Scaling Confidential Compute with Celestia Underneath

Date: 12-09-24


Scaling Confidential Compute with Celestia Underneath

Fhenix is an L2 and coprocessor that provides a platform for builders to leverage the power of FHE to build confidentiality-enabled applications on Ethereum. By lowering the barrier of entry to FHE, we’ll soon see a flood of new confidentiality-enabled applications. It’s important to have performant infrastructure in place for the inevitable confidentiality boom, which is why we chose Celestia as the high throughput data availability solution for the Fhenix network.

Removing Bottlenecks

Today, Ethereum is almost completely translucent. This cannot continue to be the case if onchain is to become the next online. Confidentiality is the next major bottleneck for widespread adoption of Ethereum and FHE is the most ideal and ambitious solution.

Just as Fhenix is solving for the lack of confidentiality on Ethereum, so Celestia solves the data availability bottleneck for blockchains. Data Availability (DA) ensures that validators and users can access transaction data to verify the state of the blockchain and detect potential fraud. Celestia provides high throughput DA to address this problem with data availability sampling (DAS), which allows for DA to scale as more light nodes join the network.

The Future is Modular

Layer 2s scale Ethereum by separating the execution and consensus layers in order to facilitate the fast execution of transactions and computations. DA solutions like Celestia extend the modular approach to DA, reducing excessive fees while increasing the potential for the types of apps that developers can build. The modular approach provides a flexible solution to horizontal scaling for Ethereum, removing constraints while maintaining the security guarantees of the underlying L1.

Fhenix itself is also inherently modular by design. It separates the computationally expensive FHE execution from consensus in order to provide confidentiality while retaining the security guarantees of Ethereum.

The decision to utilize Celestia for Fhenix’s DA underscores an important strategy for our goal of bringing confidentiality to Ethereum and unlocking widespread adoption: lowering the barrier of entry for developers and making it as easy as possible for them to build confidentiality-enabled applications.

To the Builders go the Spoils

The foundational tools to build confidential applications onchain are now available to the intrepid developer ready to make use of them. There’s never been a better time to build the next generation of confidentiality-enabled onchain applications.

There’s even financial resources available to help builders bootstrap their projects through the Fhenix Grant and Bounty programs. Are you ready to build the next viral onchain application? Submit your application today.

If you have any questions about Fhenix and FHE we’d love to hear them in our Discord. Be sure to tune in to our next ecosystem call on October 1st. Don’t forget to follow us on Twitter/X for the latest news and updates if you aren’t already!

Confidentially yours,
Fhenix

Unlocking Incentives on Fhenix: Introducing Grants & Bounties

Date: 22-08-24


Unlocking Incentives on Fhenix: Introducing Grants and Bounties

Get compensated to build the future of onchain confidentiality.

Since launching the Fhenix Helium testnet in June we’ve hit the hackathon circuit hard. It’s been a treat to see you put the network through its paces creating things like a Pet Identity Provider, personal advertising protocolconfidential voting application, and many more exciting projects.

The Helium testnet has seen a good deal of activity which we’ve used to battle test our developer docs. We’re ready to take it to the next level by providing you, the builder, with a good reason to stick around and form the foundation of the Fhenix ecosystem.

To that end we’re providing financial resources for you to turn your confidentiality-enabled application from fun side project to venture-funded crypto mainstay through the Fhenix Grant and Bounty programs. These programs will be used to provide the initial resources needed for you to explore the power of confidential computation and bootstrap the first viral confidential onchain application.

How to Apply

The Fhenix Grant program is for Fhenix projects which harness FHE to to bring confidentiality onchain or help others to do so through the creation of crucial FHE infrastructure. Fhenix grants are substantial and are intended for ambitious projects with specific, measurable milestones. Both smart contract applications incorporating confidentiality and infrastructure projects facilitating them are eligible.

To apply for a Fhenix grant, visit the Grants page at Fhenix.io and apply.

Make sure to clearly communicate how your project will benefit the Fhenix network and push the bounds of onchain confidentiality. Fhenix grant applications which stand the best chance of acceptance are thoughtful and milestone-based, with a distribution budget attached to specific development timelines.

While Fhenix grants are for larger-scale projects which utilizes FHE for onchain confidentiality, Fhenix bounties are for more specific objectives. Eligibility for Fhenix grants are open-ended, whereas bounties have smaller, specific scopes attached to them.

You can view the list of bounties, along with a description and associated amount on the Fhenix Bounty page.

Review Process

Our team will review all Fhenix grant and bounty applications on a rolling basis. If we determine more information is needed, we will reach out to schedule a call with the team to gather the additional information needed to make a decision.

We anticipate receiving many applications and will work as quickly as possible to process them. While it’s difficult to estimate the time needed to process individual grant and bounty proposals, you should receive a response in around two weeks time, at which point applicants will be notified via email whether or not their proposal has been accepted.

Fire up your dev environments

Ethereum has made huge strides towards becoming a permissionless platform for innovation and creating a new, open internet, but its lack of confidentiality is an obstacle to widespread adoption.

The Fhenix Grant and Bounty Programs will provide resources for the intrepid devs building on the frontier of onchain confidentiality. There’s a huge opportunity here, and we’ll do everything we can to help you take advantage of it.

The Fhenix docs have everything you need to get started building.

As always, if you have any questions about FHE or Fhenix, ask away in the Fhenix Discord. And don’t forget to follow us on Twitter/X!

