Confidential Compute

Your Data Stays Private — Even While Being Used

Imagine a smart contract that calculates your portfolio balance, checks a compliance rule, or computes a royalty — but never sees a single number. The data stays encrypted the entire time. That's FHE: Fully Homomorphic Encryption. Smart contracts that process your data without ever revealing it.

Your Data
Encrypt
Optimized by Google HEIR
Compute on Ciphertext
Encrypted Result
You Decrypt

Why This Matters — A Real Example

An livestock farmer pushes his digitized delivery notes (BL) encrypted onto the blockchain. A dairy advisor writes a smart contract with his own formulas to calculate a performance indicator — feed efficiency, milk quality score, cost ratio.

The smart contract runs on the farmer's encrypted data. It computes the indicator and returns an encrypted result. The advisor never sees the farmer's raw numbers — prices, volumes, margins stay private. The farmer decrypts the result and gets his indicator. Two companies collaborate without exposing their data to each other.

The Pattern: Encrypt → Authorize → Compute → Decrypt

Enterprise A pushes encrypted data on-chain (traceability, invoices, sensor data). Enterprise B deploys a smart contract with its formulas. Enterprise A authorizes Enterprise B's contract to compute on its encrypted data. The contract runs — only encrypted data flows. Each party keeps its secrets. The blockchain guarantees the computation is correct.

4
FHE Schemes
BGV, BFV, CKKS, TFHE
2
Libraries
OpenFHE + Zama
0
Plaintext Exposure
Data never decrypted on-node
L1
Native Integration
Not a sidechain or coprocessor

Two World-Class Libraries

🧠

Zama

European leader in developer-friendly FHE. concrete-ml compiles standard Python models into FHE circuits automatically. TFHE-rs delivers ultra-fast boolean operations in Rust.

zama.ai →
🔐

OpenFHE

The most comprehensive FHE library — supports all 4 schemes (BGV, BFV, CKKS, TFHE). Born from DARPA research. Open-source, BSD-2-Clause license. Used by ATSHI for on-chain encrypted computation.

openfhe.org →

Google HEIR

Google's open-source FHE compiler. Automatically optimizes FHE circuits — selects the right scheme, manages noise budgets, generates WASM code. Makes FHE accessible without cryptography expertise.

github.com/google/heir →

Four Schemes, One Runtime

Each scheme optimized for a different workload — and ATSHI can switch between them on the fly.

BGV / BFV — Exact Integer

Zero rounding errors. 100 + 50 = exactly 150. For financial calculations, voting, compliance, audit trails.

Fast · Exact

CKKS — Approximate Real

SIMD batching processes thousands of encrypted values at once. Ideal for analytics, statistics, and complex formulas on encrypted data.

Fast · Analytics

TFHE — Fast Boolean

Millisecond decisions. Encrypted threshold checks, private auctions, access control. Powered by Zama's TFHE-rs.

Very Fast · Logic

Scheme Switching — CKKS ↔ TFHE

Use CKKS for heavy calculations, switch to TFHE for exact comparisons — in the same transaction, no re-encryption. Unique to ATSHI.

Best of Both

Two Ways to Build FHE Smart Contracts

For developers who code — and for business users who don't.

💻

WASM — For Developers

Write your smart contract in Rust or AssemblyScript. Call FHE operations via native host functions — encrypt, compute, decrypt — like any API call. FHE is a first-class function inside the WASM runtime, not an external service.

  • FHE host functions available directly in smart contract code
  • Threshold decryption via ARCH consensus — no single node can decrypt
  • Circuits optimized automatically by Google HEIR compiler
WASM Runtime →
🖱️

No-Code — For Business Users

Drag & drop your business logic in a visual interface. The platform generates the FHE smart contract automatically — no cryptography expertise, no coding required.

  • Visual builder → JSON schema → Python → HEIR optimization → WASM on-chain
  • Pre-built templates for common use cases (compliance, scoring, indicators)
  • Deploy confidential contracts in minutes, not months
Playground →

No-Code FHE Builder — Screenshot Coming Soon

Visual drag & drop interface for building confidential smart contracts

What FHE Enables

📊

Confidential DeFi

Encrypted positions, no front-running, no MEV. Institutional-grade privacy for on-chain trading.

Learn More →
🧠

ML Marketplace

Encrypted AI inference with per-call royalties. Data never exposed, model IP protected.

Learn More →
🪙

Hidden Price NFTs

Royalties computed on encrypted values — sale price never visible on-chain.

Learn More →
🏥

Healthcare

Compute on encrypted patient data — diagnostics without exposure. HDS compliant.

💰

Financial Services

Encrypted portfolio analysis, credit scoring, AML checks — regulators audit without seeing client data.

📦

Supply Chain

Encrypted supplier data, auditable compliance. Share proof without exposing business secrets.

ATSHI FHE vs. Competitors

Feature Secret Network Fhenix Zama fhEVM ATSHI Network
Privacy modelTEE (hardware)FHE (L2)FHE (EVM)FHE — full on-chain
Trust assumptionIntel SGX hardwareEthereum L1EVM chainPure math — zero hardware trust
ExecutionOff-chain TEE enclaveL2 rollupEVM smart contractOn-chain — inside WASM runtime
Data & computeData leaves chainData on L2Data on EVM100% on-chain — data + compute + result
FHE schemesN/A (TEE)TFHE onlyTFHE onlyBGV + BFV + CKKS + TFHE
Scheme switchingN/ANoNoCKKS ↔ TFHE on-the-fly

The Confidential Network Is Here

Compute on encrypted data. Protect privacy by math, not by trust. Build on the first L1 with native FHE.