ArkStream Capital: لماذا نستثمر في مسار FHE؟
مقدمة
In the past, cryptography technology has played a pivotal role in the progress of human civilization, especially in the fields of information security and privacy protection. It not only provides solid protection for data transmission and storage in various fields, but also its asymmetric encryption public-private key system and hash function were creatively integrated by Satoshi Nakamoto in 2008 to design a proof-of-work mechanism to solve the double-spending problem, thus promoting the birth of Bitcoin, a revolutionary digital currency, and opening a new era for the blockchain industry.
With the continuous evolution and rapid development of the blockchain industry, a series of cutting-edge cryptographic technologies continue to emerge, among which zero-knowledge proof (ZKP), multi-party computation (MPC) and fully homomorphic encryption (FHE) are the most prominent. These technologies have been widely used in multiple scenarios, such as ZKP combined with the Rollup solution to solve the impossible triangle problem of blockchain, and MPC combined with the public-private key system to promote the large-scale application of user portals (Mass Adoption). As for fully homomorphic encryption FHE, which is regarded as one of the holy grails of cryptography, its unique characteristics enable third parties to perform any number of calculations and operations on encrypted data without decryption, thereby realizing composable on-chain privacy computing, which brings new possibilities to multiple fields and scenarios.
A quick overview of FHE
When we talk about FHE (Fully Homomorphic Encryption), we can first understand the meaning behind its name. First of all, HE stands for homomorphic encryption technology, whose core feature is that it allows calculations and operations on ciphertext, and these operations can be directly mapped to plaintext, that is, the mathematical properties of the encrypted data are kept unchanged. The F in FHE means that this homomorphism has reached a new level, allowing unlimited calculations and operations on encrypted data.
To help understand, we choose the simplest linear function as the encryption algorithm, and combine single operations to illustrate addition homomorphism and multiplication homomorphism. Of course, the actual FHE uses a series of more complex mathematical algorithms, and these algorithms have extremely high requirements for computing resources (CPU and memory).
Although the mathematical principles of FHE are profound and complex, we will not discuss them in detail here. It is worth mentioning that in the field of homomorphic encryption, in addition to FHE, there are two other forms: partial homomorphic encryption and some homomorphic encryption. The main difference between them is the types of operations supported and the number of operations allowed, but they also provide the possibility of realizing the calculation and operation of encrypted data. However, in order to keep the content concise, we will not discuss it in depth here.
In the FHE industry, although there are many well-known companies involved in research and development, Microsoft and Zama have demonstrated unparalleled availability and influence with their excellent open source products (code bases). They provide developers with stable and efficient FHE implementations, and these contributions have greatly promoted the continued development and widespread application of FHE technology.
Microsofts SEAL: A FHE library carefully built by Microsoft Research that not only supports fully homomorphic encryption, but is also compatible with partially homomorphic encryption. SEAL provides an efficient C++ interface and significantly improves computing performance and efficiency by integrating numerous optimization algorithms and technologies.
Zamas TFHE: is an open source library focused on high-performance fully homomorphic encryption. TFHE provides services through a C language interface and uses a series of advanced optimization techniques and algorithms to achieve faster computing speed and lower resource consumption.
According to the most simplified idea, the operation process of experiencing FHE is as follows:
-
Generate keys: Generate a pair of public and private keys using the FHE library/framework.
-
Encrypted data: Use the public key to encrypt the data that needs to be processed by FHE calculations.
-
Perform homomorphic computation: Use the homomorphic computation function provided by the FHE library to perform various computational operations on encrypted data, such as addition and multiplication.
-
Decryption result: When the calculation result needs to be viewed, the legitimate user uses the private key to decrypt the calculation result.
In the practice of FHE, the management scheme of decryption keys (generation, circulation, and use, etc.) is particularly critical. Since the calculation and operation results of encrypted data need to be decrypted for use at certain times and scenarios, the decryption key becomes the core to ensure the security and integrity of original and processed data. Regarding the management of decryption keys, its scheme actually has many similarities with traditional key management, but given the particularity of FHE, a more rigorous and detailed strategy can also be designed.