Confidentially yours,
The Fhenix team

Fhenix and zkPass: Bringing Secure and Confidential Identity and Reputation Verification Onchain

Date: 18-07-24


Fhenix and zkPass: Bringing Secure and Confidential Identity and Reputation Verification Onchain

We’re excited to announce a partnership with zkPass: an oracle protocol that provides secure, verifiable sharing of private internet data.

There’s a natural synergy between an identity and attestation service like zkPass and an FHE confidentiality-enabling blockchain like Fhenix. Both projects will collaborate to utilize ZK’s proofing strengths with FHE computation to provide private and secure onchain identity and reputation verification.

Where Existing Data Verification Solutions Fall Short

How do you securely and credibly prove you are who say you are digitally? It’s a good question, and one that’s only going to grow increasingly important to answer as more of our personal and financial lives move online/onchain. From proving your legal identity, to work experience, to ownership of real-world assets, the list of use cases for secure and trustless data verification is long.

Existing Web 2.0 identity verification solutions operate by placing trust in centralized third parties to securely store and process private data in order to perform data verification. The system is not only cumbersome, but vulnerable to data leaks and potential abuse from malicious actors. The solution is a decentralized system which removes the burden of verification from exploitable third parties and instead relies on math and code to execute this critical process.

Proving, Improved

The zkPass protocol guarantees private data authenticity by generating a Zero-Knowledge Proof (ZKP) in order to selectively prove various types of personal data. These zero-knowledge proof computations are performed locally, removing the need to upload sensitive data to third parties. The possible use cases for this more secure form of data verification are great, especially when combined with the confidentiality-enabling capabilities of Fhenix.

In addition to securely verifying specific pieces of data, zkPass could also be utilized to create a reputation system using the verified data points ZKPs provide as attestations for an entity’s onchain activities. Couple that with the selective confidentiality enabled by Fhenix and you have an incredibly powerful and flexible solution to onchain identity and reputation.

This collaboration opens up the design space for applications relying upon private, secure, and verified data and identity. For example, imagine a confidential DEX which uses Fhenix/FHE to obfuscate potentially personally identifiable trading history. This confidential data could then be complemented by zkPass’s data verification to prove things like trade volume and asset ownership, providing a trusted record of onchain achievement without ever introducing the possibility of exposing sensitive user data. This is just one example of the many potential use cases made possible by combining these two distinct and complementary technologies.

Building Towards a Confidential and Proveable Future

The partnership between Fhenix and zkPass represents a positive step towards providing a more secure digital environment for users and builders alike. An upgraded solution to data verification is inevitable at a time when the growing utility of onchain applications is causing users’ digital footprint to expand.

We’re incredibly excited to be working together with the team at zkPass to help usher in this proveable and confidential future for Ethereum.

For an overview of zkPass, check out this introduction and follow them on Twitter/X.

To learn more about Fhenix head to Fhenix.io and follow us on Twitter/X. If you’re ready to jump right in to building confidential smart contracts on the EVM-compatible Fhenix Helium testnet, check out the docs.

As always, if you have any questions about FHE or Fhenix, ask away in the Fhenix Discord!

Fhenix and Privasea Team Up to Bring FHE to the AI Age

Date: 13-06-24


Fhenix and Privasea Team Up to Bring FHE to the AI Age

We’re pleased to announce a partnership with Privasea, a leader in FHEML-focused AI + DePIN computing. The partnership will utilize both Privasea and Fhenix’s expertise to advance development of secure AI applications using FHE.

The Importance of FHE in the AI Age

As an ever-increasing amount of our data moves online, the need for data privacy technologies has never been greater. In this inexorable march towards digitization, a robust and trustless privacy technology is needed to safeguard our digital sovereignty. This necessity has only grown more obvious with the advent of AI and Large Language Models (LLMs), which utilize massive amounts of data for training.

Fully Homomorphic Encryption (FHE) is an ideal encryption solution for AI because it allows for direct computation on encrypted data. This enables LLMs to process the vast amounts of data needed to operate blindly, without ever needing to decrypt it. This results in a safer, more secure relationship between users and AI.

The collaboration between Fhenix and Privasea will leverage the unique talents and expertise of both parties to progress development at the intersection of AI and blockchain. These efforts include the continued development of FHE libraries, providing interoperability between the two projects, and hardware acceleration initiatives.

Software Development

Both Fhenix and Privasea will work together to extend Zama’s TFHE-rs library, a core infrastructure component of both projects. Additionally, both teams will work to enable the integration of Privasea applications on top of Fhenix’s Layer 2 infrastructure.

Fhenix and Privasea will also explore ways to integrate additional homomorphic encryption schemes based on CKKS/BGV/BFV, which allow data packing and SIMD parallel processing. This will provide better support for large-scale, high-precision computing scenarios, widening the product possibilities for both parties.

Hardware Acceleration

Alongside these software development initiatives, Fhenix and Privasea will also work in tandem on potential avenues for hardware acceleration. Specifically, we’re looking at hardware acceleration on the underlying NTT/FFT using high-parallelism, high-performance hardware such as GPUs and FPGAs. This hardware advancement is expected to provide a significant breakthrough in the efficiency of fully homomorphic encryption algorithms. We’re also taking a look at programming custom ASIC chips to improve Fhenix’s performance.

Conclusion

The Fhenix-Privasea collaboration represents a significant step forward in the integration of Fully Homomorphic Encryption into AI and blockchain applications. We’re excited to work with the Privasea team to leverage both of our unique talents to usher FHE into the AI Age.

The next generation of blockchain applications will utilize FHE to create confidential smart contracts. This novel cryptographic primitive opens up a slew of new use cases, including AI.

If you’re an application builder who wants to learn more, our docs are a good place to start.

