Welcome to the Interfold Developer Docs!
Note on naming
The Interfold was previously known as Enclave.
Some repositories, package names, and CLI commands may still useenclavewhile the transition is in progress.These references will be updated over time and do not affect functionality.
Here you'll find guides, references, and implementation resources for building on the Interfold protocol.
If you're looking to build applications that coordinate computation across private inputs without taking custody of sensitive data, you're in the right place.
The Interfold is an open-source protocol that coordinates Encrypted Execution Environments (E3s) through a distributed network of ciphernodes. It allows independent parties to produce shared, verifiable outcomes from private inputs without custody, exposure, or trusted hardware.
For example, the Interfold can coordinate sealed-bid auctions where participants submit encrypted bids, the winning outcome is computed without revealing individual inputs, and the result is publicly verifiable.
Why Use the Interfold?
The Interfold enables applications that coordinate computation across independent parties without exposing their private inputs. Instead of pooling sensitive data or delegating execution authority to a centralized operator, the protocol executes encrypted workflows across a distributed network of ciphernodes.
This makes it possible to build systems where multiple parties contribute private inputs to produce a shared, verifiable outcome while preserving confidentiality throughout execution.
Key Use Cases
- Sealed Auctions and Private Markets: Enable auctions and market mechanisms where bids remain private while outcomes remain verifiable.
- Private Voting and Governance: Build voting systems that preserve ballot secrecy while producing publicly verifiable results.
- Processing Sensitive Data: Handle personal, financial, or otherwise confidential data without taking custody of plaintext inputs.
- Multiparty Computation Workflows: Coordinate computation across independent parties contributing private inputs without pooling their data.
- Collaborative Data Analysis: Allow organizations to jointly compute over sensitive datasets without exposing underlying records.
- Meeting Regulatory Requirements: Build applications compatible with data protection requirements such as HIPAA or GDPR.
Cryptographic Stack
The Interfold coordinates encrypted execution using a combination of Fully Homomorphic Encryption (FHE), Zero-Knowledge Proofs (ZKPs), and Distributed Threshold Cryptography (DTC).
These components enable computation on encrypted inputs, verification of correct execution, and distributed control of decryption through the network of ciphernodes.
What You'll Learn
This documentation covers everything you need to get started with the Interfold, including:
- Core concepts behind the Interfold protocol and E3s.
- Building applications on the Interfold protocol.
- Step-by-step guides for configuring and executing E3 workflows.
- Code examples and best practices to streamline development.