<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Niko zeng</title>
    <description>The latest articles on Forem by Niko zeng (@_b07ae68c099860916ecbce).</description>
    <link>https://forem.com/_b07ae68c099860916ecbce</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3510483%2Fbf4e65ce-8f46-4f95-a6b1-03b1277735c3.jpg</url>
      <title>Forem: Niko zeng</title>
      <link>https://forem.com/_b07ae68c099860916ecbce</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/_b07ae68c099860916ecbce"/>
    <language>en</language>
    <item>
      <title>SecretFlow 1.14.0 Release: A Lighter, More Streamlined Experience 🚀</title>
      <dc:creator>Niko zeng</dc:creator>
      <pubDate>Wed, 24 Sep 2025 06:29:39 +0000</pubDate>
      <link>https://forem.com/_b07ae68c099860916ecbce/secretflow-1140-release-a-lighter-more-streamlined-experience-13b7</link>
      <guid>https://forem.com/_b07ae68c099860916ecbce/secretflow-1140-release-a-lighter-more-streamlined-experience-13b7</guid>
      <description>&lt;p&gt;We are excited to announce the official release of &lt;strong&gt;SecretFlow 1.14.0&lt;/strong&gt;!&lt;br&gt;&lt;br&gt;
This version brings important optimizations and issue fixes that make SecretFlow easier to use and more developer-friendly.  &lt;/p&gt;




&lt;h2&gt;
  
  
  🌐 What is SecretFlow?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;SecretFlow ** is an **open-source privacy-preserving computing framework&lt;/strong&gt; initiated by Ant Group and embraced by a fast-growing open-source community.  &lt;/p&gt;

&lt;p&gt;Its mission is to build a &lt;strong&gt;“usable but invisible” data computing infrastructure&lt;/strong&gt; — enabling multiple parties to collaborate on data securely, without exposing their raw data.  &lt;/p&gt;

&lt;h3&gt;
  
  
  🔑 Key Technologies Integrated in SecretFlow
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;MPC (Multi-Party Computation):&lt;/strong&gt; allows multiple participants to jointly compute results without revealing their private inputs.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FL (Federated Learning):&lt;/strong&gt; enables decentralized model training where data never leaves its original source.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;HE (Homomorphic Encryption):&lt;/strong&gt; makes it possible to perform computations directly on encrypted data.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;TEE (Trusted Execution Environment):&lt;/strong&gt; leverages hardware-based security enclaves to protect both data and computation.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🚀 Application Scenarios
&lt;/h3&gt;

&lt;p&gt;SecretFlow has been applied in real-world scenarios where &lt;strong&gt;data security and compliance are critical&lt;/strong&gt;:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Financial Risk Control:&lt;/strong&gt; joint modeling between institutions to enhance anti-fraud and credit scoring.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Insurance Pricing:&lt;/strong&gt; precise car insurance pricing based on combined human and vehicle data.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Healthcare Research:&lt;/strong&gt; cross-hospital collaboration on medical studies without disclosing sensitive patient data.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Telecom &amp;amp; Operators:&lt;/strong&gt; compliant data integration across multiple entities.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In short, SecretFlow provides the foundation for &lt;strong&gt;trusted collaboration on data&lt;/strong&gt; in an era where both &lt;strong&gt;privacy&lt;/strong&gt; and &lt;strong&gt;data value&lt;/strong&gt; are equally important.  &lt;/p&gt;




&lt;h2&gt;
  
  
  🔧 Optimizations in 1.14.0
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;&lt;code&gt;secretflow_fl&lt;/code&gt; migrated to an independent repo &lt;code&gt;sfl&lt;/code&gt;&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
This improves modularization, allowing the federated learning module to evolve independently.  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Unified installation packages and images&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
From now on, there will no longer be separate &lt;code&gt;secretflow&lt;/code&gt; and &lt;code&gt;secretflow[lite]&lt;/code&gt; packages.&lt;br&gt;&lt;br&gt;
The Docker images are also unified — bringing you a &lt;strong&gt;simpler, lighter deployment experience&lt;/strong&gt;.  &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🛠️ Bug Fixes
&lt;/h2&gt;

&lt;p&gt;We also addressed community-reported issues in this release:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/secretflow/secretpad/issues/309" rel="noopener noreferrer"&gt;SecretPad Issue #309&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/secretflow/secretflow/issues/1922" rel="noopener noreferrer"&gt;SecretFlow Issue #1922&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A big thanks to our community users who actively reported issues and helped us improve!  &lt;/p&gt;




&lt;p&gt;⭐ If you find SecretFlow useful, don’t forget to &lt;strong&gt;give us a Star on GitHub&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
👉 &lt;a href="https://github.com/secretflow/secretflow" rel="noopener noreferrer"&gt;https://github.com/secretflow/secretflow&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Your support means a lot and helps the community grow stronger! 💪&lt;/p&gt;

</description>
      <category>secretflow</category>
      <category>privacycomputing</category>
      <category>federatedlearning</category>
      <category>opensource</category>
    </item>
    <item>
      <title>How to Run Secure Multi-Party Computation in Python with SecretFlow</title>
      <dc:creator>Niko zeng</dc:creator>
      <pubDate>Thu, 18 Sep 2025 10:10:44 +0000</pubDate>
      <link>https://forem.com/_b07ae68c099860916ecbce/wo-4j5</link>
      <guid>https://forem.com/_b07ae68c099860916ecbce/wo-4j5</guid>
      <description>&lt;p&gt;The rise of &lt;strong&gt;privacy-preserving computation&lt;/strong&gt; is driven by two major trends:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Stricter regulations&lt;/strong&gt;: Laws like the EU’s_General Data Protection Regulation (GDPR)_and China’s_Data Security Law_and_Personal Information Protection Law_place strong requirements on protecting personal data.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Urgent business needs&lt;/strong&gt;: Data silos across industries are stifling innovation. Privacy-preserving computation becomes the bridge between safeguarding privacy and unlocking the value of data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By 2025, with the widespread adoption of*&lt;em&gt;Generative AI&lt;/em&gt;&lt;em&gt;, a new question has become central to the field of data privacy:&lt;/em&gt;&lt;em&gt;Who owns the content generated by AI trained on user data?&lt;/em&gt;*How can data providers ensure their privacy is protected when their data powers these models?&lt;/p&gt;

&lt;p&gt;To address these challenges, we introduce*&lt;em&gt;SecretFlow&lt;/em&gt;&lt;em&gt;— a modern, user-friendly framework for privacy-preserving computation that enables encrypted data to be computed securely. It embodies the principle of “&lt;/em&gt;&lt;em&gt;usable but invisible&lt;/em&gt;*” when it comes to data privacy.&lt;/p&gt;

&lt;p&gt;Press enter or click to view image in full size&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6alyg2txem0vba2b8vau.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6alyg2txem0vba2b8vau.png" width="800" height="404"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📍 GitHub:&lt;a href="https://github.com/secretflow/secretflow" rel="noopener noreferrer"&gt;https://github.com/secretflow/secretflow&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The most surprising part? If you know*&lt;em&gt;Python&lt;/em&gt;*, you can start using SecretFlow today to explore the future of privacy computing.&lt;/p&gt;

&lt;p&gt;This hands-on tutorial will guide you step-by-step into this powerful technology, helping you find the perfect balance between*&lt;em&gt;data security and data utility&lt;/em&gt;*.&lt;/p&gt;

&lt;p&gt;Let’s begin our journey into the world of SecretFlow!&lt;/p&gt;

&lt;h2&gt;
  
  
  What is SecretFlow?
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;SecretFlow&lt;/strong&gt;is a*&lt;em&gt;trusted privacy-preserving computation framework&lt;/em&gt;&lt;em&gt;, acting like a “security guard” for your data. It allows multiple parties to collaboratively compute and analyze data&lt;/em&gt;&lt;em&gt;without ever revealing their private data&lt;/em&gt;*to each other.&lt;/p&gt;

&lt;p&gt;With SecretFlow, different organizations can “&lt;strong&gt;play a game blindfolded&lt;/strong&gt;” — working together efficiently, while never exposing their own sensitive data.&lt;/p&gt;

&lt;h2&gt;
  
  
  ✅ Key Advantages
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Unified and Integrated&lt;/strong&gt;
Built-in support for mainstream privacy-preserving technologies like Secure Multi-Party Computation (MPC), Federated Learning (FL), and Differential Privacy (DP) — no need to learn multiple frameworks.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Zero Learning Curve&lt;/strong&gt;
Native support for SQL, Python, and AI-friendly interfaces lets developers onboard quickly with minimal effort.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Modular &amp;amp; Flexible&lt;/strong&gt;
LEGO-like architecture allows you to plug and play based on business needs, speeding up iteration.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Proven High Performance&lt;/strong&gt;
Successfully deployed in financial and healthcare industries, with tested scalability on*&lt;em&gt;billion-level data volumes&lt;/em&gt;*.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Real-World Use Cases
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Medical Research&lt;/strong&gt;
Hospitals can conduct joint studies*&lt;em&gt;without sharing raw patient data&lt;/em&gt;*, ensuring privacy during data analysis.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Financial Fraud Detection&lt;/strong&gt;
Banks can collaborate on fraud detection models*&lt;em&gt;while protecting customer data&lt;/em&gt;*.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Cross-Company Collaboration&lt;/strong&gt;
Enterprises can co-analyze datasets without exposing internal data, improving the*&lt;em&gt;efficiency and safety of cooperation&lt;/em&gt;*.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;AI Model Training&lt;/strong&gt;
AI companies can train models on user data securely, with SecretFlow ensuring data privacy throughout the pipeline.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Quick Start: Run SecretFlow in Minutes
&lt;/h2&gt;

&lt;h2&gt;
  
  
  🚀 Official Docker Images Available
&lt;/h2&gt;

&lt;p&gt;You can get started with one command using the official Docker images.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Full version
docker run -it secretflow/secretflow-anolis8:latest

# Lite version (no deep learning, smaller size)
docker run -it secretflow/secretflow-lite-anolis8:latest
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Secure Multi-Party Computation (MPC) Example
&lt;/h2&gt;

&lt;p&gt;Let’s walk through a simple MPC example using SecretFlow: computing the*&lt;em&gt;average income of three people&lt;/em&gt;*without revealing individual incomes.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is MPC?
&lt;/h2&gt;

&lt;p&gt;Secure Multi-Party Computation (MPC) is a cryptographic technique that allows multiple parties to jointly compute a function*&lt;em&gt;without revealing their private inputs&lt;/em&gt;*.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
Alice, Bob, and Carol want to calculate their*&lt;em&gt;average salary&lt;/em&gt;&lt;em&gt;, but none of them wants to disclose their exact income. MPC allows them to get the result&lt;/em&gt;&lt;em&gt;without exposing any personal data&lt;/em&gt;*.&lt;/p&gt;
&lt;h2&gt;
  
  
  Key Concepts
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Party&lt;/strong&gt;: An entity holding data and participating in computation.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Protocol&lt;/strong&gt;: Rules ensuring secure computation.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Secret Sharing&lt;/strong&gt;: Splitting sensitive data into fragments. Only with enough fragments can the original data be reconstructed.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  Step-by-Step Demo: Secure Average Calculation
&lt;/h2&gt;
&lt;h3&gt;
  
  
  1. Initialize the Privacy Environment
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import secretflow as sf

sf.init(
    parties={'Alice', 'Bob', 'Carol'},
    address='local'
)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;2. Assign Devices to Each Party&lt;/p&gt;

&lt;p&gt;Each participant will use a dedicated computing device to store their own data. We create devices for Alice, Bob, and Carol:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;alice = sf.PYU('Alice')
bob = sf.PYU('Bob')
carol = sf.PYU('Carol')
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;3. Each Party Inputs Their Income Securely&lt;/p&gt;

&lt;p&gt;To protect privacy, each participant enters their own income data through their own device:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;\# Assume that Alice, Bob, and Carol have incomes of 5,000, 6,000, and 7,000 respectively.
alice_income = alice(lambda: 5000)()
bob_income = bob(lambda: 6000)()
carol_income = carol(lambda: 7000)()
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Note: Each value only exists*&lt;em&gt;within the assigned device&lt;/em&gt;*, invisible to others.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Use Secure Computation (SPU) to Compute the Average
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;spu = sf.SPU(sf.utils.testing.cluster_def(\['Alice', 'Bob', 'Carol'\]))
average_income = spu(lambda x, y, z: (x + y + z) / 3)(alice\_income, bob\_income, carol_income)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;During this process:&lt;/p&gt;