If you have any questions about Fhenix or FHE, we’d love to answer them in our Discord.

Oh, and don’t forget to follow us on Twitter/X if you aren’t already.

“Let’s continue to be human, in a sea of bots.”

Building a Confidential Future for Ethereum

Date: 04-06-24


Building a Confidential Future for Ethereum

Today marks an important milestone in our mission to bring confidentiality to Ethereum through the first Layer 2 powered by the holy grail of cryptography: fully homomorphic encryption (FHE).

We’re excited to announce we’ve raised a total of $15M in Series A funding led by Hack VC, Amber Group, Collider, Primitive Ventures, GSR, Stake Capital, and others. In addition, we’re proud to release the initial version of the Fhenix testnet, dubbed Helium, enabling anyone to deploy their confidential smart contracts to the network using FHE to encrypt all or part of their application.


Why are we building Fhenix?

Ethereum has made huge strides over the last decade, with some of the most recent and significant advancements including the move to proof of stake and the maturation of Layer 2s as an effective scaling solution. But a glaring obstacle still remains for the world’s largest smart contract platform: it has no confidentiality.

Ethereum is well on its way to becoming a network capable of scaling human coordination in the digital age, but its current lack of data encryption presents a serious impediment to its growth trajectory. The promise of Ethereum is one of a permissionless network which returns sovereignty to the people who use and maintain it–the next, upgraded iteration of the internet. In order to realize this vision it must possess a robust and flexible answer to the question of confidentiality, a fundamental building block of human orchestration. Ethereum cannot reach its next stage of maturity without the ability to securely safeguard confidential data in a scalable manner.

We’ve spent years in the cryptographic and blockchain space researching the ideal solution to this problem and we came out the other end with a strong conviction that FHE is the answer. 

The key differentiator that sets FHE apart from other privacy enhancing solutions is the ability to perform computation on encrypted data. This simple yet powerful distinction has huge implications. It means data, which has become ever more valuable in the digital age, need not be decrypted for processing, making it that much more secure.

For a long time production-scale use of FHE wasn’t feasible due to its high computational expense, but advancements in both FHE and computer hardware have created a new reality. FHE is ready for prime time, and Fhenix is here to lower the barrier to entry of this exciting new technology by providing an accessible, EVM-compatible network for application developers to build on.

Come and build

This is a call to all hackers, cypherpunks, crypto nerds, and would-be tech entrepreneurs.

If crypto is the vanguard of cutting-edge software development, FHE is at the forefront of this technological revolution. This presents an unprecedented opportunity to build an entirely novel set of applications on Ethereum by virtue of the confidentiality that FHE enables.

Being at the forefront is not for everyone. We are in the early stages of confidential smart contracts. Many dismissed the internet, mobile computing, and Bitcoin until their network effects were already too large to ignore.

If it were easy, everyone would do it.

Fhenix is for contrarians with conviction–optimistic, heterodox builders with novel, visionary ideas who stand out in a sea of derivative, copy-paste GitHub repos. A blue ocean of applications awaits those with the foresight and conviction to see this bigger picture.

We’re here to support you with the requisite infrastructure, documentation, and dev tooling to help you turn your dreams into reality. Fhenix is fully EVM-compatible and intentionally built to be as developer-friendly as possible. Solidity-based developers can immediately begin building with familiar tools like Hardhat, Remix, and more. The goal is to make getting started with Fhenix as easy as possible.

We’ll also be offering generous grant and bounty programs to incentivize this new school of builders. The details of these programs are still being hashed out (pun intended), but you can apply for early access through the Fhenix docs.

In the meantime, fire up your development environments, because the first iteration of the Fhenix testnet is officially open and ready for deployment!

A lot of work has gone into this initial version of the Fhenix testnet and we expect to make even more improvements based on your feedback and ideas. We can’t wait to see what kind of interesting use cases you cook up in this new, confidentiality-enabled design space.

How to get involved

The Fhenix docs have everything you need to get started building.

For more background on Fhenix check out our website and read the whitepaper.

Don’t forget to provide feedback and participate in community discussions on Discord and follow @FhenixIO on Twitter/X.

We are thrilled to be taking these first steps towards a confidential future for Ethereum with you, and we can’t wait to build this exciting future together.

FHE Coprocessors™: Fhenix & Eigenlayer Join Forces for Next-gen Onchain Confidentiality

Date: 02-04-24


FHE Coprocessors™: Fhenix & Eigenlayer Join Forces for Next-gen Onchain Confidentiality

Fhenix is excited to announce the development of FHE coprocessors in collaboration with EigenLayer. Both projects will be dedicating significant resources towards FHE coprocessors, bringing wide-scale confidential compute to the Ethereum ecosystem.

Through this partnership, Fhenix’s FHE coprocessors will be able to provide fast transaction confirmation, allowing us to significantly scale up performance. This breakthrough marks a major milestone in the advancement of onchain FHE.

How Fhenix’s FHE Coprocessors Works

A coprocessor serves as a companion processor designed to offload specific computational tasks from a host chain – whether it’s Ethereum, an L2, or an L3, to a designated processor living outside the scope of the host.

While different types of coprocessors exist, Fhenix’s FHE coprocessors have a specific focus on maintaining data confidentiality and leveraging FHE rollups. FHE rollups have built-in encryption and unlock many novel use cases. For example, confidential AI is possible by having FHE coprocessors run intensive computations away from the host chain while ensuring that the input data is kept private.

FHE coprocessors drastically improve the efficiency of FHE-based operations, while maintaining the same level of security as the host chain.

Interacting with an FHE coprocessor is simple: an application on the host chain invokes the coprocessor, asking it to perform some specific computation over a set of encrypted inputs, and gets the result back, which it can then use onchain.

Computations are secured through Fhenix’s optimistic rollup architecture, employing fault proofs to ensure data integrity. However, these fault proofs necessitate a lengthy dispute period (normally a seven day window) for finality, which is impractical and severely limits the potential of FHE applications.

EigenLayer helps to address this challenge. It provides a ‘fast-lane’ mode in which operators verify the execution and attest to its correctness. These operators are secured by sufficient stake, and can later be slashed if they act maliciously. It’s important to note that having a dispute window is still critical, as it allows these operators to remain accountable after-the-fact, while sufficiently ensuring that no profit-maximizing operator misbehaves. In other words, thanks to EigenLayer’s cryptoeconomic security, apps utilizing an FHE coprocessor can use their output as soon as the operators verify execution, thereby facilitating substantial scaling of confidential onchain computation.

New Applications Horizon

The versatility of FHE coprocessors spans a wide range of scenarios, especially in domains prioritizing confidentiality.

For instance, consider their application in onchain auctions, where bid confidentiality ensures fairness and a more economical outcome for all bidders. Similarly, with onchain AI, FHE coprocessors can run intensive computations outside their host chain while still ensuring that the input data is kept private. The list of potential use cases is extensive, including decentralized identity, confidential DeFi, encrypted gaming, MEV protection, and many more.

To learn more about FHE use cases, click here.

A Future Shaped by FHE Coprocessors

Fhenix’s FHE coprocessors offload computational tasks and accelerate the rate in which confidential onchain transactions can be processed. Given that security is inherited from Fhenix’s optimistic rollup design, an existing limitation is that optimistic fault proofs are subject to a seven-day dispute period.

This partnership between Fhenix and Eigenlayer marks a significant milestone in the evolution of blockchain technology. By harnessing the power of FHE coprocessors, developers will be able to build applications that utilize confidential data efficiently while maintaining the same level of security. This technological advancement unlocks new capabilities for blockchain applications that were not possible before.

About Fhenix

Fhenix is building the first confidential smart contract platform using Fully Homomorphic Encryption (FHE), a novel cryptographic scheme that enables direct computation over encrypted data without ever revealing the underlying data.

Fhenix’s goal is to advance application development in the blockchain ecosystem by bringing data encryption and encrypted data computation to smart contracts, transactions, and onchain assets for the first time.

For more information, join our Discord.

About EigenLayer

EigenLayer is a protocol built on Ethereum that introduces restaking, a new primitive in cryptoeconomic security. Restaking enables staked ETH to be used as cryptoeconomic security for protocols other than Ethereum, in exchange for protocol fees and rewards.

For more information visit www.eigenlayer.xyz/

Securing DeFi’s Future: The Rise of Confidential Decentralized Finance

Date: 25-02-24


Securing DeFi's Future: The Rise of Confidential Decentralized Finance

Introduction:
Decentralized Finance (DeFi) is growing rapidly and bringing trading, borrowing & lending, derivatives, and more on-chain.

And yet, the public nature of blockchain is a significant limitation for many DeFi use cases.

In this article we’ll cover:

  • Challenges with a transparent DeFi ecosystem
  • How Fully Homomorphic Encryption (FHE) can be used to bring encryption to the blockchain, and the associated benefits.
  • Recent cryptographic developments that have helped bring FHE to DeFi

Challenges with Public DeFi:
Many areas of DeFi hold tremendous promise, including asset tokenization, derivatives, and payments. Tokenization alone represents a $16T opportunity, and institutions are realizing that DeFi isn’t going away.

That being said, the industry is early and there are inherent issues in having a fully transparent financial system. These include:

  • Privacy concerns: Many transactions may entail sensitive data, such as institutional payments, or anything relating to personal data. This will become an event greater concern as analytical tools develop, simplifying the task of tracking one’s wallets and potentially making it easier to correlate one’s wallet to their identity.
  • MEV extraction: Front-running and other forms of MEV extraction are common in DeFi, creating a hidden tax on transactions.
  • Regulatory challenges: DeFi is facing increasing regulatory scrutiny, likely to only accelerate.

Fully Homomorphic Encryption (FHE) enables computations to be done on encrypted data, which was never before possible. This means that on-chain data can be encrypted while still updating the network’s shared state transaction-by-transaction.

From a privacy perspective, encryption keeps all data confidential and auditable, which coincidentally is critical for complying with data protection and privacy laws. It also means that block proposers cannot view transaction data, therefore prioritizing based on network rules rather than personal gain and preventing MEV.

Next, let’s take a look at technological advancements and considerations.

FHE in DeFi: Technical Considerations:
A challenge with FHE in DeFi is that computations must be exact, which requires the use of a specific type of scheme. A scheme refers to a standardized and systematic approach that helps developers manage data or code to efficiently solve problems.

The best DeFi-specific FHE schemes are known as BGV or BFV, which we covered in our blog post titled FHE Challenges: Part 1. While other schemes may also be used, BGV and BFV are considered the most efficient as they batch multiple computations together. These schemes are still being developed alongside FHE libraries and compilers, which in combination will radically improve the development experience.

Meanwhile, the fact that the tech is so cutting-edge means that it’s quite challenging to do computations on ciphertext (encrypted data). For example, in the past only the denominator in a division was able to be ciphertext. Recent advancements have made it possible to divide a ciphertext by another ciphertext, opening up the potential for more types of confidential DeFi transactions. AMM calculations are a use case, as encrypted calculations on DEXs (like Uniswap) require the ability to divide ciphertexts, which wasn’t formerly possible.

In the future, it’s likely that FHE tooling will improve further and open up the potential for more types of transactions, while the actual computing process also becomes significantly more efficient.

Conclusion:
Fully Homomorphic Encryption (FHE) emerges as a transformative solution to concerns regarding DeFi’s public nature. As the DeFi landscape expands, the need for confidentiality, security, and regulatory compliance becomes increasingly pronounced. FHE encrypts individual transactions and state transitions, safeguarding sensitive data while allowing for auditability when necessary.

Recent cryptographic advancements, including efficient FHE schemes like BGV and BFV, alongside breakthroughs enabling computations on ciphertexts, signal significant progress. These developments hold promise for broader adoption of FHE in DeFi applications, enhancing privacy and security across the ecosystem.

To learn more, visit Fhenix.io

FHE & Web3’s New Horizon of Use-Cases

Date: 04-02-24


FHE & Web3’s New Horizon of Use-Cases

TLDR:

  • There are 7 areas of blockchain that are limited by blockchain’s innate transparency. This list is only growing, and Fhenix’s ability to incorporate Fully Homomorphic Encryption (FHE) on-chain is key to enabling privacy-centric use cases.
  • Confidential Transactions are important for payments, voting, medical records, and other sensitive data. FHE keeps all data private and secure.
  • On-chain auctions, ranging from traditional bids to DeFi liquidations, governance decisions, and token sales, can be fully private and secure, protecting bidder data and ensuring the auction’s integrity.
  • Confidential Voting is important for maintaining voter privacy, limiting manipulation, and adhering to regulatory compliance laws.
  • Encrypted Gaming has all state updates done on-chain while hiding player data (such as their holding or historical strategies), and secures in-game transactions.
  • Decentralized Identities are on-chain identifiers that require control over one’s personal data, secure encryption and interoperability, and secure authentication.
  • MEV Protection can be implemented by having all mempool transactions encrypted, preventing front-running and ensuring fairness over transaction ordering.
  • Privacy-preserving AI keeps all data private, secure and on-chain, all the way from the model’s training data to the actual results.

Introduction:
Transparency is a core strength of blockchain, but also limits vital use cases needed to scale the industry to a global level.

For example, institutional use cases such as payments tend to revolve around sensitive data not suitable for the blockchain. Additionally, sophisticated bots are continuously monitoring public data for potential network exploits network.

We foresee 7 areas that benefit from on-chain encryption:

  1. Confidential Transactions
  2. On-Chain Auctions
  3. Confidential Voting
  4. Encrypted Gaming
  5. Decentralized Identity
  6. MEV Protection
  7. Privacy-Preserving AI

The number of counterparties and the strength of on-chain analytical tools and bots will only increase, meaning that having built-in privacy and security is paramount.

In this article, we’ll cover all core use cases enabled through FHE Rollups, custom-built Layer 2’s with confidentiality built-in from the core.

1. Confidential Transactions

Blockchain’s innate transparency imposes many limitations on potential use cases and adoption by exposing sensitive transaction details. Payments, voting, medical records, one’s financial history, and many other use cases require confidentiality, and the list will only expand alongside blockchain adoption. By enabling confidential and yet auditable transactions to take place on-chain, both consumer and corporate users of the blockchain users can benefit greatly.

Benefits include:

  • Privacy protection: complete privacy over user identities, transaction amounts, and other sensitive information. This not only protects the mempool (encrypted state), but also the fields used to advance the networks state (encrypted transit).
  • Enhanced security: transactions remain tamper-proof and private throughout the entire process.
  • Preventing manipulation and front-running: full transaction privacy reduces the potential for unethical practices while ensuring fair transaction processing.
  • Regulatory compliance: easy alignment with data protection and privacy laws, regardless of jurisdiction.

2. On-Chain Auctions

On-chain auctions, ranging from traditional bids to NFT marketplace offerings, DeFi liquidations, governance decisions, and token sales, can significantly benefit from Fhenix’s confidential smart contracts. These contracts allow users to place encrypted bids, maintaining anonymity and fairness without exposing personal data or sensitive bid details. Upon the auction’s closure, only the winning bids are disclosed, an approach especially valuable for high-stake or sensitive transactions involving premium items or significant financial decisions.

Benefits include:

  • Encrypted Bids: Bids are encrypted to ensure confidentiality and prevent exposure during the auction process. 
  • Full Smart Contract Functionality: An automated auction process with full confidentiality, including bid submission, validation, and winner selection.
  • Reveal Mechanism: Secure reveal winning bids at the auction’s conclusion without compromising the integrity of the process.
  • Privacy-Preserving Protocols: Maintain confidentiality of participants’ identities, bid amounts, and other confidential information.

3. Confidential Voting

On-chain voting is critical for Decentralized Autonomous Organization (DAO) voting, as well as for consensus mechanisms and any other forms of on-chain voting where confidentiality and security are needed.

Projects using Fhenix’s FHE can vote with complete confidentiality, while the system knows that their votes are entirely valid. FHE’s stringent security & privacy characteristics also make it regulatory compliant, enabling voting even in high-stakes environments, such as governmental elections.

Benefits include:

  • Voter Privacy: This protects voters from external influence or coercion, and safeguards their privacy.
  • Security: Encryption makes it challenging for attackers to trick the system, study voter patterns, or manipulate the system in any manner.
  • Regulatory Compliance: Adherence to election laws and privacy regulations, especially critical for important vote situations.

4. Confidential Gaming

Multiplayer Web3 games face various challenges caused by the blockchain’s transparency, including exposing real-time positions, analyzing historical strategies, in-person identity correlation, and other forms of potential manipulation. For example, on-chain poker is challenging as all cards are publicly visible and the game can be manipulated.

With FHE, developers can integrate confidentiality into Web3 games, keeping all data entirely confidential while still updating the blockchain’s state after each move.

Benefits include:

  • Securing In-Game Transactions: Public blockchain records enable opponents to analyze past strategies and pending moves or to manipulate the game such as through front-running actions. Encrypting both financial transactions and player actions protects against real-time manipulation.
  • Protecting Player Data: Player data, such as financial assets and personal information, can be discoverable and expose them to phishing attacks and real-world security risks. Encryption anonymizes player activity, reducing these risks.
  • Transparent State Updates: Existing solutions such as ZKPs have transactions processed off-chain and only periodically updated on-chain. FHE has all in-game actions encrypted on-chain, yet verifiable via decryption.

5. Decentralized Identity (DiD)

Decentralized Identity (DID) represents an on-chain identifier facilitating a secure and verifiable digital identity. This approach ensures that an individual’s identity remains self-owned and isn’t subject to control by a central authority.

DiD at its core holds sensitive personal data that will be targeted by malicious parties. On-chain FHE enables the secure storage and verification of encrypted user data, while also providing selective disclosure and control over key parameters.

Benefits include:

  • Control Over Personal Data: Selective disclosure over identity attributes, for example, proving citizenship while ensuring all other details remain fully secure.
  • Secure Authentication: Traditional identity systems are frequently subject to data exploits. Fhenix protects login credentials and authentication tokens from being intercepted or duplicated.
  • Interoperability and Data Portability: DIDs operate across various platforms and services. Encryption ensures that while this data is portable and interoperable, it remains confidential and can only be accessed by entities with the appropriate decryption capabilities.

6. MEV Protection

Pending blockchain transactions are publicly visible in the network’s mempool, which can lead to value extracted through methods such as front-running or sandwich attacks. For example, a pending profitable transaction could be front-run by another party submitting the same transaction with a slightly higher gas fee paid. This is known as Maximal Extractable Value (MEV) and it’s a hidden tax.

This is easily preventable through Fhenix’s built-in confidentiality, whereby pending transaction data is kept confidential.

Benefits include:

  • Preventing Front-Running and Exploitation: By having the public data of all transactions encrypted and hidden from those monitoring the mempool, MEV bots to cannot engage in front-running, sandwich attacks, or other predatory practices.
  • Ensuring Transactional Fairness: Block proposers cannot view transaction data, therefore prioritizing based on network rules rather than personal gain.
  • Protecting Against Censorship: An inability for block builders to censor transactions.

7. Privacy-Preserving A.I.

The application of A.I. is expanding rapidly across various sectors, utilizing extensive amounts of data to perform intricate computations.  FHE allows AI models to process encrypted data, enabling the use of sensitive personal or financial information in AI computations securely, without privacy or security risks.

For example, Ethereum Founder Vitalik Buterin’s recent blog post covered how the overhead cost of putting AI inside cryptographic boxes is quite low, and FHE is a viable solution to this.

Additionally, Zama recently updated their Concrete-ML library to add the ability to train data using an encrypted ata set. They also plan to make have their Concrete-ML library be compatible with TFHE-rs ciphertexts, which is their Rust implementation of the TFHE (Zama’s variation of FHE).

The result is that quick advancements are being made when it comes to privacy-preserving AI on-chain, and that languages and libraries will be increasingly easy for developers to use.

The main implications are:

  • Data Privacy: A.I. models can use fully encrypted training data, while ensuring that it remains encrypted until it reaches its intended destination.
  • Security: Full encryption prevents unauthorized access or data manipulation.
  • Regulatory Compliance: Facilitates adherence to stringent data protection regulations in AI applications.

Implementing FHE

Given that there are so many ways that a project may benefit from the integration of FHE into one’s workflow, how can they get started?

Fhenix’s FHE Rollups enable developers to craft custom application chains with built-in FHE capabilities while using well-known EVM languages such as Solidity. This applies to all of the categories explored above, such as networks that are MEV-resistant, built for DiD, have a full privacy-focused gaming ecosystem, and much more.

Developers can easily deploy any custom-purpose Layer 2 with privacy, security, and compliance built-in from the core, while knowing that transactions are auditable if need be.

Fhenix’s mission is to usher in a new era of computing, prioritizing privacy and security, and ultimately eliminating data breaches while maintaining confidentiality and data integrity for all.

Those interested may visit our website at fhenix.io to learn more.

Invisible Handshakes: On-Chain Blind Auctions with FHE

Date: 01-02-24


Invisible Handshakes: On-Chain Blind Auctions with FHE

TLDR:

  • On-chain auctions are critical to blockchain, responsible for liquidations, token sales, and more. However, blockchain’s innate transparency results in privacy, integrity, and regulatory compliance remaining major issues for on-chain auctions.
  • Privacy is of concern as on-chain auctions can be correlated to one’s real-life identity, making bidders targets for scams.
  • Integrity matters as publicly visible bid details on the blockchain could lead to issues such as front-running, collusion, or other forms of manipulation.
  • Regulatory compliance is also of relevance as various jurisdictions have strict privacy and data protection laws that require data confidentiality, and strict compliance around regulated assets.
  • Fhenix’s FHE Rollups address all of the above, providing customizable Layer-2 infrastructure with built-in privacy and security powered by Fully Homomorphic Encryption. These are easily deployable, with on-chain auctions fully private and secure, yet auditable.

Introduction:
Many areas of blockchain require users to place competitive bids against one another in real-time, known as on-chain auctions. These auctions are critical to both blockchain and decentralized finance (DeFi), responsible for loan liquidations, token sales, NFT marketplace offerings, carbon credits, and more.

A major ongoing challenge is incorporating full privacy and security into them, a consequence of the public nature of blockchains. While having all data public is a benefit in some regards, it can also lead to issues with on-chain auctions, especially surrounding bidder privacy and auction integrity.

Fhenix’s implementation of Fully Homomorphic Encryption (FHE) enables the execution of complex computations on fully encrypted data, maintaining its confidentiality throughout its entire journey. Using FHE, any on-chain auction can be fully encrypted from start to finish, with state updates sent transaction-by-transaction and all data auditable.

In this article we’ll cover the following:

  • An Overview of On-Chain Auctions
  • Existing Challenges
  • FHE’s ability to incorporate privacy and security.
  • Fhenix’s FHE Rollups

We’ll cover each in turn, and show why Fhenix’s ability to bring confidential computing on-chain is revolutionary for this sector.

On-Chain Auctions

On-chain auctions use smart contracts to manage and execute an auction, from the initial asset listing to determining the winner and finalizing the transaction.

Auctions are prevalent in the crypto sphere due to factors like the market’s high volatility, which frequently results in the liquidation of positions, the continuous, round-the-clock trading of diverse assets, and the relatively low barriers to entry for participants.

Each category of on-chain auction alone represents a vast sum of funds.

For example, December 11th, 2023 alone saw over $320M in positions liquidations occur, and while a significant fraction took place on centralized exchanges, trading is increasingly moving on-chain. Meanwhile, ICOs, tending to use auctions, have raised over $50B since 2017.

On-chain carbon credits, NFT marketplace sales, and many more areas of blockchain will require well-designed blockchain infrastructure with privacy & security built-in.

Issues with On-Chain Auctions

On-chain auctions currently struggle with 3 primary challenges:

  1. Privacy
  2. Integrity
  3. Compliance

Privacy is an issue as on-chain auctions can be correlated to one’s real-life identity, making bidders targets for scams. For instance, Mark Cuban recently lost nearly $900,000 to a phishing attack, with many other noteworthy phishing attacks such as one against a key Harmony employee that led to the loss of $100M in funds. Additionally, dissecting one’s on-chain actions can lead to strategic bids made based on one’s identity or other factors. We also believe that blind auctions lead to more efficient price discovery, benefitting the entire market.

Integrity is an issue as publicly visible bid details on the blockchain could lead to issues such as front-running, collusion, or other forms of manipulation. For instance, existing or impending bids could be monitored, with a competing being placed at the very last second for a cent more. Encryption keeps bids secret until the auction concludes, creating a level playing field for all participants.

Last of all is regulatory compliance. Certain jurisdictions have strict privacy and data protection laws that require data confidentiality, and strict compliance around regulated assets. This will also increase as more institutions arrive on-chain, as well as regulated assets such as tokenized commodities, real estate, and financial instruments. For example, auctions revolving around regulated assets necessitate strict privacy and security measures, possible through Fully Homomorphic Encryption.

FHE on the Blockchain

Addressing the above challenges and ensuring the complete encryption of on-chain auctions is extremely easy to implement using Fhenix’s FHE Rollups.

FHE Rollups enable developers to craft custom application chains with built-in FHE capabilities while using well-known EVM languages such as Solidity. For example, an NFT marketplace could be its own FHE rollup that easily connects to both external EVM and non-EVM networks, while having all transactions be fully confidential. Concurrently, another interoperable rollup could be centered around fully encrypted Initial Coin Offerings (ICOs).

Developers can easily deploy any custom-purpose Layer 2 with privacy, security, and compliance built-in from the core while knowing that transactions are auditable if need be.

What about drawbacks?

One challenge is that FHE is cutting-edge, meaning that it’s also quite new.

In our 2-part series, we covered 5 separate challenges:

  • Part 1 discussed nascent FHE schemes, libraries & compilers, and a need for advanced threshold decryption.
  • Part 2 discussed the need for ZKPs for both user inputs & computations, data availability requirements, and the need for improvements in FHE hardware & software.

These technical aspects still require some modification, but progress has been moving extremely quickly and we expect the same for 2024.

Conclusion:
FHE is a superior, albeit relatively new technology that enables encrypted data to be computed.

This is much needed for on-chain auctions, an area of blockchain where users place competitive bids in real time. These auctions are vital for liquidations, NFT marketplaces, ICOs, and more, yet the public nature of the blockchain creates challenges. Not only is bidder data at risk, but so is the auction’s integrity as a whole, and there’s also the challenge of being fully compliant with regulations.

Fortunately, it’s easy for developers to integrate FHE into their workflow using familiar EVM languages, using the fhEVM.

Fhenix’s mission is to usher in a new era of computing, prioritizing privacy and security, and ultimately eliminating data breaches while maintaining confidentiality and data integrity for all.

We also recommend visiting our website at fhenix.io to learn more.

