📢 Exclusive on Gate Square — #PROVE Creative Contest# is Now Live!
CandyDrop × Succinct (PROVE) — Trade to share 200,000 PROVE 👉 https://www.gate.com/announcements/article/46469
Futures Lucky Draw Challenge: Guaranteed 1 PROVE Airdrop per User 👉 https://www.gate.com/announcements/article/46491
🎁 Endless creativity · Rewards keep coming — Post to share 300 PROVE!
📅 Event PeriodAugust 12, 2025, 04:00 – August 17, 2025, 16:00 UTC
📌 How to Participate
1.Publish original content on Gate Square related to PROVE or the above activities (minimum 100 words; any format: analysis, tutorial, creativ
FHE Technology Analysis: How Fully Homomorphic Encryption Brings a Privacy Computing Revolution to Web3
FHE: Put on Harry Potter's Invisibility Cloak
FHE (Fully Homomorphic Encryption) is an advanced encryption technology that allows computation to be performed directly on encrypted data. This means that data can be processed while protecting privacy. FHE has multiple potential application scenarios, especially in fields requiring privacy-preserving data processing and analysis, such as finance, healthcare, cloud computing, machine learning, voting systems, the Internet of Things, and blockchain privacy protection. However, its commercialization still requires time, with the main challenges being the significant computational and memory overhead brought by the algorithms, as well as poor scalability. Next, we will briefly introduce the basic principles of the algorithm and focus on the issues faced by this cryptographic algorithm.
Basic Principles
To perform calculations on encrypted data and obtain the same results, FHE uses polynomials to conceal the original information. Polynomials can be transformed into linear algebra problems or vector computation problems, facilitating highly optimized operations by modern computers, such as parallel computing (.
Taking the encrypted number 2 as an example, in a simplified HE system, it may:
This is done to protect the confidentiality of s)x(. As long as you know s)x( and ignore the small errors in c)x(, you can obtain the plaintext m.
When selecting a polynomial, you need to consider:
Introducing noise e)x( is to confuse attackers, preventing them from inferring the relationship between s)x( and c)x( through repeated inputs of plaintext m. The noise budget )Noise Budget( is an important parameter that determines the number of computations that can be performed.
To represent operations such as c)x( * d)x(, it needs to be transformed into a "circuit." The circuit model can accurately track and manage the noise introduced by each operation, making it easier to accelerate calculations on dedicated hardware such as ASICs and FPGAs in the future. Circuits can be divided into two types: arithmetic circuits and Boolean circuits.
Noise is the main reason that restricts the HE algorithm from expressing arbitrary computations. To address this issue, various solutions have been proposed:
Currently, mainstream FHE schemes use Bootstrap technology, including BGV, BFV, CKKS, TFHE, etc.
![Gate Ventures Research Institute: FHE, wearing Harry Potter's invisibility cloak])https://img-cdn.gateio.im/webp-social/moments-4a7670767b0963cded31da66c52ad97e.webp(
Issues Facing FHE
The main challenge of FHE lies in its enormous computational overhead. Taking AES-128 decryption as an example, the computational time of the FHE version is about 500 million times that of the ordinary version.
To address this challenge, DARPA launched the Dprive program in 2021, aiming to increase the speed of FHE computations to 1/10th of normal computing. The program focuses on several aspects:
Despite the slow progress, FHE technology still holds unique significance, especially in handling sensitive data. It is particularly applicable to critical sensitive data in sectors such as defense, healthcare, and finance, and becomes even more important in the post-quantum era.
![Gate Ventures Research Institute: FHE, Dressed in Harry Potter's Invisibility Cloak])https://img-cdn.gateio.im/webp-social/moments-186e4abe7434e22b3daf0389cf199699.webp(
The Combination of Blockchain
In blockchain, FHE is primarily used to protect data privacy, with application areas including on-chain privacy, AI training data privacy, on-chain voting privacy, and on-chain privacy transaction auditing, among others. FHE is also considered one of the potential on-chain MEV solutions.
However, fully encrypted transactions can also bring some issues, such as the disappearance of positive externalities brought by MEV bots, and validators and builders need to operate in an FHE environment, significantly increasing the operational requirements for nodes and reducing network throughput.
![Gate Ventures Research Institute: FHE, cloaked in Harry Potter's invisibility cloak])https://img-cdn.gateio.im/webp-social/moments-673ae606fcd3769523e1a330f991464d.webp(
Main Projects
Most of the current FHE projects use technology from Zama, such as Fhenix, Privasea, Inco Network, and Mind Network. The main difference among these projects lies in their business models:
![Gate Ventures Research Institute: FHE, wearing Harry Potter's invisibility cloak])https://img-cdn.gateio.im/webp-social/moments-22d66cabb8f0a526bb728b7b4ced159b.webp(
) Zama
Zama is based on the TFHE scheme and uses Bootstrap technology, suitable for handling Boolean operations and low-word-length integer calculations. Its main tasks include:
Zama, as a To B product, has built a relatively complete blockchain + AI development stack based on TFHE.
![Gate Ventures Research Institute: FHE, Dressed in Harry Potter's Invisibility Cloak]###https://img-cdn.gateio.im/webp-social/moments-d745afb65d7c110a6e6333a6d73b60b5.webp(
) Octra
Octra uses hypergraph technology to implement bootstrap, believing that it can achieve more efficient FHE. Its features include:
![Gate Ventures Research Institute: FHE, wearing Harry Potter's invisibility cloak]###https://img-cdn.gateio.im/webp-social/moments-99ea73218c9e569a2de152d8a37338f4.webp(
Looking Forward
FHE technology is still in its early stages, developing slower than ZK technology. Major challenges include high costs, engineering difficulties, and unclear commercialization prospects. As more funding and attention pour in, it is expected that more FHE projects will emerge.
The implementation of FHE chips is an important prerequisite for commercialization. Currently, several manufacturers such as Intel, Chain Reaction, and Optalysys are exploring this field.
Despite facing technical resistance, FHE, as a highly promising technology with definite demand, could bring profound changes to industries such as defense, finance, and healthcare. With the implementation of FHE chips and the potential to combine with privacy data and future quantum algorithms, FHE is expected to usher in a moment of explosion.
![Gate Ventures Research Institute: FHE, Wearing Harry Potter's Invisibility Cloak])https://img-cdn.gateio.im/webp-social/moments-74c86e1ff0ef22f5aef9b5cc441d60eb.webp(
![Gate Ventures Research Institute: FHE, wearing Harry Potter's invisibility cloak])https://img-cdn.gateio.im/webp-social/moments-93dd078bf652201018797c88a14203f9.webp(
![Gate Ventures Research Institute: FHE, cloaked in Harry Potter's invisibility cloak])https://img-cdn.gateio.im/webp-social/moments-ed3a576f24107d796df96ed44068e43f.webp(