For blockchain, due to its decentralization, transparency, and immutability, the introduction of a threshold multi-party secure computing scheme (TMPC) is a very promising option. This scheme allows multiple participants to jointly manage and control the decryption key. Only when the preset threshold number (i.e. the number of participants) is reached can the data be successfully decrypted. This not only improves the security of key management, but also reduces the risk of a single node being hacked, providing a strong guarantee for the application of FHE in the blockchain environment.
fhEVM lays the foundation
From the perspective of minimal intrusion, the ideal way to implement FHE on the blockchain is to encapsulate it as a general smart contract code base to ensure portability and flexibility. However, the premise of this solution is that the smart contract virtual machine must pre-support the specific instruction set of complex mathematical operations and cryptographic operations required by FHE. If the virtual machine cannot meet these requirements, it is necessary to deeply customize and transform the core architecture of the virtual machine to adapt to the needs of the FHE algorithm so as to achieve its seamless integration.
As a widely adopted and long-proven virtual machine, EVM naturally becomes the first choice for implementing FHE. However, there are very few practitioners in this field. Among them, we once again noticed Zama, the company that open-sourced TFHE. It turns out that Zama not only provides the basic TFHE library, but also, as a technology company focusing on applying FHE technology to the fields of artificial intelligence and blockchain, has launched two important open source products: Concrete ML and fhEVM. Concrete ML focuses on machine learning privacy computing. Through Concrete ML, data scientists and ML practitioners can train and infer machine learning models on sensitive data while protecting privacy, thereby making full use of data resources without worrying about privacy leakage. Another product, fhEVM, is a fully homomorphic EVM that supports Solidity to implement privacy computing. fhEVM enables developers to use fully homomorphic encryption technology in Ethereum smart contracts to achieve privacy protection and secure computing.
By reading the fhEVM documentation, we learned that the core features of fhEVM are:
-
fhEVM: At the non-EVM bytecode level, it provides FHE support in the form of embedded functions by integrating multiple precompiled contracts in different states of the Zama open source FHE library. In addition, a specific EVM memory and storage area is created specifically for FHE to store, read, write, and verify FHE ciphertext;
-
Decryption mechanism based on distributed threshold protocol design: supports global FHE keys and on-chain storage of encryption keys for mixed encrypted data between multiple users and multiple contracts, and asynchronous encryption mechanism for sharing decryption keys between multiple validators using a threshold multi-party secure computation scheme;
-
Solidity contract library that lowers the threshold for developers to use: FHE encryption data types, operation types, decryption calls, and encryption outputs are designed;
Zamas fhEVM provides a solid starting point for FHE technology in blockchain applications, but considering that Zama mainly focuses on technology research and development, its solutions are more technical, and there is relatively little consideration in engineering implementation and commercial application. Therefore, in the process of promoting fhEVM to practical applications, it may encounter various unexpected challenges, including but not limited to technical barriers and performance optimization.
Building an Ecosystem of FHE-Rollups
The pure fhEVM itself cannot constitute a project or a complete ecosystem on its own. It is more like one of the diverse clients in the Ethereum ecosystem. If fhEVM wants to be an independent project, it must rely on the public chain-level architecture or adopt Layer 2/Layer 3 solutions. The development direction of the FHE public chain inevitably has to solve how to reduce the redundancy and waste of FHE computing resources among distributed validator nodes. On the contrary, the Layer 2/Layer 3 solution, which exists as the execution layer of the public chain itself, can distribute computing work to a small number of nodes, greatly reducing the order of magnitude of computing overhead. For this reason, Fhenix, as a pioneer, actively explores the combination of fhEVM and Rollup technology, and proposes to build an advanced FHE-Rollups type Layer 2 solution.
Considering that ZK Rollups technology involves complex ZKP mechanisms and requires huge computing resources to generate the proofs required for verification, combined with the characteristics of full FHE itself, directly implementing the FHE-Rollups solution based on ZK Rollups will face many challenges. Therefore, at this stage, compared with ZK Rollups, it is more practical and efficient to use the Optimistic Rollups solution as Fhenixs technical choice.
