Introducing CoFHE: FHE-Based Encryption Everywhere With a Single Line of Code

CoFHE enhances EVM applications with FHE-based encryption, closing the gap for institutional grade DeFi and confidential AI.

Date: 07-04-25


Introducing CoFHE: FHE-Based Encryption Everywhere With a Single Line of Code

The CoFHE testnet is now live on Ethereum Sepolia testnet, with additional EVM-compatible chains coming soon.

The Confidentiality Conundrum

While decentralization and transparency are key components of the crypto ethos, a completely and uncompromisingly translucent blockchain is not feasible for many of crypto’s most promising use cases. Whether it’s protecting user financial data, enabling private DeFi transactions, or securing sensitive enterprise operations, confidentiality is a critical piece currently missing in Ethereum as it stands today.

Until now, tools like zero-knowledge proofs (ZKPs), multi-party computation (MPC), and trusted execution environments (TEEs) have been used to enhance privacy. Each of these privacy enhancing technologies has its unique set of strengths and limitations. Unlike ZKPs, which only prove correctness without processing hidden data, or MPC/TEEs, which rely on trusted setups or hardware, FHE provides a decentralized way to execute private smart contracts while maintaining full composability with existing blockchain infrastructure.

Ethereum Virtual Machine (EVM) smart contracts currently operate in full uncompromising transparency—meaning every transaction, function call, and stored variable is visible onchain. While this transparency enables trustless execution, it also leads to several issues:

– Lack of financial privacy. DeFi users cannot shield their balances, trades, or lending activity.

Enterprise data risks. Businesses cannot use public blockchains for sensitive operations without risking leaks.

Front-running & MEV exploits. Traders face sandwich attacks, liquidations, and unfair pricing from visible mempool transactions.

Compromised voting & auctions. Governance votes, sealed-bid auctions, and private agreements are difficult to implement securely.

Ethereum needs a solution to these problems if it is to reach the next level of adoption.

The Fix: An Interoperable and Performant FHE-Enabled Coprocessor

CoFHE leverages Fully Homomorphic Encryption (FHE) to enable confidential smart contracts on any EVM-compatible blockchain. This means data remains encrypted at all times, even during processing—enabling encrypted computation for anyone and everyone.

CoFHE enables real-time confidential compute, decryption at 50x faster than current competitor benchmarks, and seamless integration in smart contracts with a single Solidity import–all in a scalable architecture that ensures low gas costs, fast performance, and a clear path to verifiability.

CoFHE is like having the superpower of invisibility — always available when you need to keep things private, without compromising speed or usability

From the start, Fhenix’s mission has always been to bring FHE everywhere. That process starts with the builders. With CoFHE, we’re able to serve them up a steaming cup of confidentiality on demand wherever they are rather than asking them to come to us.

How CoFHE is Brewed

A simplified overview of how CoFHE works.

1. A smart contract makes an FHE operation request
2. The “Barista” contract emits an event saying, “Hey, there’s FHE work to do!”
3. Portafilter detects this event and routes the request to fheOS, the “brain” responsible for FHE processing
4. FHEOS processes the request, performs the encrypted computation, and sends the encrypted result back to the Portafilter
5. If the request is for decryption, the aggregator forwards it to the Fhenix Decryption Network, which securely decrypts the data

With CoFHE, gas fees are incurred on the chain where the smart contract is deployed, keeping the interactions straightforward.

In short: CoFHE delivers FHE-based confidentiality with a single line of code.

(For a more detailed and technical look at how CoFHE works, check out the developer docs).

One of the secrets to the CoFHE blend is the Fhenix Decryption Network (formerly called the Threshold Network), the system CoFHE uses to handle decryption. We’ll have more to share on the Decryption Network in an upcoming post, so stay tuned for that.

FHE Everywhere

Without confidentiality, mainstream users, enterprises, and institutions cannot fully embrace DeFi, DAOs, and other promising Web3 innovations. In order for any given privacy solution to stick, it must be seamless. CoFHE lowers the barrier of entry to FHE-based confidentiality, making it trivially easy for builders to tap into confidential compute.

We’re working closely with the OffchainLabs team on FHE research and development in order to bring FHE-based confidentiality to Arbitrum, Ethereum, and beyond.

Take a Sip

Builders, enterprises, and entrepreneurs can start building confidential applications using CoFHE today.

For integration guides and a more detailed look at CoFHE, see the developer documentation.

If you have any questions about CoFHE or FHE in general, ask away in the Fhenix Early Adopter Telegram channel.

CoFHE marks a new chapter for Ethereum and onchain confidentiality, one in which privacy is no longer an afterthought. With confidentiality and a little caffeine, anything is possible! ☕️✨

 

Fhenix and Tandem by Offchain Labs: Bringing FHE to Blockchains Everywhere

Date: 26-03-25


Fhenix and Tandem by Offchain Labs: Bringing FHE to Blockchains Everywhere

We’ve been in talks with Offchain Labs, the people behind Arbitrum and one of the most cracked teams in the crypto space, on how to solve for encryption in Ethereum.

