Fhenix Profile picture
Jun 4 12 tweets 3 min read Read on X
1/ Today marks an important milestone in our mission to bring confidentiality to Ethereum through the first L2 powered by fully homomorphic encryption (#FHE).

We're excited to announce we've raised $15M in Series A funding and released our initial testnet: Helium. Image
2/ Ethereum has made huge strides over the last decade, notably the move to proof of stake and the maturation of Layer 2s as an effective scaling solution.

But a glaring obstacle still remains for the world's largest smart contract platform: it has no confidentiality.
3/ Ethereum's promise as a permissionless network which returns sovereignty to the people who use & maintain it is closer than ever to being realized, but its current lack of data encryption presents a major impediment to its growth trajectory.
4/ Ethereum must possess a robust and flexible answer to the question of confidentiality, a fundamental building block of human orchestration.

It cannot reach its next stage of maturity without the ability to securely safeguard confidential data.
5/ We've spent years in the cryptographic and blockchain space researching the ideal solution to this problem and we came out the other end with a strong conviction that fully homomorphic encryption (FHE) is the answer.
6/ FHE is distinguished from other privacy enhancing technologies by its ability to perform computation on encrypted data. This means data need not be decrypted for processing, a subtle yet powerful distinction with far-reaching implications.
7/ For a long time use of FHE wasn't feasible due to its high computational expense, but advancements in FHE & computer hardware have changed this reality.

Fhenix lowers the barrier to entry for Solidity developers to use FHE with the first FHE EVM-compatible Layer 2 rollup.
8/ If crypto is the vanguard of cutting-edge software development, FHE is at the forefront of this technological revolution. This presents an unprecedented opportunity to build an entirely novel set of applications by virtue of the confidentiality that FHE enables.
9/ Being at the forefront is not for everyone. We are in the early stages of confidential smart contracts. Many dismissed the internet, mobile computing, and Bitcoin until their network effects were already too large to ignore.

If it were easy, everyone would do it.
10/ A blue ocean of application development awaits the courageous and optimistic hackers out there capable of seeing the bigger picture.

We'll support you with the requisite infrastructure, documentation, and dev tooling to help you turn your dreams into reality.
11/ We'll soon be announcing grant & bounty programs to incentivize this new school of builders.

In the meantime, everything you need to begin building can be found in the Fhenix docs: docs.fhenix.zone
12/ We are thrilled to be taking these first steps towards a confidential future for Ethereum with you, and we can’t wait to build this exciting future together.

You can read the full version of this announcement on the Fhenix blog: fhenix.io/building-a-con…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Fhenix

Fhenix Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @FhenixIO

May 16
1/ Did you know there are three different types of Homomorphic Encryption?

- Partially Homomorphic Encryption
- Somewhat Homomorphic Encryption
- Fully Homomorphic Encryption

The primary difference between them is the type and number of mathematical operations they allow. Image
2/ Partially Homomorphic Encryption (PHE) schemes support either addition OR multiplication operations on encrypted data, but not both simultaneously.

With PHE these operations can be performed an unlimited number of times.
3/ Somewhat Homomorphic Encryption (SHE) schemes are more flexible in that they support both addition AND multiplication operations on encrypted data, but are limited by the number of operations that can be performed on the encrypted data.
Read 6 tweets
Mar 5
1/ DeFi needs Fully Homomorphic Encryption (FHE)

In this thread we'll cover:
- Challenges with a transparent DeFi ecosystem
- FHE as a solution
- Recent cryptographic developments

This is an emerging area worth watching. Image
2/ DeFi has enormous potential, including asset tokenization, derivatives, payments, and much more.

Yet, there are 3 primary challenges:
1) Privacy
2) MEV Extraction
3) Regulatory Challenges

These limit use cases & adoption.
3/ Privacy

Many transactions are private in nature or include sensitive data, e.g. institutional payments, or anything relating to personal data.

Correlating on-chain actions to one's identity is also a common phishing attack tactic.

FHE keeps data confidential, yet auditable.
Read 9 tweets
Feb 19
1/11 On-chain FHE Made Practical - Exploring Fhenix's Threshold Service Network (TSN)

In this thread we will discuss:
- why FHE is ideal for confidential computing
- what is threshold FHE
- how TSN makes FHE practical in a distributed environment

Let's find out 👇 Image
2/11 Background

Blockchain, by design, requires network participants to reach a consensus on the evolving state (e.g. your token balance) of the system.

This intrinsic trait significantly complicates the quest for on-chain data confidentiality.
3/11 Limitations of ZKP

ZKP achieves on-chain confidentiality by having users generate proofs of correct state transition off-chain.

However, this method often necessitates intermediaries for shared state management, which compromises user data confidentiality.
Read 11 tweets
Jan 15
1/ #FHE’s ability to compute encrypted data will revolutionize #Web3, but faces considerable challenges.

Our latest blog piece covers 2 of these:
-Nascent FHE schemes, libraries & compilers
-Suboptimal FHE threshold decryption techniques

Below we’ll cover both in-depth
#ETH Image
2/ These challenges are being mitigated through new #FHE compilers and libraries, and rapid advancements in both threshold decryption and #MPC decryption.

These will help scale on-chain #privacy and #security across the board.
3/ Challenge 1: FHE Schemes, Libraries & Compilers

-Schemes help devs manage data but #FHE ones are ~1000x slower
-Libraries are pre-written code yet FHE libraries are lacking
-Compilers translate high-level code to low-level machine code, but FHE ones must handle complexities Image
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(