Fhenixs technology stack mainly includes the following key components: A variant of Arbitrum Nitros fraud prover, which can perform fraud proofs in WebAssembly, so FHE logic can be compiled into WebAssembly for safe operation. The core library fheOS provides all the functions required to integrate FHE logic into smart contracts. The Threshold Service Network (TSN) is another important component, which hosts the secret shared network key, splits it into multiple copies using secret sharing technology with a specific algorithm to ensure security, and is responsible for tasks such as decrypting data when necessary.
Based on the above technology stack, Fhenix released its first public version, Fhenix Frontier. Although this is an early version with many limitations and missing functions, it has provided comprehensive instructions for the use of smart contract code base, Solidity API, contract development tool chain (such as Hardhat/Remix), front-end interactive JavaScript library, etc. Developers and ecological project parties interested in this can refer to the official documentation for exploration.
Chain-Agnostic FHE Coprocessors
Based on FHE-Rollups, Fhenix cleverly introduced the Relay module, which aims to enable various public chains, L2 and L3 networks, so that they can access FHE Coprocessors and use FHE functions. This means that even if the original Host Chain does not support FHE, it can now indirectly enjoy the powerful functions of FHE. However, since the proof challenge period of FHE-Rollups is usually as long as 7 days, this has limited the widespread application of FHE to a certain extent. In order to overcome this challenge, Fhenix teamed up with EigenLayer to provide a faster and more convenient channel for the services of FHE Coprocessors through EigenLayers Restaking mechanism, greatly improving the efficiency and flexibility of the entire FHE Coprocessors.
The workflow for using FHE Coprocessors is straightforward:
-
The application contract calls FHE Coprocessor on the Host Chain to perform cryptographic calculations
-
Relay contract queue request
-
The Relay node listens to the Relay contract and forwards the call to the dedicated Fhenix Rollup
-
FHE Rollup performs FHE computation operations
-
Threshold network decryption output
-
The relay node sends the result and optimistic proof back to the contract
-
The contract verifies the optimistic proof and sends the result to the caller
-
Apply the contract and continue to execute the contract based on the call result
Fhenix Participation Guide
If you are a developer, you can delve into Fhenix鈥檚 documentation and develop your own FHE-based applications based on these documents to explore its potential in practical applications.
If you are a user, you might as well try the dApps provided by Fhenixs FHE-Rollups to experience the data security and privacy protection brought by FHE.
If you are a researcher, it is highly recommended that you read Fhenixs documentation carefully to gain a deeper understanding of the principles, technical details, and application prospects of FHE so that you can make more valuable contributions in your research field.
FHE Best Practices
FHE technology has shown a wide range of application prospects, especially in the fields of full-chain games, DeFi, and AI. We firmly believe that it has huge development potential and broad application space in these fields:
-
Privacy-protected full-chain games: FHE technology provides strong encryption protection for financial transactions and player operations in the game economy, effectively preventing real-time manipulation and ensuring the fairness and impartiality of the game. At the same time, FHE can also anonymize player activities, significantly reducing the risk of leakage of players financial assets and personal information, thereby protecting players privacy security in all aspects.
-
DeFi/MEV: With the booming development of DeFi activities, many DeFi operations have become targets of MEV attacks in the Dark Forest. To address this challenge, FHE can effectively protect sensitive data that DeFi does not want to disclose, such as position quantity, liquidation line, transaction slippage, etc., while ensuring the calculation and processing of business logic. By applying FHE, the health of on-chain DeFi can be significantly improved, thereby greatly reducing the frequency of bad MEV behavior.
-
AI: The training of AI models depends on data sets. When it comes to using individual data for training, ensuring the security of individual sensitive data becomes the primary premise. For this reason, FHE technology has become an ideal solution for training AI models with individual privacy data. It allows AI to process on encrypted data, thereby completing the training process without leaking any personal sensitive information.
