Introduction
In the progression of human civilization, cryptographic technology has played a crucial role, especially in the fields of information security and privacy protection. It not only provides solid protection for data transmission and storage in various fields but also combines the asymmetric encryption public-private key system and hash function, which was creatively integrated by Satoshi Nakamoto in 2008. This integration designed a proof-of-work mechanism to solve the double-spending problem, thus promoting the birth of Bitcoin, a revolutionary digital currency, and ushering in a new era for the blockchain industry.
With the continuous evolution and rapid development of the blockchain industry, a series of cutting-edge cryptographic technologies have emerged, among which zero-knowledge proofs (ZKPs), multi-party computation (MPC), and fully homomorphic encryption (FHE) are the most prominent. These technologies have been widely applied in various scenarios. For example, ZKPs combined with the Rollup solution solve the “impossible triangle” problem in blockchain, while MPC combined with the public-private key system promotes the mass adoption of user entry. As for fully homomorphic encryption (FHE), which is considered one of the holy grails of cryptography, its unique characteristics allow third parties to perform unlimited calculations and operations on encrypted data without decrypting it. This enables composable on-chain privacy computing and brings new possibilities to multiple fields and scenarios.
A Quick Overview of FHE
When we mention Fully Homomorphic Encryption (FHE), we can first understand the meaning behind its name. “HE” represents homomorphic encryption technology, which allows computations and operations on ciphertexts that can be directly mapped to plaintext while maintaining the mathematical properties of encrypted data. The “F” in FHE signifies that this homomorphism reaches new heights, allowing for unlimited computations and operations on encrypted data.
To help understand, let’s use the simplest linear function as an encryption algorithm and combine it with a single operation to illustrate additive homomorphism and multiplicative homomorphism. Of course, in practical FHE implementations, a series of more complex mathematical algorithms are used, which place high demands on computational resources (CPU and memory).
Although the mathematical principles of FHE are profound and complex, we will not delve into them too much here. It is worth mentioning that in the field of homomorphic encryption, there are partial homomorphic encryption and somewhat homomorphic encryption in addition to FHE. They mainly differ in the types of supported operations and the number of allowed computations but also provide possibilities for performing calculations and operations on encrypted data. However, to keep the content concise, we will not go into further discussion here.
In the FHE industry, although many well-known companies are involved in research and development, Microsoft and Zama stand out with their outstanding open-source products (code libraries), highlighting their unparalleled usability and influence. They have provided developers with stable and efficient FHE implementations, greatly promoting the continuous development and widespread application of FHE technology.
Microsoft’s SEAL: A carefully crafted FHE library by Microsoft Research Institute, not only supports fully homomorphic encryption but also is compatible with partial homomorphic encryption. SEAL provides an efficient C++ interface and significantly improves computational performance and efficiency through the integration of numerous optimization algorithms and techniques.
Zama’s TFHE: It is an open-source library focused on high-performance fully homomorphic encryption. TFHE provides services through a C language interface and utilizes a series of advanced optimization techniques and algorithms to achieve faster computation speed and lower resource consumption.
Following a simplified approach, the operation process of experiencing FHE is roughly as follows:
Key Generation: Use an FHE library/framework to generate a pair of public and private keys.
Data Encryption: Encrypt the data that needs to undergo FHE computation using the public key.
Homomorphic Computation: Utilize the homomorphic computation functionality provided by the FHE library to perform various calculations on the encrypted data, such as addition and multiplication.
Result Decryption: When the computation result needs to be viewed, a legitimate user decrypts the result using the private key.
In the practice of FHE, the management scheme for decryption keys (generation, circulation, and usage) is crucial. Since the computation and operation results of encrypted data need to be decrypted for use in certain moments and scenarios, the management of decryption keys becomes the core of ensuring the security and integrity of original and processed data. Regarding the management of decryption keys, the scheme is actually similar to traditional key management, but given the specificity of FHE, more rigorous and detailed strategies can also be designed and adopted.
