Library for working with encrypted data within nilDB queries and replies.
Project description
Library for working with encrypted data within nilDB queries and replies.
Purpose
This library provides cryptographic operations that are compatible with nilDB nodes and clusters, allowing developers to leverage privacy-enhancing technologies (PETs) such as partially homomorphic encryption (PHE) and secure multi-party computation (MPC) when storing, operating upon, and retrieving data while working with nilDB.
Installation and Usage
This library is available as a package on PyPI:
python -m pip install blindfold
The library can be imported in the usual manner:
import blindfold
from blindfold import *
Categories of Encryption Keys
This library uses the attributes of a key object (instantiated using an appropriate constructor) to determine what protocol to use when encrypting a plaintext. Keys fall into one of two categories:
SecretKey/PublicKey: Keys in this category support operations within a single node or across multiple nodes. These contain cryptographic material for encryption, decryption, and other operations. Notably, a SecretKey instance includes cryptographic material (such as symmetric keys) that a client should not share with the cluster. Using a SecretKey instance helps ensure that a client can retain exclusive access to a plaintext even if all servers in a cluster collude.
ClusterKey: Keys in this category represent cluster configurations but do not contain cryptographic material. These can be used only when working with multiple-node clusters. Unlike SecretKey and PublicKey instances, ClusterKey instances do not incorporate additional cryptographic material. This means each node in a cluster has access to a raw secret share of the plaintext and, therefore, the plaintext is only protected if the nodes in the cluster do not collude.
Supported Protocols
The table below summarizes the data encryption protocols that this library makes available (and which a developer may leverage by creating a key object with the appropriate attributes). The table also specifies which operation involving ciphertexts is supported by each protocol. Support for summation of encrypted values implies support both for subtraction of encrypted values from other encrypted values and for multiplication of encrypted values by a plaintext signed integer scalar.
Cluster |
Key Types |
Oper. |
Protocols |
Plaintext Types |
|---|---|---|---|---|
single
node
|
store |
32-bit signed integer
UTF-8 text (4096 bytes)
byte array (4096 bytes)
|
||
match |
with SHA-512
|
|||
sum |
with 2048-bit primes
|
32-bit signed integer
|
||
multiple
nodes
|
store |
XOR secret sharing (n-out-of-n)
Shamir’s secret sharing (threshold)
|
32-bit signed integer
UTF-8 text (4096 bytes)
byte array (4096 bytes)
|
|
match |
with SHA-512
|
|||
sum |
additive secret sharing (n-out-of-n)
Shamir’s secret sharing (threshold)
|
32-bit signed integer
|
||
store |
XOR secret sharing (n-out-of-n)
Shamir’s secret sharing (threshold)
|
32-bit signed integer
UTF-8 text (4096 bytes)
byte array (4096 bytes)
|
||
sum |
additive secret sharing (n-out-of-n)
Shamir’s secret sharing (threshold)
|
32-bit signed integer
|
More Details on Secret Sharing
When working with multiple-node clusters and encrypting data for compatibility with the store operation using a SecretKey instance, each secret share is encrypted using a symmetric key (the material for which is stored inside the SecretKey instance). However, when encrypting for compatibility with the sum operation (without or with a threshold), each secret share is instead masked via multiplication with a secret nonzero scalar (with one secret scalar per node stored in the SecretKey instance). While this ensures that the secret-shared plaintexts encrypted in this way are compatible with addition and scalar multiplication, users should use this feature only if they have a thorough understanding of the privacy and security trade-offs involved.
Threshold secret sharing is supported when encrypting for multiple-node clusters (with the exception of encrypting for compatibility with the match operation). A threshold specifies the minimum number of nodes required to reconstruct the original data. Shamir’s secret sharing is employed when encrypting with support for a threshold, ensuring that encrypted data can be decrypted if the required number of shares is available.
Ciphertext Overheads
The table below presents tight upper bounds on ciphertext sizes (in bytes) for each supported protocol when it is used to encrypt a plaintext having k bytes (where a 32-bit integer plaintext is represented using 4 bytes). For multiple-node protocols, the size of the ciphertext delivered to an individual node is reported (excluding any overheads associated with the container type within which separate ciphertext components such as the share index and value reside). The upper bounds below are checked within the testing script.
Cluster |
Key Types |
Operation |
Exact Upper Bound in Bytes |
Approx. |
|---|---|---|---|---|
single
node
|
store |
2 + ceil [(4/3)(k + 41)] |
(4/3) k |
|
match |
88 |
88 |
||
sum |
2048 |
2048 |
||
multiple
nodes
|
store (n-out-of-n)
store (threshold)
|
2 + ceil [(4/3)(k + 41)]
2 + ceil [(4/3) ceil [(5/4)(k + 4) + 45]]
|
(4/3) k
(5/3) k
|
|
match |
88 |
88 |
||
sum (n-out-of-n)
sum (threshold)
|
4
8
|
4
8
|
||
store (n-out-of-n)
store (threshold)
|
2 + ceil ((4/3)(k + 1))
2 + ceil [(4/3) ceil [(5/4)(k + 4) + 5]]
|
(4/3) k
(5/3) k
|
||
sum (n-out-of-n)
sum (threshold)
|
4
8
|
4
8
|
Examples
Extensive documentation, examples, and developer tools that can assist anyone interested in using this library are available in the Nillion Docs on Private Storage with nilDB. Numerous examples can also be found within docstrings in the library’s source code and in its testing script.