Community Recognition of FHE
The development of technology cannot be achieved solely by its hard-core characteristics. To achieve the maturity and continuous progress of technology, it must rely on the continuous improvement of academic research and development and the active construction of community power. In this regard, FHE is called the holy grail of the cryptographic community, and its potential and value have long been widely recognized. In 2020, Vitalik Buterin highly recognized and supported FHE technology in his article Exploring Fully Homomorphic Encryption. Recently, he spoke again on social media, which undoubtedly re-strengthened this position and called for more resources and power for the development of FHE technology. Correspondingly, the emergence of new projects, non-profit research and educational organizations, and the continuous injection of market funds all seem to indicate that the prelude to a technological explosion is about to sound.
Potential FHE Early Ecosystem
In the early stages of the development of the FHE ecosystem, in addition to the core infrastructure technology service company Zama and the highly anticipated Fhenix project, there are a series of equally outstanding projects that deserve our in-depth understanding and attention:
-
Sunscreen: An FHE compiler built through self-development, supporting FHE conversions in traditional programming languages, designing corresponding FHE ciphertext decentralized storage, and finally outputting FHE features for Web3 applications in the form of SDK
-
Mind Network: Combined with EigenLayers Restaking mechanism, a FHE network specifically designed to extend security for AI and DePIN networks
-
PADO Labs: Launching zkFHE, a decentralized computing network that combines ZKP and FHE
-
**Arcium: **Formerly Solana鈥檚 privacy protocol Elusiv, it recently transformed into a parallel confidential computing network combined with FHE
-
Inco Network: Based on Zamas fhEVM, focusing on optimizing the computational cost and efficiency of FHE, and then developing a complete ecological Layer 1
-
Treat: jointly created by the Shiba team and Zama, dedicated to extending the FHE Layer 3 of the Shiba ecosystem
-
octra: FHE network with isolated execution environment based on OCaml, AST, ReasonML and C++
-
BasedAI: Distributed network supporting the introduction of FHE capabilities for LLM models
-
Encifher: Formerly BananaHQ, now renamed Rize Labs, is working on FHEML around FHE
-
Privasea: A FHE network built by the NuLink core team, using Zama鈥檚 Concrete ML framework, designed to achieve data privacy protection during ML reasoning in the AI field
For non-profit research and educational institutions, we strongly recommend FHE.org and FHE Onchain, which provide valuable resources for academic research and educational popularization of the entire ecosystem.
Due to limited space, we are unable to list all the excellent projects in the FHE ecosystem. But please believe that this ecosystem contains unlimited potential and opportunities, which is worth our continued in-depth exploration and development.
لخص
We are optimistic about the prospects of FHE technology and have high expectations for the Fhenix project. Once the Fhenix mainnet is released and officially launched, we expect that applications in different fields will be enhanced by FHE technology. We firmly believe that this innovative and vibrant future is just around the corner.
مراجع
https://zama.ai/
https://github.com/microsoft/SEAL
https://www.fhenix.io/
https://mindnetwork.xyz/
https://www.inco.org/
https://x.com/treatsforShib
https://docs.octra.org/
https://x.com/encifherio
https://www.getbased.ai/
https://www.privasea.ai/
https://x.com/fhe_org
https://x.com/FHEOnchain
https://vitalik.eth.limo/general/2020/07/20/homomorphic.html
https://x.com/MessariCrypto/status/1720134959875457352
https://foresightnews.pro/article/detail/59947
This article is sourced from the internet: ArkStream Capital: Why do we invest in the FHE track?
Original article by Nina Bambysheva, Forbes Original translation: Luffy, Foresight News During a time when much of the cryptocurrency world has collapsed, as FTX and other industry giants have failed, Tether has stood out from the crowd and thrived. Tether’s stablecoin USDT has surged to $111 billion in market value, three times that of its closest competitor, USDC, issued by Boston-based Circle. Tether’s business is enviable because its source of funding is effectively free, thanks to higher interest rates on U.S. Treasuries, which make up the bulk of the reserves backing its crypto stablecoin. Unlike traditional banks, customers who deposit hard currency with Tether in exchange for USDT do not receive any interest. In the first quarter of 2024 alone, Tether reported unaudited company “financial results” of $4.5 billion and…