Today we are thrilled to announce an investment by and partnership with Tandem by Offchain Labs to bring Fully Homomorphic Encryption (FHE) to everyone, everywhere. FHE was once considered complex and slow, but recent advancements like faster schemes, GPU optimizations, and ultra fast decryption networks are making FHE a reality today.

 

Why Fhenix and Offchain Labs?

The Offchain Labs team has shown time and time again they have the deep knowledge needed to advance Ethereum and cryptography, coupled with the ability to ship.

Ed Felten and Steven Goldfeder, Co-Founders of Offchain Labs, designed the interactive fraud proofs for optimistic rollups that are currently scaling Ethereum and literally wrote the book on blockchain engineering. Victor Shoup is a cryptography legend who co-designed the first FHE library (HElib) amongst his many other accomplishments (look up NTL library).

Both Offchain Labs and Fhenix are now focused on:
1. Conducting R&D to make FHE–cryptography’s holy grail–both ubiquitous and accessible.

2. Bringing FHE-based confidentiality to Arbitrum, Ethereum and beyond…

 

Together with Offchain Labs we’re pioneering a future where anyone can quickly and easily tap into the power of FHE from anywhere, at a time when the need for onchain confidentiality is greater than ever.

A confidential future for Ethereum is now closer than ever before. FHEels good man…

Scaling Confidential Compute with Celestia Underneath

Date: 12-09-24


Scaling Confidential Compute with Celestia Underneath

Fhenix is an L2 and coprocessor that provides a platform for builders to leverage the power of FHE to build confidentiality-enabled applications on Ethereum. By lowering the barrier of entry to FHE, we’ll soon see a flood of new confidentiality-enabled applications. It’s important to have performant infrastructure in place for the inevitable confidentiality boom, which is why we chose Celestia as the high throughput data availability solution for the Fhenix network.

Removing Bottlenecks

Today, Ethereum is almost completely translucent. This cannot continue to be the case if onchain is to become the next online. Confidentiality is the next major bottleneck for widespread adoption of Ethereum and FHE is the most ideal and ambitious solution.

Just as Fhenix is solving for the lack of confidentiality on Ethereum, so Celestia solves the data availability bottleneck for blockchains. Data Availability (DA) ensures that validators and users can access transaction data to verify the state of the blockchain and detect potential fraud. Celestia provides high throughput DA to address this problem with data availability sampling (DAS), which allows for DA to scale as more light nodes join the network.

The Future is Modular

Layer 2s scale Ethereum by separating the execution and consensus layers in order to facilitate the fast execution of transactions and computations. DA solutions like Celestia extend the modular approach to DA, reducing excessive fees while increasing the potential for the types of apps that developers can build. The modular approach provides a flexible solution to horizontal scaling for Ethereum, removing constraints while maintaining the security guarantees of the underlying L1.

Fhenix itself is also inherently modular by design. It separates the computationally expensive FHE execution from consensus in order to provide confidentiality while retaining the security guarantees of Ethereum.

The decision to utilize Celestia for Fhenix’s DA underscores an important strategy for our goal of bringing confidentiality to Ethereum and unlocking widespread adoption: lowering the barrier of entry for developers and making it as easy as possible for them to build confidentiality-enabled applications.

To the Builders go the Spoils

The foundational tools to build confidential applications onchain are now available to the intrepid developer ready to make use of them. There’s never been a better time to build the next generation of confidentiality-enabled onchain applications.

There’s even financial resources available to help builders bootstrap their projects through the Fhenix Grant and Bounty programs. Are you ready to build the next viral onchain application? Submit your application today.

If you have any questions about Fhenix and FHE we’d love to hear them in our Discord. Be sure to tune in to our next ecosystem call on October 1st. Don’t forget to follow us on Twitter/X for the latest news and updates if you aren’t already!

Confidentially yours,
Fhenix

Unlocking Incentives on Fhenix: Introducing Grants & Bounties

Date: 22-08-24


Unlocking Incentives on Fhenix: Introducing Grants and Bounties

Get compensated to build the future of onchain confidentiality.

Since launching the Fhenix Helium testnet in June we’ve hit the hackathon circuit hard. It’s been a treat to see you put the network through its paces creating things like a Pet Identity Provider, personal advertising protocolconfidential voting application, and many more exciting projects.

The Helium testnet has seen a good deal of activity which we’ve used to battle test our developer docs. We’re ready to take it to the next level by providing you, the builder, with a good reason to stick around and form the foundation of the Fhenix ecosystem.

To that end we’re providing financial resources for you to turn your confidentiality-enabled application from fun side project to venture-funded crypto mainstay through the Fhenix Grant and Bounty programs. These programs will be used to provide the initial resources needed for you to explore the power of confidential computation and bootstrap the first viral confidential onchain application.

How to Apply

The Fhenix Grant program is for Fhenix projects which harness FHE to to bring confidentiality onchain or help others to do so through the creation of crucial FHE infrastructure. Fhenix grants are substantial and are intended for ambitious projects with specific, measurable milestones. Both smart contract applications incorporating confidentiality and infrastructure projects facilitating them are eligible.

To apply for a Fhenix grant, visit the Grants page at Fhenix.io and apply.

Make sure to clearly communicate how your project will benefit the Fhenix network and push the bounds of onchain confidentiality. Fhenix grant applications which stand the best chance of acceptance are thoughtful and milestone-based, with a distribution budget attached to specific development timelines.

While Fhenix grants are for larger-scale projects which utilizes FHE for onchain confidentiality, Fhenix bounties are for more specific objectives. Eligibility for Fhenix grants are open-ended, whereas bounties have smaller, specific scopes attached to them.

You can view the list of bounties, along with a description and associated amount on the Fhenix Bounty page.

Review Process

Our team will review all Fhenix grant and bounty applications on a rolling basis. If we determine more information is needed, we will reach out to schedule a call with the team to gather the additional information needed to make a decision.

We anticipate receiving many applications and will work as quickly as possible to process them. While it’s difficult to estimate the time needed to process individual grant and bounty proposals, you should receive a response in around two weeks time, at which point applicants will be notified via email whether or not their proposal has been accepted.

Fire up your dev environments

Ethereum has made huge strides towards becoming a permissionless platform for innovation and creating a new, open internet, but its lack of confidentiality is an obstacle to widespread adoption.

The Fhenix Grant and Bounty Programs will provide resources for the intrepid devs building on the frontier of onchain confidentiality. There’s a huge opportunity here, and we’ll do everything we can to help you take advantage of it.

The Fhenix docs have everything you need to get started building.

As always, if you have any questions about FHE or Fhenix, ask away in the Fhenix Discord. And don’t forget to follow us on Twitter/X!

Confidentially yours,
The Fhenix team

Fhenix and zkPass: Bringing Secure and Confidential Identity and Reputation Verification Onchain

Date: 18-07-24


Fhenix and zkPass: Bringing Secure and Confidential Identity and Reputation Verification Onchain

We’re excited to announce a partnership with zkPass: an oracle protocol that provides secure, verifiable sharing of private internet data.

There’s a natural synergy between an identity and attestation service like zkPass and an FHE confidentiality-enabling blockchain like Fhenix. Both projects will collaborate to utilize ZK’s proofing strengths with FHE computation to provide private and secure onchain identity and reputation verification.

Where Existing Data Verification Solutions Fall Short

How do you securely and credibly prove you are who say you are digitally? It’s a good question, and one that’s only going to grow increasingly important to answer as more of our personal and financial lives move online/onchain. From proving your legal identity, to work experience, to ownership of real-world assets, the list of use cases for secure and trustless data verification is long.

Existing Web 2.0 identity verification solutions operate by placing trust in centralized third parties to securely store and process private data in order to perform data verification. The system is not only cumbersome, but vulnerable to data leaks and potential abuse from malicious actors. The solution is a decentralized system which removes the burden of verification from exploitable third parties and instead relies on math and code to execute this critical process.

Proving, Improved

The zkPass protocol guarantees private data authenticity by generating a Zero-Knowledge Proof (ZKP) in order to selectively prove various types of personal data. These zero-knowledge proof computations are performed locally, removing the need to upload sensitive data to third parties. The possible use cases for this more secure form of data verification are great, especially when combined with the confidentiality-enabling capabilities of Fhenix.

In addition to securely verifying specific pieces of data, zkPass could also be utilized to create a reputation system using the verified data points ZKPs provide as attestations for an entity’s onchain activities. Couple that with the selective confidentiality enabled by Fhenix and you have an incredibly powerful and flexible solution to onchain identity and reputation.

This collaboration opens up the design space for applications relying upon private, secure, and verified data and identity. For example, imagine a confidential DEX which uses Fhenix/FHE to obfuscate potentially personally identifiable trading history. This confidential data could then be complemented by zkPass’s data verification to prove things like trade volume and asset ownership, providing a trusted record of onchain achievement without ever introducing the possibility of exposing sensitive user data. This is just one example of the many potential use cases made possible by combining these two distinct and complementary technologies.

Building Towards a Confidential and Proveable Future

The partnership between Fhenix and zkPass represents a positive step towards providing a more secure digital environment for users and builders alike. An upgraded solution to data verification is inevitable at a time when the growing utility of onchain applications is causing users’ digital footprint to expand.

We’re incredibly excited to be working together with the team at zkPass to help usher in this proveable and confidential future for Ethereum.

For an overview of zkPass, check out this introduction and follow them on Twitter/X.

To learn more about Fhenix head to Fhenix.io and follow us on Twitter/X. If you’re ready to jump right in to building confidential smart contracts on the EVM-compatible Fhenix Helium testnet, check out the docs.

As always, if you have any questions about FHE or Fhenix, ask away in the Fhenix Discord!

Fhenix and Privasea Team Up to Bring FHE to the AI Age

Date: 13-06-24


Fhenix and Privasea Team Up to Bring FHE to the AI Age

We’re pleased to announce a partnership with Privasea, a leader in FHEML-focused AI + DePIN computing. The partnership will utilize both Privasea and Fhenix’s expertise to advance development of secure AI applications using FHE.

The Importance of FHE in the AI Age

As an ever-increasing amount of our data moves online, the need for data privacy technologies has never been greater. In this inexorable march towards digitization, a robust and trustless privacy technology is needed to safeguard our digital sovereignty. This necessity has only grown more obvious with the advent of AI and Large Language Models (LLMs), which utilize massive amounts of data for training.

Fully Homomorphic Encryption (FHE) is an ideal encryption solution for AI because it allows for direct computation on encrypted data. This enables LLMs to process the vast amounts of data needed to operate blindly, without ever needing to decrypt it. This results in a safer, more secure relationship between users and AI.

The collaboration between Fhenix and Privasea will leverage the unique talents and expertise of both parties to progress development at the intersection of AI and blockchain. These efforts include the continued development of FHE libraries, providing interoperability between the two projects, and hardware acceleration initiatives.

Software Development

Both Fhenix and Privasea will work together to extend Zama’s TFHE-rs library, a core infrastructure component of both projects. Additionally, both teams will work to enable the integration of Privasea applications on top of Fhenix’s Layer 2 infrastructure.

Fhenix and Privasea will also explore ways to integrate additional homomorphic encryption schemes based on CKKS/BGV/BFV, which allow data packing and SIMD parallel processing. This will provide better support for large-scale, high-precision computing scenarios, widening the product possibilities for both parties.

Hardware Acceleration

Alongside these software development initiatives, Fhenix and Privasea will also work in tandem on potential avenues for hardware acceleration. Specifically, we’re looking at hardware acceleration on the underlying NTT/FFT using high-parallelism, high-performance hardware such as GPUs and FPGAs. This hardware advancement is expected to provide a significant breakthrough in the efficiency of fully homomorphic encryption algorithms. We’re also taking a look at programming custom ASIC chips to improve Fhenix’s performance.

Conclusion

The Fhenix-Privasea collaboration represents a significant step forward in the integration of Fully Homomorphic Encryption into AI and blockchain applications. We’re excited to work with the Privasea team to leverage both of our unique talents to usher FHE into the AI Age.

The next generation of blockchain applications will utilize FHE to create confidential smart contracts. This novel cryptographic primitive opens up a slew of new use cases, including AI.

If you’re an application builder who wants to learn more, our docs are a good place to start.

If you have any questions about Fhenix or FHE, we’d love to answer them in our Discord.

Oh, and don’t forget to follow us on Twitter/X if you aren’t already.

“Let’s continue to be human, in a sea of bots.”

Building a Confidential Future for Ethereum

Date: 04-06-24


Building a Confidential Future for Ethereum

Today marks an important milestone in our mission to bring confidentiality to Ethereum through the first Layer 2 powered by the holy grail of cryptography: fully homomorphic encryption (FHE).

We’re excited to announce we’ve raised a total of $15M in Series A funding led by Hack VC, Amber Group, Collider, Primitive Ventures, GSR, Stake Capital, and others. In addition, we’re proud to release the initial version of the Fhenix testnet, dubbed Helium, enabling anyone to deploy their confidential smart contracts to the network using FHE to encrypt all or part of their application.


Why are we building Fhenix?

Ethereum has made huge strides over the last decade, with some of the most recent and significant advancements including the move to proof of stake and the maturation of Layer 2s as an effective scaling solution. But a glaring obstacle still remains for the world’s largest smart contract platform: it has no confidentiality.

Ethereum is well on its way to becoming a network capable of scaling human coordination in the digital age, but its current lack of data encryption presents a serious impediment to its growth trajectory. The promise of Ethereum is one of a permissionless network which returns sovereignty to the people who use and maintain it–the next, upgraded iteration of the internet. In order to realize this vision it must possess a robust and flexible answer to the question of confidentiality, a fundamental building block of human orchestration. Ethereum cannot reach its next stage of maturity without the ability to securely safeguard confidential data in a scalable manner.

We’ve spent years in the cryptographic and blockchain space researching the ideal solution to this problem and we came out the other end with a strong conviction that FHE is the answer. 

The key differentiator that sets FHE apart from other privacy enhancing solutions is the ability to perform computation on encrypted data. This simple yet powerful distinction has huge implications. It means data, which has become ever more valuable in the digital age, need not be decrypted for processing, making it that much more secure.