For blockchain, due to its decentralized, transparent, and tamper-resistant characteristics, the introduction of threshold-based multi-party secure computation schemes (Threshold Multi-Party Computation, TMPC) is a highly promising choice. This scheme allows multiple participants to jointly manage and control decryption keys, and data can only be decrypted when the preset threshold (i.e., the number of participants) is reached. This not only enhances the security of key management but also reduces the risk of a single node being compromised, providing strong guarantees for the application of FHE in blockchain environments.
Laying the Foundation: fhEVM
From the perspective of minimal intrusion, the ideal way to implement the application of FHE on the blockchain is to encapsulate it into a universal smart contract code library to ensure lightweight and flexibility. However, the prerequisite for this solution is that the smart contract virtual machine must pre-support a specific instruction set for the complex mathematical operations and encryption operations required by FHE. If the virtual machine cannot meet these requirements, it is necessary to customize and modify the core architecture of the virtual machine to adapt to the needs of FHE algorithms, thus achieving seamless integration.
As a widely adopted and long-time verified virtual machine, EVM naturally becomes the preferred choice for implementing FHE. However, there are few practitioners in this field, and we once again notice Zama, the company behind the open-source TFHE. Zama not only provides the basic TFHE library but also, as a technology company focusing on applying FHE technology to artificial intelligence and blockchain fields, has launched two important open-source products: Concrete ML and fhEVM. Concrete ML focuses on privacy-preserving machine learning computations. Through Concrete ML, data scientists and ML practitioners can train and infer machine learning models on sensitive data while protecting privacy, fully utilizing data resources without worrying about privacy leaks. The other product, fhEVM, is a fully homomorphic EVM that supports Solidity for privacy computations. fhEVM allows developers to use fully homomorphic encryption technology in Ethereum smart contracts to achieve privacy protection and secure computation.
By reading the documentation of fhEVM, we understand that its core features are:
fhEVM: At the non-EVM bytecode level, in the form of embedded functions, it provides support for FHE by integrating multiple precompiled contracts with different states from Zama’s open-source FHE library. Additionally, a specific EVM memory and storage area tailored for FHE has been created to store, read, and verify FHE ciphertexts.
Decryption mechanism based on distributed threshold protocol design: Supports the asynchronous encryption mechanism of sharing global FHE keys for encrypted data among multiple users and multiple contracts and sharing decryption keys among multiple validators using a threshold-based multi-party secure computation scheme.
Solidity contract library that reduces the threshold for developers: Designed FHE encryption data types, operation types, decryption calls, and encrypted outputs, etc.
Zama’s fhEVM provides a solid starting point for FHE technology in blockchain applications. However, considering that Zama mainly focuses on technological research and development, its solution leans more towards the technical aspect, with relatively less consideration for engineering implementation and commercial applications. Therefore, in the process of promoting the practical application of fhEVM, it may encounter various unforeseen challenges, including but not limited to technical barriers and performance optimization issues.
Building the FHE-Rollups Ecosystem
fhEVM itself cannot constitute an independent project or a complete ecosystem. It is more like one of the diversified clients in the Ethereum ecosystem. In order to establish itself as an independent project, fhEVM must rely on a public chain-level architecture or adopt Layer 2/Layer 3 solutions. The development direction of an FHE public chain inevitably needs to address how to reduce the redundancy and waste of FHE computational resources among distributed validator nodes. On the contrary, Layer 2/Layer 3 solutions that exist as the execution layer of a public chain can distribute computational work to a small number of nodes, greatly reducing the magnitude of computational overhead. It is precisely because of this that Fhenix, as a pioneer, actively explores the integration of fhEVM into the Layer 2/Layer 3 solutions, which can provide a solid foundation for the practical application of FHE in the blockchain field.Introducing an Advanced FHE-Rollups Layer 2 Solution with Rollup Technology
Incorporating Rollup technology, a proposal is made to build an advanced FHE-Rollups Layer 2 solution. Considering the complex Zero-Knowledge Proof (ZKP) mechanism involved in ZK Rollups and the enormous computational resources required to generate the proofs, directly implementing FHE-Rollups based on ZK Rollups would face numerous challenges. Therefore, at this stage, compared to ZK Rollups, adopting Optimistic Rollups as the technical choice for Fhenix would be more practical and efficient.