Cracking the Code: Overcoming Challenges of On-chain FHE/ part 2

Date: 21-01-24


Cracking the Code: Overcoming Challenges of On-chain FHE/ part 2

TLDR:

  • On-chain FHE faces 5 areas of challenge, with Part 1 covering nascent FHE schemes/libraries/compilers, as well as secure threshold decryption. This article covers ZKPs, Data Availability optimization, and FHE hardware.
  • FHE combined with ZK Proofs are extremely powerful, and advancements such as Verifiable FHE are moving this forward.
  • On-chain FHE requires a high volume of encrypted data to be stored, requiring a secure, performant, and cost-efficient DA layer that supports FHE. While the solution is not yet here, the space is being actively researched and moving quickly.
  • FHE hardware is 100x slower than regular hardware, and yet FHE Accelerators and optimized software are showing signs of speeding things up.

Introduction:
In Part 1 of this 2-part series, we covered how FHE is a revolutionary technology that is still emerging, and currently facing 5 major challenges:

1. Nascent FHE Schemes, Libraries, and Compilers: a need for FHE-specific technological advancements and a computing paradigm shift.

2. Secure Threshold Decryption: secure, permissionless, and low-latency decryption.

3. ZKPs for User Inputs + Computing Party: efficient confirmation of correct computation.

4. Data Availability Optimization: the need for a secure, performant, and cost-efficient DA layer for FHE.

5. FHE Hardware: optimized software/hardware and FHE Accelerator advancements.

Part 1 of this series covered both 1) and 2) above in-depth, and we recommend giving it a read.

This article will cover the three remaining challenges, and potential solutions to each.

Challenge: Implementing Zero-Knowledge Proofs for Verifiability

While FHE enables arbitrary computation over encrypted data, it cannot prove that something is correct without revealing the underlying information. This is where zero-knowledge proofs (ZKPs) excel, and combining both is useful in three ways:

1. Proof of Plaintext Structure: ZKPs can be used to demonstrate that the input plaintext is properly structured, which impacts the ciphertext (encrypted data) conforming to the encryption scheme. This cannot be done by the typical SNARK/STARK approaches common for ZK rollups because FHE’s lattice-based cryptography is post-quantum secure, and instead requires a proof system designed for lattice-based relations.

2. Proof of Plaintext Input: ZKPs can also prove that the plaintext is not only properly structured, but that it meets the application’s requirements. For example, I cannot send more funds than I have in my wallet. zk-SNARKs can be used here, but the challenging part is confirming that the input for this system is the same as the input for the plaintext structure system.

3. Proof of FHE Computation: ZKPs can be used to prove that computations are correct.

Solutions:
Each of the above 3 is in the midst of ongoing research providing promising results:

a. ZKPs of plaintext structure require a cost-efficient proof system for lattice-based relations, which is an area of ongoing research.

b. ZKPs of plaintext input are being advanced by firms such as Mind Network which have been integrating ZKPs to ensure zero-trust inputs, alongside the use of FHE. Sunscreen’s ZKP Compiler also shows promise here through the use of Bulletproofs, although they are not the most efficient proof system.

c. ZKPs of correct computation can be addressed via “Verifiable FHE” whereby a validator submits a ZKP to prove honest transaction execution. Assuming others can verify the ZKP was done correctly, only a single part is needed for execution. SherLOCKED is an example of an early prototype in this space, which offloads FHE computation to Risc0’s Bonsai zkVM and returns a ZKP.

Each area is advancing rapidly and we will be providing updates via our Twitter on the latest information.

Challenge: Low-Performance FHE Hardware

Latency is a recurring challenge for FHE and this is no different when it comes to hardware.  FHE computations over encrypted data were 100,000x slower than over plaintext data, but newer encryption schemes and FHE hardware advancements mean that FHE computations are now only 100x slower.

The fundamental reason for this is that calculations involve complex polynomial computations and time-consuming ciphertext operations. It’s also harder to accelerate blockchain-based FHE compared to application-specific use cases (such as Machine Learning FHE) as it requires the ability to process more general computations versus a more niche set.

Solutions:
Improvements are being made on 3 fronts:

a. FHE Hardware: FHE Accelerators are specialized hardware devices that enhance the performance of FHE computations by speeding up the complex mathematical operations involved. One example is the Fixed Point (FPT) accelerator that can exploit FHE’s inherent noise through the implementation of TFHE bootstrapping. Another example is BASALISC, an architecture family of hardware accelerators that use the cloud to accelerate FHE computations and is the first to implement the BGV scheme.

b. Optimized Software: F1 and CraterLake are two FHE Accelerators that combine both hardware and software elements to increase performance, and others may follow suit in the future. Fully functional compilers will likely be developed, with this software capable of optimizing FHE programs dependent on the specific For HE scheme chosen.

c. Scaling Out: Currently, FHE hardware accelerators are focused on improving individual accelerators vertically, rather than connecting various ones horizontally. This could drastically improve performance and is comparable to proof generation with ZKPs, where multiple proofs can be generated in parallel. A challenge with this is data inflation: data size increases drastically during encryption and computation, making it harder to connect various FHE hardware accelerators. Therefore, a promising area of research will be to look into the networking infrastructure amongst FHE hardware accelerators.

Conclusion:
In this second part of our deep dive into the challenges and advancements surrounding on-chain FHE, we’ve explored three critical areas:

a. The integration of Zero-Knowledge Proofs (ZKPs) for
enhancing verifiability.

b. Data Availability (DA) optimization for efficient storage of encrypted data.

c. The development of specialized hardware to overcome the inherent latency issues in FHE computation.

Each challenge is seeing promising solutions arise, and it’s clear that the journey toward practical and efficient on-chain FHE is both challenging and exhilarating. The field is rapidly evolving, and the progress made so far is just the tip of the iceberg.

Stay tuned for more updates, and join the conversation with us on Twitter and Discord to stay at the forefront of these exciting developments in on-chain FHE.