For a long time production-scale use of FHE wasn’t feasible due to its high computational expense, but advancements in both FHE and computer hardware have created a new reality. FHE is ready for prime time, and Fhenix is here to lower the barrier to entry of this exciting new technology by providing an accessible, EVM-compatible network for application developers to build on.

Come and build

This is a call to all hackers, cypherpunks, crypto nerds, and would-be tech entrepreneurs.

If crypto is the vanguard of cutting-edge software development, FHE is at the forefront of this technological revolution. This presents an unprecedented opportunity to build an entirely novel set of applications on Ethereum by virtue of the confidentiality that FHE enables.

Being at the forefront is not for everyone. We are in the early stages of confidential smart contracts. Many dismissed the internet, mobile computing, and Bitcoin until their network effects were already too large to ignore.

If it were easy, everyone would do it.

Fhenix is for contrarians with conviction–optimistic, heterodox builders with novel, visionary ideas who stand out in a sea of derivative, copy-paste GitHub repos. A blue ocean of applications awaits those with the foresight and conviction to see this bigger picture.

We’re here to support you with the requisite infrastructure, documentation, and dev tooling to help you turn your dreams into reality. Fhenix is fully EVM-compatible and intentionally built to be as developer-friendly as possible. Solidity-based developers can immediately begin building with familiar tools like Hardhat, Remix, and more. The goal is to make getting started with Fhenix as easy as possible.

We’ll also be offering generous grant and bounty programs to incentivize this new school of builders. The details of these programs are still being hashed out (pun intended), but you can apply for early access through the Fhenix docs.

In the meantime, fire up your development environments, because the first iteration of the Fhenix testnet is officially open and ready for deployment!

A lot of work has gone into this initial version of the Fhenix testnet and we expect to make even more improvements based on your feedback and ideas. We can’t wait to see what kind of interesting use cases you cook up in this new, confidentiality-enabled design space.

How to get involved

The Fhenix docs have everything you need to get started building.

For more background on Fhenix check out our website and read the whitepaper.

Don’t forget to provide feedback and participate in community discussions on Discord and follow @FhenixIO on Twitter/X.

We are thrilled to be taking these first steps towards a confidential future for Ethereum with you, and we can’t wait to build this exciting future together.

FHE Coprocessors™: Fhenix & Eigenlayer Join Forces for Next-gen Onchain Confidentiality

Date: 02-04-24


FHE Coprocessors™: Fhenix & Eigenlayer Join Forces for Next-gen Onchain Confidentiality

Fhenix is excited to announce the development of FHE coprocessors in collaboration with EigenLayer. Both projects will be dedicating significant resources towards FHE coprocessors, bringing wide-scale confidential compute to the Ethereum ecosystem.

Through this partnership, Fhenix’s FHE coprocessors will be able to provide fast transaction confirmation, allowing us to significantly scale up performance. This breakthrough marks a major milestone in the advancement of onchain FHE.

How Fhenix’s FHE Coprocessors Works

A coprocessor serves as a companion processor designed to offload specific computational tasks from a host chain – whether it’s Ethereum, an L2, or an L3, to a designated processor living outside the scope of the host.

While different types of coprocessors exist, Fhenix’s FHE coprocessors have a specific focus on maintaining data confidentiality and leveraging FHE rollups. FHE rollups have built-in encryption and unlock many novel use cases. For example, confidential AI is possible by having FHE coprocessors run intensive computations away from the host chain while ensuring that the input data is kept private.

FHE coprocessors drastically improve the efficiency of FHE-based operations, while maintaining the same level of security as the host chain.

Interacting with an FHE coprocessor is simple: an application on the host chain invokes the coprocessor, asking it to perform some specific computation over a set of encrypted inputs, and gets the result back, which it can then use onchain.

Computations are secured through Fhenix’s optimistic rollup architecture, employing fault proofs to ensure data integrity. However, these fault proofs necessitate a lengthy dispute period (normally a seven day window) for finality, which is impractical and severely limits the potential of FHE applications.

EigenLayer helps to address this challenge. It provides a ‘fast-lane’ mode in which operators verify the execution and attest to its correctness. These operators are secured by sufficient stake, and can later be slashed if they act maliciously. It’s important to note that having a dispute window is still critical, as it allows these operators to remain accountable after-the-fact, while sufficiently ensuring that no profit-maximizing operator misbehaves. In other words, thanks to EigenLayer’s cryptoeconomic security, apps utilizing an FHE coprocessor can use their output as soon as the operators verify execution, thereby facilitating substantial scaling of confidential onchain computation.

New Applications Horizon

The versatility of FHE coprocessors spans a wide range of scenarios, especially in domains prioritizing confidentiality.

