Workflow
Fully Homomorphic Encryption (FHE)
icon
Search documents
X @Chainlink
Chainlink· 2025-10-27 17:00
Partnerships & Ecosystem - Chainlink Build program is highly beneficial for projects [1] - Mindnetwork_xyz leverages Chainlink platform to develop Fully Homomorphic Encryption (FHE) infrastructure [1] Technology & Innovation - Mindnetwork_xyz is working on Fully Homomorphic Encryption (FHE) infrastructure to protect user data [1]
X @mert | helius.dev
mert | helius.dev· 2025-10-22 17:45
Privacy Systems Overview - The report identifies key privacy systems and their respective purposes [1] - Trusted Execution Environment (TEE) provides hardware-enforced secrecy [1] - Zero-Knowledge (ZK) enables verifiable secrecy [1] - Multi-Party Computation (MPC) facilitates collaborative secrecy [1] - Fully Homomorphic Encryption (FHE) allows computation on secrets [1]
X @Bankless
Bankless· 2025-06-26 18:31
Emerging Privacy Technologies in Crypto - New privacy technologies like MPC, FHE, TEEs, and zkTLS are emerging in the crypto space, each approaching privacy from a unique perspective [1] - Major projects are now being built utilizing these technologies [1] Multi-Party Computation (MPC) - MPC enables multiple parties to jointly compute data without revealing individual inputs, useful where regulation or competition restricts data sharing [2][3] - MPC faces roadblocks as increased participants lead to higher communication and computation costs [3] - Companies like Fireblocks, Arcium, and Renegade are using MPC for institutional custody, private AI, and confidential on-chain trading respectively [3] Fully Homomorphic Encryption (FHE) - FHE allows computation on encrypted data without decryption, maintaining encryption throughout the process [4] - FHE is significantly slower, by 10-100x, than other computation methods, and zk verification further reduces speed [5] - Companies like Zama, FhenixIO, Privasea_ai, and Octra are using FHE for encrypted smart contracts, practical apps, encrypted AI model training, and general-purpose chains [6] Trusted Execution Environments (TEEs) - TEEs are secure hardware zones isolating data, used in crypto for private contracts and block production [7] - TEEs are centralized due to reliance on hardware vendors and are vulnerable to supply chain attacks [8] - Companies like Unichain, SpaceComputerIO, OasisProtocol, and PhalaNetwork are using TEEs for MEV prevention, tamper-proof satellite nodes, private EVM contracts, and confidential cloud services [7][11] Zero-Knowledge Transport Security Layer (zkTLS) - zkTLS combines TLS with zero-knowledge proofs to verify data privately, allowing proof of facts like bank balances without revealing details [9] - zkTLS is limited to visible HTTPS data, depends on TLS standards, and requires oracle involvement, adding latency [10] - Companies like zkp2p, EarniFi, and daisypayapp are using zkTLS for private on/off ramps, lending based on earned wages, and influencer payouts [10][12] Overall Impact - These technologies expand crypto's design space, but adoption depends on improving the user experience of privacy [11] - Complex applications may combine multiple PETs, such as MPC for coordination, FHE for computation, and TEEs for key storage [10]