Handling high value data (e.g., passwords, personalized AI, healthcare information, and biometrics) has traditionally been both insecure and inefficient. While encryption secures stored data, it requires decryption for computation and re-encryption afterward, introducing vulnerabilities and delays. Although blockchain technology decentralizes transaction and data management, it does not inherently solve the challenges of secure computation on encrypted data. This constraint limits the type of applications that can be safely built within Web3.
Nillion addresses these limitations by enabling data transfer, storage, and computation without decryption, guaranteeing that sensitive information remains private and secure throughout its entire lifecycle. This approach, known as Blind Compute, decentralizes trust and expands the use cases for decentralized networks to previously untapped 'whitespace' areas like private AI agents, private LLM inference, and other industries that require secure data. By using advanced Privacy-Enhancing Technologies (PETs) such as Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Trusted Execution Environments (TEEs), Nillion allows data to remain encrypted even during computation.
Website / X (Twitter) / Discord
BackgroundNillion, founded in 2021, is a network that provides a novel way to handle private data across distributed systems without compromising security or efficiency. Supported by application frameworks such as nilVM, nilDB, nilAI, and nilChain, Nillion equips developers with tools to build privacy-preserving applications across sectors like AI, DeFi, and data storage.
The project’s team comprises Alex Page (CEO), former Hedera SPV General Partner and Goldman Sachs Banker; Andrew Masanto (CSO), Co-Founder of Hedera and Founding CMO of Reserve; Slava Rubin (CBO), Founder of Indiegogo; Dr. Miguel de Vega (Chief Scientist), Ph.D. and author of 30+ patents in data optimization; Conrad Whelan (Founding CTO), founding Engineer at Uber; Mark McDermott (COO), former Innovation Lead at Nike; and Andrew Yeoh (CMO), early Hedera SVP Partner and former UBS and Rothschild Banker, among others.
Since its inception, the team has raised $50 million from investors, including Hack VC, Hashkey Capital, Distributed Global, and Maelstrom, through its private funding rounds.
TechnologyNillion Network is a decentralized infrastructure designed to support secure, privacy-preserving operations on high value data. It consists of two core layers: (i) the Coordination Layer, which manages governance and payments, and (ii) the Petnet, which handles computation and storage. Nillion’s Multi-Party Computation (MPC) protocol is central to the network’s functionality, enabling private data computations without revealing individual inputs. Nillion’s ecosystem is supported by a suite of application tools (i.e., nilAI, nilVM, nilDB, and nilChain) that empower developers to build privacy-focused applications. Academic research papers in cryptography and privacy technologies validate Nillion’s technology.
Nillion NetworkNillion Network is a decentralized infrastructure designed to support private, high value data storage and computation. Scalability is achieved through clustering, which configures groups of nodes to meet specific performance, security, and cost requirements. Unlike traditional blockchains, the network operates without relying on a global shared state, enabling vertical scalability (by upgrading individual nodes or clusters) and horizontal scalability (by adding new nodes or clusters) to distribute workloads efficiently. Below is how each layer (i.e., Coordination Layer and Petnet) contributes to the network's architecture.
Coordination LayerNillion Network’s Coordination Layer, referred to as nilChain, is responsible for (i) managing rewards, (ii) payments, (iii) crypto-economic security, and (iv) inter-cluster coordination for the network.
Specifically, it coordinates payments for storage operations and blind computations performed on the network without handling the computations directly. Built with the Cosmos SDK, the Coordination Layer supports IBC for interoperability; however, it does not currently support smart contract execution, given the network’s core focus on storage and computation. While directly accessible via Keplr or Leap wallets, applications built on partner blockchains – explored further in the Key Projects section – will be fully abstracted. The nilChain has been running on testnet since June 2024.
PetnetThe Petnet (Orchestration Layer) is designed to integrate cryptographic technologies such as Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge Proofs (ZKPs) to enable privacy-preserving computations and data management. This integration is achieved through two key components: (i) the compiler and (ii) the computing network. Specifically, the compiler simplifies the use of Privacy-Enhancing Technologies (PETs) by offering varying levels of abstraction while the computing network executes secure computations and manages encrypted data.
This approach is being implemented across Nillion Network via its Nada language compiler and the nilVM, with elements of all four abstraction levels already in development. The four levels of abstraction are as follows:
Nillion’s PETs are introduced in phases – each progressing through the four levels of abstraction as outlined above. Phase 1 (i.e., HE, LSSS MPC) and Phase 2 (i.e., DWT+LSSS, TEE) are further along the abstraction process and are already being integrated into Nillion Network. Among the technologies in Phase 3 (i.e., FHE-MPC, DWT+TEE, Public Compute, ZKP), FHE-MPC has begun advancing through the abstraction levels.
How It WorksHere is a detailed breakdown of how the components of Nillion Network operate:
Multi-Party Computation (MPC) is a subfield of cryptography that allows individuals to collaboratively compute a result from their combined data without revealing their inputs. Nillion has developed an MPC protocol called Curl, which is based on Linear Secret-Sharing Schemes (LSSS) but extends their capabilities to efficiently handle complex operations, such as divisions, square roots, trigonometric functions, and logarithms. This makes Curl highly scalable and ideal for real-world problems, such as privacy-preserving AI agents, where outputs do not scale linearly with inputs. Curl follows a structured two-phase workflow:
To learn more about Nillion’s implementation of MPC, read the original academic paper here.
Application ToolsBuilding on the foundation of Nillion Network, the application tools (i.e., nilVM, nilDB, nilAI, and nada integrated packages) provide developers with modular frameworks and utilities to quickly build privacy-preserving, high value data applications.
nilAInilAI is Nillion's suite of AI-focused privacy technologies (i.e., AIVM, nada-AI, and nilTEE). Here is how each works:
nilVM is a virtual machine that allows developers to create programs using PETs. Programs are written in Nada, Nillion’s open-source Python-based DSL, and developed using the Nillion SDK. Nada also includes libraries such as nada-ai (similar to PyTorch and scikit-learn), nada-numpy, nada-data, and nada-test to simplify program development. Developers can integrate nilVM into their applications using Python, Typescript, or CLI clients and leverage Storage APIs for secure data storage and retrieval on Nillion Network. Examples include a federated learning program, community-developed projects, and interactive demo use cases.
nilDBnilDB is an encrypted, distributed NoSQL database designed for privacy-preserving data storage and computation. Unlike regular NoSQL databases, nilDB eliminates reliance on a central authority by distributing encrypted data as secret shares across multiple nodes. Additionally, data owners can grant others access to run SQL-like queries, calculations, and privacy-preserving aggregations on the stored data.
Here is how it operates:
More information regarding the technical architecture can be read here.
Nada Integrated PackagesThe Nada language includes a variety of integrated packages, including nada-AI (previously discussed), nada-numpy, and nada-test with the following use cases:
Other tools (e.g., Nada DSL, Nada Sandbox, etc.) and the SDK can be explored on GitHub.
Research PapersNillion’s project team, in collaboration with multiple researchers, has published eight papers detailing various aspects of the protocol and its applications.
The NIL token will serve several functions within the network, including:
Governance decisions are conducted through an onchain voting mechanism. Specifically, any NIL tokenholder can propose changes to the network provided they meet the minimum token deposit requirements. Proposals can also be submitted by community committees or working groups established through prior governance actions.
Voting rights extend to key decisions such as:
Voting power is proportional to the amount of NIL staked, where stakers delegate their voting powers to validators while retaining the ability to vote on proposals themselves.
State of the Nillion EcosystemKey SectorsKey sectors that highlight the variety of benefits Nillion provides include:
Key projects that highlight the variety of benefits Nillion provides include:
Launched in January 2024, the Nucleus Builders Program supports developers in creating decentralized, privacy-preserving applications with Nillion’s technology. Participants gain access to (i) the Nillion SDK, (ii) development tools (e.g., nilVM, nilDB, and nilAI), and (iii) funding and technical resources to accelerate overall development. Since its inception, Nucleus has attracted nearly 50 participants across over ten verticals, with ecosystem projects collectively raising $100+ million.
Network MetricsThe Nillion Verifier Program, announced on Aug. 27, 2024, allowed participants to support the network's integrity and functionality by either (i) uploading "Secrets," which are fragmented pieces of sensitive data across various categories, or (ii) setting up a verifier to challenge secrets and secure the network, ensuring network data shares remain reliable and intact.
Participation in the Verifier program closed on Dec. 11, 2024, and reached ~500,000 verifiers actively contributing to the network, collectively processing ~195 million secrets and securing ~1,050 GB of data. The real-time verifier dashboard can be found here.
RoadmapReleased on May 31, 2024, the Nillion roadmap has four key phases:
Nillion is a decentralized infrastructure designed to handle high value, privacy-sensitive data across various applications, from AI agents to private DeFi. Leveraging a combination of advanced PETs (e.g., MPC, FHE, TEE), Nillion expands the usability of decentralized networks and possibilities for decentralized applications. Nillion’s architecture – the Coordination Layer and Petnet – supports scalability through clustering while ensuring data confidentiality and decentralized trust.
The Nillion ecosystem continues to expand, marked by milestones such as (i) the Nucleus Builders Program, which supports ~50 projects across several verticals, and (ii) the participation of ~500,000 Verifiers who have collectively processed ~195 million secrets and secured ~1,050 GB of data. Partnerships with Virtuals, NEAR, Meta, and Aptos and ongoing roadmap developments toward the mainnet launch and multicluster scalability highlight Nillion’s progress in advancing privacy-focused data management and secure computation.
All Rights Reserved. Copyright , Central Coast Communications, Inc.