For instance, consider their application in onchain auctions, where bid confidentiality ensures fairness and a more economical outcome for all bidders. Similarly, with onchain AI, FHE coprocessors can run intensive computations outside their host chain while still ensuring that the input data is kept private. The list of potential use cases is extensive, including decentralized identity, confidential DeFi, encrypted gaming, MEV protection, and many more.

To learn more about FHE use cases, click here.

A Future Shaped by FHE Coprocessors

Fhenix’s FHE coprocessors offload computational tasks and accelerate the rate in which confidential onchain transactions can be processed. Given that security is inherited from Fhenix’s optimistic rollup design, an existing limitation is that optimistic fault proofs are subject to a seven-day dispute period.

This partnership between Fhenix and Eigenlayer marks a significant milestone in the evolution of blockchain technology. By harnessing the power of FHE coprocessors, developers will be able to build applications that utilize confidential data efficiently while maintaining the same level of security. This technological advancement unlocks new capabilities for blockchain applications that were not possible before.

About Fhenix

Fhenix is building the first confidential smart contract platform using Fully Homomorphic Encryption (FHE), a novel cryptographic scheme that enables direct computation over encrypted data without ever revealing the underlying data.

Fhenix’s goal is to advance application development in the blockchain ecosystem by bringing data encryption and encrypted data computation to smart contracts, transactions, and onchain assets for the first time.

For more information, join our Discord.

About EigenLayer

EigenLayer is a protocol built on Ethereum that introduces restaking, a new primitive in cryptoeconomic security. Restaking enables staked ETH to be used as cryptoeconomic security for protocols other than Ethereum, in exchange for protocol fees and rewards.

For more information visit www.eigenlayer.xyz/

Securing DeFi’s Future: The Rise of Confidential Decentralized Finance

Date: 25-02-24


Securing DeFi's Future: The Rise of Confidential Decentralized Finance

Introduction:
Decentralized Finance (DeFi) is growing rapidly and bringing trading, borrowing & lending, derivatives, and more on-chain.

And yet, the public nature of blockchain is a significant limitation for many DeFi use cases.

In this article we’ll cover:

  • Challenges with a transparent DeFi ecosystem
  • How Fully Homomorphic Encryption (FHE) can be used to bring encryption to the blockchain, and the associated benefits.
  • Recent cryptographic developments that have helped bring FHE to DeFi

Challenges with Public DeFi:
Many areas of DeFi hold tremendous promise, including asset tokenization, derivatives, and payments. Tokenization alone represents a $16T opportunity, and institutions are realizing that DeFi isn’t going away.

That being said, the industry is early and there are inherent issues in having a fully transparent financial system. These include:

  • Privacy concerns: Many transactions may entail sensitive data, such as institutional payments, or anything relating to personal data. This will become an event greater concern as analytical tools develop, simplifying the task of tracking one’s wallets and potentially making it easier to correlate one’s wallet to their identity.
  • MEV extraction: Front-running and other forms of MEV extraction are common in DeFi, creating a hidden tax on transactions.
  • Regulatory challenges: DeFi is facing increasing regulatory scrutiny, likely to only accelerate.

Fully Homomorphic Encryption (FHE) enables computations to be done on encrypted data, which was never before possible. This means that on-chain data can be encrypted while still updating the network’s shared state transaction-by-transaction.

From a privacy perspective, encryption keeps all data confidential and auditable, which coincidentally is critical for complying with data protection and privacy laws. It also means that block proposers cannot view transaction data, therefore prioritizing based on network rules rather than personal gain and preventing MEV.

Next, let’s take a look at technological advancements and considerations.

FHE in DeFi: Technical Considerations:
A challenge with FHE in DeFi is that computations must be exact, which requires the use of a specific type of scheme. A scheme refers to a standardized and systematic approach that helps developers manage data or code to efficiently solve problems.

The best DeFi-specific FHE schemes are known as BGV or BFV, which we covered in our blog post titled FHE Challenges: Part 1. While other schemes may also be used, BGV and BFV are considered the most efficient as they batch multiple computations together. These schemes are still being developed alongside FHE libraries and compilers, which in combination will radically improve the development experience.

Meanwhile, the fact that the tech is so cutting-edge means that it’s quite challenging to do computations on ciphertext (encrypted data). For example, in the past only the denominator in a division was able to be ciphertext. Recent advancements have made it possible to divide a ciphertext by another ciphertext, opening up the potential for more types of confidential DeFi transactions. AMM calculations are a use case, as encrypted calculations on DEXs (like Uniswap) require the ability to divide ciphertexts, which wasn’t formerly possible.

In the future, it’s likely that FHE tooling will improve further and open up the potential for more types of transactions, while the actual computing process also becomes significantly more efficient.

Conclusion:
Fully Homomorphic Encryption (FHE) emerges as a transformative solution to concerns regarding DeFi’s public nature. As the DeFi landscape expands, the need for confidentiality, security, and regulatory compliance becomes increasingly pronounced. FHE encrypts individual transactions and state transitions, safeguarding sensitive data while allowing for auditability when necessary.