Fhenix’s technology stack mainly consists of several key components: a variant of Arbitrum Nitro’s fraud prover, which can perform fraud proofs in WebAssembly, allowing FHE logic to be compiled and securely executed; the core library fheOS, which provides all the necessary functionality to integrate FHE logic into smart contracts; and the Threshold Service Network (TSN), which hosts the network keys for secret sharing and uses specific algorithmic secret sharing techniques to ensure security. When necessary, TSN is responsible for decrypting data and performing other tasks.
Based on the aforementioned technology stack, Fhenix has released its first public version, Fhenix Frontier. Although this early version has limitations and missing features, it provides comprehensive usage instructions for smart contract code libraries, Solidity API, contract development toolchains (such as Hardhat/Remix), and JavaScript libraries for frontend interactions. Developers and ecosystem project participants interested in Fhenix can explore it further by referring to the official documentation.
Chain-Agnostic FHE Coprocessors
Building upon FHE-Rollups, Fhenix ingeniously introduces the Relay module to empower various public chains, L2, and L3 networks, enabling them to access FHE Coprocessors and utilize FHE functionality. This means that even if the original Host Chain does not support FHE, it can indirectly benefit from the powerful FHE capabilities. However, due to the typically long proof challenge period of FHE-Rollups, which can last up to 7 days, the widespread application of FHE is somewhat limited. To overcome this challenge, Fhenix collaborates with EigenLayer to provide a faster and more convenient channel for FHE Coprocessors’ service through EigenLayer’s Restaking mechanism, greatly enhancing the efficiency and flexibility of the entire FHE Coprocessors.
The usage process of FHE Coprocessors is simple and straightforward:
1. The application contract calls the FHE Coprocessor on the Host Chain to perform encrypted computation operations.
2. The Relay contract queues the request.
3. Relay nodes listen to the Relay contract and forward the call to the dedicated Fhenix Rollup.
4. FHE Rollup performs FHE computation operations.
5. The Threshold Service Network decrypts the output.
6. Relay nodes return the results and optimistic proofs to the contract.
7. The contract verifies the optimistic proof and sends the results to the caller.
8. The application contract continues executing based on the call results.
Fhenix Participation Guide
If you are a developer, you can delve into Fhenix’s documentation and develop your own FHE-based applications to explore their potential in practical applications.
If you are a user, you can try out the dApps provided by Fhenix’s FHE-Rollups to experience the data security and privacy protection offered by FHE.
If you are a researcher, we highly recommend carefully reading Fhenix’s documentation to gain a deep understanding of FHE’s principles, technical details, and application prospects, so that you can make valuable contributions in your research field.
Best Application Scenarios for FHE
FHE technology has shown broad application prospects, especially in areas such as gaming, DeFi, and AI. We firmly believe that FHE has enormous potential and vast application space in these fields:
Privacy-preserving blockchain games: FHE technology provides powerful encryption protection for financial transactions and player actions in the gaming economy, effectively preventing real-time manipulation and ensuring fairness. Additionally, FHE can anonymize player activities, significantly reducing the risk of financial asset and personal information exposure, thus comprehensively protecting player privacy.
DeFi/MEV: With the booming development of DeFi activities, many DeFi operations have become targets of MEV attacks in the dark forest. To address this challenge, FHE can effectively protect sensitive data in DeFi, such as position quantities, liquidation thresholds, and transaction slippage, while ensuring the processing of business logic calculations. By applying FHE, the health of on-chain DeFi can be significantly improved, thereby reducing the frequency of malicious MEV behaviors.
