Introduction
Encryption has been used for thousands of years to send secret messages. One early method is the Caesar cipher from 60 BC, which swaps letters in the alphabet.With the internet, we generate a lot of private data, leading to more data breaches and surveillance. To protect our data, we now use advanced encryption, like end-to-end encryption in everyday apps.But how does end-to-end encryption work? And how will it change the internet?
How your data is protected today
Data is still being stolen because it isn't encrypted during processing.
By the numbers
The percentage of breaches that involved data stored in the cloud.
The global average total cost of a data breach in the year 2023.
The average time it takes a company to identify a data breach.
Source: IBM Security - 2023 report
We need end-to-end encryption now more than ever.
Introduction to Homomorphic Encryption
Fully Homomorphic Encryption — or FHE for short — is a technology that enables processing data without decrypting it. This means companies can offer their services without ever seeing their users’ data — and users will never notice a difference in functionality. With data encrypted both in transit and during processing, everything we do online could now be encrypted end-to-end, not just sending messages!
It's not dark magic.
Thanks to Homomorphic Encryption, you can now use your favorite online services without revealing any of your personal data. From your point of view, the services don’t change: You can use it as you always have. But from the server point of view, everything is encrypted — no company, government or hacker can ever see your data.
How FHE will change the future
Preventive Medicine
Imagine knowing in advance what you need to do to stay healthy throughout your life. This is increasingly possible with AI, but requires sharing all your health data — everything from your DNA to your medical history to your lifestyle habits. With FHE, you could send all this data while keeping it encrypted, and the AI would respond with encrypted health recommendations that you alone have the ability to see.
Facial Recognition
From science fiction to the palm of your hand, facial recognition is now a part of our everyday experience. We use facial recognition to enter buildings, unlock our phones, tag people in pictures and soon to login to websites everywhere. This however requires someone to have your biometric fingerprint, which in the wrong hands can be used to impersonate you. With FHE, you could authenticate yourself securely, without anybody being able to steal your biometric data.
Confidential Smart Contracts
By design, blockchains are public, meaning all the user data flowing into web3 applications are visible to the entire world. With FHE, we can enable private smart contracts, where the inputs and outputs are encrypted end to end, meaning you can safely build decentralized applications that use sensitive personal data - think on-chain identity, private NFT metadata or geolocated Dapps.
How FHE will change the internet
When the internet first appeared, we accessed websites via an HTTP address. Nothing was encrypted, and anybody could listen to what you sent online. Then came HTTPS, which encrypts data in transit. We believe FHE will enable a new internet protocol, HTTPZ, where everything is encrypted end to end. Privacy wouldn't matter anymore, not because it isn't important, but because it would be guaranteed by design in the internet itself.
Want to see FHE in action?
Check out our demo applications based on real-life use cases.
Want to go further?
Deep dive into more complex articles about FHE.
Fully Homomorphic Encryption (FHE) has long been viewed as a cryptographic breakthrough. Conceived in the late seventies but only realized decades later, it’s now gaining traction across both public and private sectors as organizations work to make FHE more practical and accessible.
This post is part of a series on TFHE, a Fully Homomorphic Encryption scheme also known as CGGI (named after Chillotti, Gama, Georgieva, and Izabachène). Each post will take you deeper into TFHE’s concepts. It’s a challenging topic, but don’t worry—we’ll approach it step by step.
Lately, there’s been a surge of interest in Post-Quantum Cryptography (PQC). This is because security experts are concerned about the potential risks if a functional quantum computer were developed.
Ready to implement FHE?
Get in touch to discuss your project with the team
Are you a developer?
Discover our open-source libraries on Github and explore our developer resources to implement FHE with Zama.
Talk to the Zama team
Leverage FHE using Zama’s libraries, products, and solutions to unlock new privacy-enhancing capabilities.