Recent cryptographic advancements, including efficient FHE schemes like BGV and BFV, alongside breakthroughs enabling computations on ciphertexts, signal significant progress. These developments hold promise for broader adoption of FHE in DeFi applications, enhancing privacy and security across the ecosystem.

To learn more, visit Fhenix.io

FHE & Web3’s New Horizon of Use-Cases

Date: 04-02-24


FHE & Web3’s New Horizon of Use-Cases

TLDR:

  • There are 7 areas of blockchain that are limited by blockchain’s innate transparency. This list is only growing, and Fhenix’s ability to incorporate Fully Homomorphic Encryption (FHE) on-chain is key to enabling privacy-centric use cases.
  • Confidential Transactions are important for payments, voting, medical records, and other sensitive data. FHE keeps all data private and secure.
  • On-chain auctions, ranging from traditional bids to DeFi liquidations, governance decisions, and token sales, can be fully private and secure, protecting bidder data and ensuring the auction’s integrity.
  • Confidential Voting is important for maintaining voter privacy, limiting manipulation, and adhering to regulatory compliance laws.
  • Encrypted Gaming has all state updates done on-chain while hiding player data (such as their holding or historical strategies), and secures in-game transactions.
  • Decentralized Identities are on-chain identifiers that require control over one’s personal data, secure encryption and interoperability, and secure authentication.
  • MEV Protection can be implemented by having all mempool transactions encrypted, preventing front-running and ensuring fairness over transaction ordering.
  • Privacy-preserving AI keeps all data private, secure and on-chain, all the way from the model’s training data to the actual results.

Introduction:
Transparency is a core strength of blockchain, but also limits vital use cases needed to scale the industry to a global level.

For example, institutional use cases such as payments tend to revolve around sensitive data not suitable for the blockchain. Additionally, sophisticated bots are continuously monitoring public data for potential network exploits network.

We foresee 7 areas that benefit from on-chain encryption:

  1. Confidential Transactions
  2. On-Chain Auctions
  3. Confidential Voting
  4. Encrypted Gaming
  5. Decentralized Identity
  6. MEV Protection
  7. Privacy-Preserving AI

The number of counterparties and the strength of on-chain analytical tools and bots will only increase, meaning that having built-in privacy and security is paramount.

In this article, we’ll cover all core use cases enabled through FHE Rollups, custom-built Layer 2’s with confidentiality built-in from the core.

1. Confidential Transactions

Blockchain’s innate transparency imposes many limitations on potential use cases and adoption by exposing sensitive transaction details. Payments, voting, medical records, one’s financial history, and many other use cases require confidentiality, and the list will only expand alongside blockchain adoption. By enabling confidential and yet auditable transactions to take place on-chain, both consumer and corporate users of the blockchain users can benefit greatly.

Benefits include:

  • Privacy protection: complete privacy over user identities, transaction amounts, and other sensitive information. This not only protects the mempool (encrypted state), but also the fields used to advance the networks state (encrypted transit).
  • Enhanced security: transactions remain tamper-proof and private throughout the entire process.
  • Preventing manipulation and front-running: full transaction privacy reduces the potential for unethical practices while ensuring fair transaction processing.
  • Regulatory compliance: easy alignment with data protection and privacy laws, regardless of jurisdiction.

2. On-Chain Auctions

On-chain auctions, ranging from traditional bids to NFT marketplace offerings, DeFi liquidations, governance decisions, and token sales, can significantly benefit from Fhenix’s confidential smart contracts. These contracts allow users to place encrypted bids, maintaining anonymity and fairness without exposing personal data or sensitive bid details. Upon the auction’s closure, only the winning bids are disclosed, an approach especially valuable for high-stake or sensitive transactions involving premium items or significant financial decisions.

Benefits include:

  • Encrypted Bids: Bids are encrypted to ensure confidentiality and prevent exposure during the auction process. 
  • Full Smart Contract Functionality: An automated auction process with full confidentiality, including bid submission, validation, and winner selection.
  • Reveal Mechanism: Secure reveal winning bids at the auction’s conclusion without compromising the integrity of the process.
  • Privacy-Preserving Protocols: Maintain confidentiality of participants’ identities, bid amounts, and other confidential information.

3. Confidential Voting

On-chain voting is critical for Decentralized Autonomous Organization (DAO) voting, as well as for consensus mechanisms and any other forms of on-chain voting where confidentiality and security are needed.

Projects using Fhenix’s FHE can vote with complete confidentiality, while the system knows that their votes are entirely valid. FHE’s stringent security & privacy characteristics also make it regulatory compliant, enabling voting even in high-stakes environments, such as governmental elections.