AI: Training AI models relies on datasets, and ensuring the security of individual data when using it for training is a top priority. In this regard, FHE technology becomes an ideal solution for training AI models with individual privacy data. It allows AI to process encrypted data, completing the training process without disclosing any personally sensitive information.
Recognition of FHE in the Community
The development of technology is not solely based on its hardcore features. To achieve the maturity and continuous progress of technology, it must rely on continuous academic research and the active community. In this aspect, FHE is considered the holy grail of cryptography, and its potential and value have long been widely recognized. In 2020, Vitalik Buterin expressed high recognition and support for FHE technology in his article “Exploring Fully Homomorphic Encryption.” Recently, he reiterated his stance on social media, further reinforcing his support and calling for more resources and efforts for the development of FHE technology. Correspondingly, emerging projects, non-profit research, and educational organizations, as well as continuous market funding, seem to herald the prelude to a technological breakthrough.
Potential Early-stage FHE Ecosystem
In the early development of the FHE ecosystem, besides the core foundational technology service company Zama and the highly anticipated Fhenix project, there are several other outstanding projects worth exploring and paying attention to:
– Sunscreen: A self-developed FHE compiler that supports traditional programming languages for FHE transformation, designed to provide decentralized storage for FHE ciphertext, and output FHE features as an SDK for Web3 applications.
– Mind Network: A secure FHE network that combines EigenLayer’s Restaking mechanism, specifically designed to enhance security for AI and DePIN networks.
– PADO Labs: Introducing zkFHE, a fusion of ZKP and FHE, and building a decentralized computing network on top of it.
– Arcium: Formerly Elusiv, a privacy protocol for Solana, recently transformed into a parallel confidential computing network that incorporates FHE.
– Inco Network: Focusing on optimizing the computational cost and efficiency of FHE, developing a complete ecosystem of Layer 1.
– Treat: A collaboration between the Shiba team and Zama, dedicated to expanding the Shiba ecosystem with an FHE Layer 3.
– octra: An FHE network developed using OCaml, AST, ReasonML, and C++, supporting isolated execution environments.
– BasedAI: A distributed network supporting FHE capabilities for LLM models.
– Encifher: Formerly BananaHQ, now renamed Rize Labs, focusing on FHEML around FHE.
– Privasea: An FHE network created by the NuLink core team, using Zama’s Concrete ML framework to achieve data privacy protection in AI’s ML inference processes.
For non-profit research and educational institutions, we strongly recommend FHE.org and FHE Onchain, as they provide valuable resources for academic research and educational outreach throughout the ecosystem.
Due to space limitations, we were unable to list all the excellent projects in the FHE ecosystem. However, please believe that this ecosystem holds infinite potential and opportunities, worthy of continuous exploration and discovery.
Conclusion
We are optimistic about the future of FHE technology and have high expectations for the Fhenix project. Once the Fhenix mainnet is released and officially launched, we anticipate that applications in various fields will be enhanced by FHE technology. We firmly believe that this innovative and vibrant future is within reach.
References:
– Zama: https://zama.ai/
– Microsoft SEAL: https://github.com/microsoft/SEAL
– Fhenix: https://www.fhenix.io/
– Mind Network: https://mindnetwork.xyz/
– Inco Network: https://www.inco.org/
– Treat: https://x.com/treatsforShib
– octra: https://docs.octra.org/
– Encifher: https://x.com/encifherio
– BasedAI: https://www.getbased.ai/
– Privasea: https://www.privasea.ai/
– FHE.org: https://x.com/fhe_org
– FHE Onchain: https://x.com/FHEOnchain
– Vitalik Buterin’s article: https://vitalik.eth.limo/general/2020/07/20/homomorphic.html
– MessariCrypto’s tweet: https://x.com/MessariCrypto/status/1720134959875457352
– Foresight News article: https://foresightnews.pro/article/detail/59947