Confidential Compute

Your Data Stays Private — Even While Being Used

Imagine a smart contract that calculates your portfolio balance, checks a compliance rule, or computes a royalty — but never sees a single number. The data stays encrypted the entire time. That's FHE: Fully Homomorphic Encryption. Smart contracts that process your data without ever revealing it.

Your Data
Encrypt
Optimized by Google HEIR
Compute on Ciphertext
Encrypted Result
You Decrypt

Why This Matters — A Real Example

An livestock farmer pushes his digitized delivery notes (BL) encrypted onto the blockchain. A dairy advisor writes a smart contract with his own formulas to calculate a performance indicator — feed efficiency, milk quality score, cost ratio.

The smart contract runs on the farmer's encrypted data. It computes the indicator and returns an encrypted result. The advisor never sees the farmer's raw numbers — prices, volumes, margins stay private. The farmer decrypts the result and gets his indicator. Two companies collaborate without exposing their data to each other.

The Pattern: Encrypt → Authorize → Compute → Decrypt

Enterprise A pushes encrypted data on-chain (traceability, invoices, sensor data). Enterprise B deploys a smart contract with its formulas. Enterprise A authorizes Enterprise B's contract to compute on its encrypted data. The contract runs — only encrypted data flows. Each party keeps its secrets. The blockchain guarantees the computation is correct.

4
FHE Schemes
BGV, BFV, CKKS, TFHE
2↔1
Scheme Switching
CKKS ↔ TFHE on-the-fly
0
Plaintext Exposure
Data never decrypted on-node
L1
Native Integration
Not a sidechain or coprocessor

FHE Infrastructure

OpenFHE

The most comprehensive FHE library — supports all 4 schemes (BGV, BFV, CKKS, TFHE). Born from DARPA research. Open-source, BSD-2-Clause license. Used by ATSHI for on-chain encrypted computation.

openfhe.org →

Google HEIR

Google's open-source FHE compiler. Automatically optimizes FHE circuits — selects the right scheme, manages noise budgets, generates WASM code. Makes FHE accessible without cryptography expertise.

github.com/google/heir →

Four Schemes, One Runtime

Each scheme optimized for a different workload — and ATSHI can switch between them on the fly.

BGV / BFV — Exact Integer

Zero rounding errors. 100 + 50 = exactly 150. For financial calculations, voting, compliance, audit trails.

Fast · Exact

CKKS — Approximate Real

SIMD batching processes thousands of encrypted values at once. Ideal for analytics, statistics, and complex formulas on encrypted data.

Fast · Analytics

TFHE — Fast Boolean

Millisecond decisions. Encrypted threshold checks, private auctions, access control. Ultra-fast boolean operations on encrypted data.

Very Fast · Logic

Scheme Switching — CKKS ↔ TFHE

Use CKKS for heavy calculations, switch to TFHE for exact comparisons — in the same transaction, no re-encryption. Unique to ATSHI.

Best of Both

Two Ways to Build FHE Smart Contracts

For developers who code — and for business users who don't.

WASM — For Developers

Write your smart contract in Rust or AssemblyScript. Call FHE operations via native host functions — encrypt, compute, decrypt — like any API call. FHE is a first-class function inside the WASM runtime, not an external service.

  • FHE host functions available directly in smart contract code
  • Threshold decryption via ARCH consensus — no single node can decrypt
  • Circuits optimized automatically by Google HEIR compiler
WASM Runtime →
WASM code example

No-Code — For Business Users

Drag & drop your business logic in a visual interface. The platform generates the FHE smart contract automatically — no cryptography expertise, no coding required.

  • Visual builder → JSON schema → Python → HEIR optimization → WASM on-chain
  • Pre-built templates for common use cases (compliance, scoring, indicators)
  • Deploy confidential contracts in minutes, not months
Playground →
No-Code visual builder

What FHE Enables

Confidential DeFi

Encrypted positions, no front-running, no MEV. Institutional-grade privacy for on-chain trading.

Learn More →

ML Marketplace

Encrypted AI inference with per-call royalties. Data never exposed, model IP protected.

Learn More →

Hidden Price NFTs

Royalties computed on encrypted values — sale price never visible on-chain.

Learn More →

Healthcare

Compute on encrypted patient data — diagnostics without exposure. HDS compliant.

Financial Services

Encrypted portfolio analysis, credit scoring, AML checks — regulators audit without seeing client data.

Supply Chain

Encrypted supplier data, auditable compliance. Share proof without exposing business secrets.

The Confidential Network Is Here

Compute on encrypted data. Protect privacy by math, not by trust. Build on the first L1 with native FHE.