Benefits include:

  • Voter Privacy: This protects voters from external influence or coercion, and safeguards their privacy.
  • Security: Encryption makes it challenging for attackers to trick the system, study voter patterns, or manipulate the system in any manner.
  • Regulatory Compliance: Adherence to election laws and privacy regulations, especially critical for important vote situations.

4. Confidential Gaming

Multiplayer Web3 games face various challenges caused by the blockchain’s transparency, including exposing real-time positions, analyzing historical strategies, in-person identity correlation, and other forms of potential manipulation. For example, on-chain poker is challenging as all cards are publicly visible and the game can be manipulated.

With FHE, developers can integrate confidentiality into Web3 games, keeping all data entirely confidential while still updating the blockchain’s state after each move.

Benefits include:

  • Securing In-Game Transactions: Public blockchain records enable opponents to analyze past strategies and pending moves or to manipulate the game such as through front-running actions. Encrypting both financial transactions and player actions protects against real-time manipulation.
  • Protecting Player Data: Player data, such as financial assets and personal information, can be discoverable and expose them to phishing attacks and real-world security risks. Encryption anonymizes player activity, reducing these risks.
  • Transparent State Updates: Existing solutions such as ZKPs have transactions processed off-chain and only periodically updated on-chain. FHE has all in-game actions encrypted on-chain, yet verifiable via decryption.

5. Decentralized Identity (DiD)

Decentralized Identity (DID) represents an on-chain identifier facilitating a secure and verifiable digital identity. This approach ensures that an individual’s identity remains self-owned and isn’t subject to control by a central authority.

DiD at its core holds sensitive personal data that will be targeted by malicious parties. On-chain FHE enables the secure storage and verification of encrypted user data, while also providing selective disclosure and control over key parameters.

Benefits include:

  • Control Over Personal Data: Selective disclosure over identity attributes, for example, proving citizenship while ensuring all other details remain fully secure.
  • Secure Authentication: Traditional identity systems are frequently subject to data exploits. Fhenix protects login credentials and authentication tokens from being intercepted or duplicated.
  • Interoperability and Data Portability: DIDs operate across various platforms and services. Encryption ensures that while this data is portable and interoperable, it remains confidential and can only be accessed by entities with the appropriate decryption capabilities.

6. MEV Protection

Pending blockchain transactions are publicly visible in the network’s mempool, which can lead to value extracted through methods such as front-running or sandwich attacks. For example, a pending profitable transaction could be front-run by another party submitting the same transaction with a slightly higher gas fee paid. This is known as Maximal Extractable Value (MEV) and it’s a hidden tax.

This is easily preventable through Fhenix’s built-in confidentiality, whereby pending transaction data is kept confidential.

Benefits include:

  • Preventing Front-Running and Exploitation: By having the public data of all transactions encrypted and hidden from those monitoring the mempool, MEV bots to cannot engage in front-running, sandwich attacks, or other predatory practices.
  • Ensuring Transactional Fairness: Block proposers cannot view transaction data, therefore prioritizing based on network rules rather than personal gain.
  • Protecting Against Censorship: An inability for block builders to censor transactions.

7. Privacy-Preserving A.I.

The application of A.I. is expanding rapidly across various sectors, utilizing extensive amounts of data to perform intricate computations.  FHE allows AI models to process encrypted data, enabling the use of sensitive personal or financial information in AI computations securely, without privacy or security risks.

For example, Ethereum Founder Vitalik Buterin’s recent blog post covered how the overhead cost of putting AI inside cryptographic boxes is quite low, and FHE is a viable solution to this.

Additionally, Zama recently updated their Concrete-ML library to add the ability to train data using an encrypted ata set. They also plan to make have their Concrete-ML library be compatible with TFHE-rs ciphertexts, which is their Rust implementation of the TFHE (Zama’s variation of FHE).

The result is that quick advancements are being made when it comes to privacy-preserving AI on-chain, and that languages and libraries will be increasingly easy for developers to use.

The main implications are:

  • Data Privacy: A.I. models can use fully encrypted training data, while ensuring that it remains encrypted until it reaches its intended destination.
  • Security: Full encryption prevents unauthorized access or data manipulation.
  • Regulatory Compliance: Facilitates adherence to stringent data protection regulations in AI applications.

Implementing FHE

Given that there are so many ways that a project may benefit from the integration of FHE into one’s workflow, how can they get started?

Fhenix’s FHE Rollups enable developers to craft custom application chains with built-in FHE capabilities while using well-known EVM languages such as Solidity. This applies to all of the categories explored above, such as networks that are MEV-resistant, built for DiD, have a full privacy-focused gaming ecosystem, and much more.

Developers can easily deploy any custom-purpose Layer 2 with privacy, security, and compliance built-in from the core, while knowing that transactions are auditable if need be.

Fhenix’s mission is to usher in a new era of computing, prioritizing privacy and security, and ultimately eliminating data breaches while maintaining confidentiality and data integrity for all.

Those interested may visit our website at fhenix.io to learn more.