{"id":26025358,"url":"https://github.com/zoraizmohammad/cipher-shield","last_synced_at":"2026-03-09T02:31:09.678Z","repository":{"id":277790640,"uuid":"933078667","full_name":"zoraizmohammad/cipher-shield","owner":"zoraizmohammad","description":"Making Discrimination Mathematically Impossible (TreeHacks 2025)","archived":false,"fork":false,"pushed_at":"2025-02-16T13:42:04.000Z","size":111810,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-06T13:41:38.787Z","etag":null,"topics":["algorithms","blockchain","cipher-algorithms","data","encryption","fhe","front-end-development","hackathon","homomorphic-encryption","treehacks"],"latest_commit_sha":null,"homepage":"https://devpost.com/software/cipher-shield","language":"Makefile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/zoraizmohammad.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-02-15T05:03:58.000Z","updated_at":"2025-02-17T22:32:19.000Z","dependencies_parsed_at":"2025-03-06T13:51:45.443Z","dependency_job_id":null,"html_url":"https://github.com/zoraizmohammad/cipher-shield","commit_stats":null,"previous_names":["zoraizmohammad/treehacks-2025","zoraizmohammad/cipher-shield"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/zoraizmohammad/cipher-shield","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zoraizmohammad%2Fcipher-shield","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zoraizmohammad%2Fcipher-shield/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zoraizmohammad%2Fcipher-shield/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zoraizmohammad%2Fcipher-shield/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/zoraizmohammad","download_url":"https://codeload.github.com/zoraizmohammad/cipher-shield/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zoraizmohammad%2Fcipher-shield/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30280823,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-09T02:23:26.802Z","status":"ssl_error","status_checked_at":"2026-03-09T02:22:46.175Z","response_time":61,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["algorithms","blockchain","cipher-algorithms","data","encryption","fhe","front-end-development","hackathon","homomorphic-encryption","treehacks"],"created_at":"2025-03-06T13:35:47.738Z","updated_at":"2026-03-09T02:31:09.671Z","avatar_url":"https://github.com/zoraizmohammad.png","language":"Makefile","funding_links":[],"categories":[],"sub_categories":[],"readme":"# CipherShield\n\n**Cipher Shield** is a decentralized data aggregation platform that leverages advanced **homomorphic encryption** and **blockchain** technology to provide secure, privacy-preserving insights. This document outlines the inspiration behind our project, how it works, our architecture, the challenges we faced, our learnings, and our future roadmap.\n\n## Table of Contents\n- [Inspiration](#inspiration)\n- [What It Does](#what-it-does)\n- [How We Built It](#how-we-built-it)\n- [Challenges We Ran Into](#challenges-we-ran-into)\n- [Accomplishments That We’re Proud Of](#accomplishments-that-were-proud-of)\n- [What We Learned](#what-we-learned)\n- [What’s Next for Cipher Shield](#whats-next-for-cipher-shield)\n\n## Inspiration\nThe inspiration for our project came from a **problem-based approach** to ideation. As students, we frequently fill out job applications that require demographic data. Most applicants simply opt out, as there appears to be no tangible benefit—only a potential downside if the information is **illegally misused** to negatively affect applications.\n\n\u003e **Note:** Despite these concerns, demographic collection is crucial for detecting trends that may expose discrimination. In fields like **employment**, **healthcare**, **loans**, and **credit cards**, collecting this data is often mandated by the federal government.  \n\u003e  \n\u003e In an era defined by **decentralization** and advanced **encryption schemes**, we believe there is no reason for such sensitive information to be misused, rendering harmful practices **mathematically impossible**.\n\n## What It Does\n**Cipher Shield** serves as a trusted third party that provides secure data aggregation services via the **blockchain**. It empowers companies to extract aggregate statistical insights from **homomorphically encrypted data**, ensuring that individual profiles remain completely private.\n\n## How We Built It\n### Blockchain Integration\n- **Immutable Records:** Every aggregation request is stored on the blockchain, creating a transparent, permanent record.\n- **On-Chain Validation:**  \n  Before any homomorphic computation begins, our smart contract conducts a critical on-chain validation to ensure that there are enough records to prevent reverse engineering.  \n  - If insufficient data points exist, the contract automatically **rejects the request**.\n- **Audit Trail:**  \n  Once validated and computed, the aggregated result is stored on-chain, ensuring every step is permanently verifiable.\n\n### Technology Stack\n- **Business Logic:** Written entirely in `C++` and `solidity` to handle complex encryption schemes and blockchain operations.\n- **Encryption:** Utilizes the **OpenFHE** library for homomorphic encryption operations and key generation.\n- **Demo Ecosystem:** As a B2B product, our demo features a full demo business, which necessitated a complete backend and frontend solution.\n\n## Challenges We Ran Into\nWe encountered several challenges during the development process:\n- **Homomorphic Encryption Implementation:**  \n  Implementing our custom design in the **OpenFHE** library, particularly with the dual private key setup that wasn’t available out of the box.\n- **Backend Development:**  \n  Developing the backend in `C++` to manage data aggregation and ensuring the proper serialization/deserialization for key exchange.\n- **Ciphertext Management:**  \n  Handling large payloads of ciphertext in communications between the company and server, as well as storing this data securely.\n\n## Accomplishments That We’re Proud Of\n- **Pioneering Implementation:**  \n  Created the **first-ever implementation** of a split key homomorphic encryption scheme that is also verified through blockchain technology.\n- **Deep Technical Insights:**  \n  Gained extensive knowledge about **homomorphic encryption** and **blockchain** technologies.\n- **Full-Stack Integration:**  \n  Successfully integrated the complete stack of the application, ensuring that all components—including Customer Data, Company/Organization interfaces, and the Authority layer—worked seamlessly together in a local environment.\n\n## What We Learned\nDuring the project, we expanded our knowledge in several key areas:\n- **Advanced Encryption Techniques:**  \n  Implementing and modifying homomorphic encryption libraries to support split keys.\n- **Data Security in B2B SaaS:**  \n  Understanding the significance of data security and insurance in B2B solutions, and identifying market opportunities that benefit both businesses and consumers.\n- **Web Integration:**  \n  Integrating **Web-2** with **Web-3** technologies, including the creation of full-stack visualizations and blockchain integrations, even with limited initial experience.\n- **Full-Stack Development:**  \n  Building robust front-end applications and learning to balance creativity with technical feasibility.\n- **Web-3 Security:**  \n  Recognizing the crucial role of Web-3 in enhancing web application security.\n\n## What’s Next for Cipher Shield\nWe envision Cipher Shield as the standard for mediating demographic and protected data collection across American companies—driving transformative societal outcomes in mitigating discrimination.\n\n### Future Plans:\n- **Scalable Data Aggregation:**  \n  Extending our capabilities to securely combine datasets from multiple sources (e.g., hospital records).\n- **Developer SDK:**  \n  Creating an easy-to-use SDK for organizations and industries that are less familiar with blockchain and encryption.\n- **Seamless Integration:**  \n  Developing a web embedding feature to allow companies to directly integrate a Cipher Shield form or application into their websites.\n\n---\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fzoraizmohammad%2Fcipher-shield","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fzoraizmohammad%2Fcipher-shield","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fzoraizmohammad%2Fcipher-shield/lists"}