The example below generates a SecretKey instance for encrypting data to be stored within a single-node cluster:
>>> cluster = {'nodes': [{}]}
>>> secret_key = blindfold.SecretKey.generate(cluster, {'store': True})
The example below generates a ClusterKey instance for converting data into secret shares (such that summation on secret-shared data is supported) to be stored in a three-node cluster with a two-share decryption threshold:
>>> cluster = {'nodes': [{}, {}, {}]}
>>> cluster_key = blindfold.ClusterKey.generate(cluster, {'sum': True}, threshold=2)
The example below encrypts and decrypts a string:
>>> secret_key = blindfold.SecretKey.generate({'nodes': [{}]}, {'store': True})
>>> plaintext = 'abc'
>>> ciphertext = blindfold.encrypt(secret_key, plaintext)
>>> decrypted = blindfold.decrypt(secret_key, ciphertext)
>>> assert plaintext == decrypted
The example below generates three secret shares of an integer and then reconstructs that integer using only two of the shares:
>>> secret_key = blindfold.SecretKey.generate(
... {'nodes': [{}, {}, {}]},
... {'sum': True},
... threshold=2
... )
>>> plaintext = 123
>>> (share_a, share_b, share_c) = blindfold.encrypt(secret_key, plaintext)
>>> decrypted = blindfold.decrypt(secret_key, [share_a, share_c])
>>> assert plaintext == decrypted
Development
All installation and development dependencies are fully specified in pyproject.toml. The project.optional-dependencies object is used to specify optional requirements for various development tasks. This makes it possible to specify additional options (such as docs, lint, and so on) when performing installation using pip:
python -m pip install ".[docs,lint]"
Documentation
The documentation can be generated automatically from the source files using Sphinx:
python -m pip install ".[docs]"
cd docs
sphinx-apidoc -f -E --templatedir=_templates -o _source .. && make html
Testing and Conventions
All unit tests are executed and their coverage is measured when using pytest (see the pyproject.toml file for configuration details):
python -m pip install ".[test]"
python -m pytest
The subset of the unit tests included in the module itself and can be executed using doctest:
python src/blindfold/blindfold.py -v
Style conventions are enforced using Pylint:
python -m pip install ".[lint]"
python -m pylint src/blindfold test/test_blindfold.py
Contributions
In order to contribute to the source code, open an issue or submit a pull request on the GitHub page for this library.
Versioning
The version number format for this library and the changes to the library associated with version number increments conform with Semantic Versioning 2.0.0.
Publishing
This library can be published as a package on PyPI via the GitHub Actions workflow found in .github/workflows/build-publish-sign-release.yml that follows the recommendations found in the Python Packaging User Guide.
Ensure that the correct version number appears in pyproject.toml, and that any links in this README document to the Read the Docs documentation of this package (or its dependencies) have appropriate version numbers. Also ensure that the Read the Docs project for this library has an automation rule that activates and sets as the default all tagged versions.
To publish the package, create and push a tag for the version being published (replacing ?.?.? with the version number):
git tag ?.?.?
git push origin ?.?.?
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file blindfold-1.0.0.tar.gz.
File metadata
- Download URL: blindfold-1.0.0.tar.gz
- Upload date:
- Size: 35.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b48689ba36c7fd6e43f1f3b5401a3420c4d844e23cf599ca73079a05d7633070
|
|
| MD5 |
d686e4459afc5e8387b3a3af86c2130c
|
|
| BLAKE2b-256 |
799b303cfca56140f002616d64aaca578c9b50a4f8e4bd3ce809043a91ee2565
|
Provenance
The following attestation bundles were made for blindfold-1.0.0.tar.gz:
Publisher:
build-publish-sign-release.yml on NillionNetwork/blindfold-py
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
blindfold-1.0.0.tar.gz -
Subject digest:
b48689ba36c7fd6e43f1f3b5401a3420c4d844e23cf599ca73079a05d7633070 - Sigstore transparency entry: 830123756
- Sigstore integration time:
-
Permalink:
NillionNetwork/blindfold-py@3f2d1bfc6b66225b2158704874e03bc09e8782e0 -
Branch / Tag:
refs/tags/1.0.0 - Owner: https://github.com/NillionNetwork
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
build-publish-sign-release.yml@3f2d1bfc6b66225b2158704874e03bc09e8782e0 -
Trigger Event:
push
-
Statement type:
File details
Details for the file blindfold-1.0.0-py3-none-any.whl.
File metadata
- Download URL: blindfold-1.0.0-py3-none-any.whl
- Upload date:
- Size: 21.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c80ef35c6c9ed3a6ac3067afad79c4ae3f9a56cd243734f624eea8d49244f77e
|
|
| MD5 |
dbcc7e010b3fc5987a2f6f7a053be8d2
|
|
| BLAKE2b-256 |
23ae2329b3c7e21d5ba6552e97bf83f712dcddf10daf131d5bb473575f792dae
|
Provenance
The following attestation bundles were made for blindfold-1.0.0-py3-none-any.whl:
Publisher:
build-publish-sign-release.yml on NillionNetwork/blindfold-py
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
blindfold-1.0.0-py3-none-any.whl -
Subject digest:
c80ef35c6c9ed3a6ac3067afad79c4ae3f9a56cd243734f624eea8d49244f77e - Sigstore transparency entry: 830123758
- Sigstore integration time:
-
Permalink:
NillionNetwork/blindfold-py@3f2d1bfc6b66225b2158704874e03bc09e8782e0 -
Branch / Tag:
refs/tags/1.0.0 - Owner: https://github.com/NillionNetwork
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
build-publish-sign-release.yml@3f2d1bfc6b66225b2158704874e03bc09e8782e0 -
Trigger Event:
push
-
Statement type: