET such as homomorphic encryption, it is up to the builder to determine how secret and public keys are generated, maintained, and used. When working with a cluster of two or more nodes, builders can choose to rely on the non-collusion of network nodes (and may not even need to inform any individual node of the identities of other nodes in the cluster).

Privacy-Enhancing Technologiesarrow-up-right

The Blind Modules leverage a number of PETs to enable secure data storage and processing.

Secure Multi-Party Computation (MPC)arrow-up-right

zylDB supports the use of additive secret sharingarrow-up-right to store data and to compute over that data. Builders can choose two or more nodes across which data would be stored using this approach.

zylVM supports the use of a number of MPC protocols, including threshold secret sharing schemes. Most notably, it relies on an integrated implementation of CGGMP21arrow-up-right to enable threshold secure signing of messages.

Homomorphic Encryption (HE)arrow-up-right

zylDB supports of the use of the Paillier cryptosystemarrow-up-right to store data, compute over that data, and retrieve results while relying on a single-node cluster. This makes it possible to perform aggregation queries over encrypted data even when using a single-node cluster.

Last updated