&lt;p&gt;Alice, Bob, and Carol’s income data is fed to the SPU device in an encrypted or secret-shared form.&lt;br&gt;&lt;br&gt;
The SPU device securely completes the computation, preventing the participants from accessing each other’s original data.&lt;/p&gt;

&lt;p&gt;5. Reveal the Encrypted Result&lt;/p&gt;

&lt;p&gt;Printing the result directly will show an encrypted object:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;print("Average income is:", sf.reveal(average_income))
\# Output: 6000.0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;At this point the data is still encrypted, so we need to use the sf.reveal method to securely decrypt and view the result: This demonstrates*&lt;em&gt;data usability without visibility&lt;/em&gt;*— the very core of privacy-preserving computation.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;\# Securely decrypt and view the result
print("The average income of the three people is:", sf.reveal(average_income))
\# Output: The average income of the three people is: 6000.0
\# That is, (5000 + 6000 + 7000) / 3 = 6000
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  SecretFlow System Architecture
&lt;/h2&gt;

&lt;p&gt;SecretFlow’s layered architecture ensures modular, scalable privacy computing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Abstract Device Layer&lt;/strong&gt;
Includes both public and secure computation devices (e.g., SPU, HEU).&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Device Flow Layer&lt;/strong&gt;
Models algorithms as*&lt;em&gt;device object streams&lt;/em&gt;*and DAGs.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Algorithm Layer&lt;/strong&gt;
Supports horizontal/vertical partitioned data for analytics and ML.&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;Workflow Layer&lt;/strong&gt;
Integrates data processing, model training, and hyperparameter tuning.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🔗 Related Ecosystem Projects
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;  &lt;strong&gt;Kuscia&lt;/strong&gt;: Lightweight task orchestration framework for privacy-preserving computation&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;SCQL&lt;/strong&gt;: SQL-style engine for multi-party secure analysis&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;SPU&lt;/strong&gt;: Secure computing backend for MPC&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;HEU&lt;/strong&gt;: High-performance homomorphic encryption library&lt;/li&gt;
&lt;li&gt;  &lt;strong&gt;YACL&lt;/strong&gt;: Core C++ library for crypto, networking, and IO&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Think of SecretFlow as a*&lt;em&gt;“smart privacy factory”&lt;/em&gt;*:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  All raw materials (data) stay encrypted&lt;/li&gt;
&lt;li&gt;  Different workers (parties) collaborate safely&lt;/li&gt;
&lt;li&gt;  Modular and adaptable like LEGO&lt;/li&gt;
&lt;li&gt;  Fast and stable production line (high-performance computing)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Final Words
&lt;/h2&gt;

&lt;p&gt;This article only scratches the surface of what*&lt;em&gt;SecretFlow&lt;/em&gt;*can do.&lt;/p&gt;

&lt;p&gt;Whether you’re a*&lt;em&gt;developer&lt;/em&gt;&lt;em&gt;,&lt;/em&gt;&lt;em&gt;data scientist&lt;/em&gt;&lt;em&gt;, or&lt;/em&gt;&lt;em&gt;researcher&lt;/em&gt;&lt;em&gt;, SecretFlow makes it easy to embrace&lt;/em&gt;&lt;em&gt;privacy-preserving technologies&lt;/em&gt;&lt;em&gt;and unlock&lt;/em&gt;&lt;em&gt;data value without compromising privacy&lt;/em&gt;*.&lt;/p&gt;

&lt;p&gt;If you love open source, give SecretFlow a ⭐️ on GitHub! Every star counts ❤️&lt;br&gt;&lt;br&gt;
👉 GitHub:&lt;a href="https://github.com/secretflow/secretflow" rel="noopener noreferrer"&gt;https://github.com/secretflow/secretflow&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to Run Secure Multi-Party Computation in Python with SecretFlow</title>
      <dc:creator>Niko zeng</dc:creator>
      <pubDate>Thu, 18 Sep 2025 10:07:27 +0000</pubDate>
      <link>https://forem.com/_b07ae68c099860916ecbce/how-to-run-secure-multi-party-computation-in-python-with-secretflow-kaa</link>
      <guid>https://forem.com/_b07ae68c099860916ecbce/how-to-run-secure-multi-party-computation-in-python-with-secretflow-kaa</guid>
      <description></description>
    </item>
  </channel>
</rss>
