A 6-minute
introduction to

Fully Homomorphic
Encryption (FHE)

Introduction

Encryption has been used for thousands of years to send secret messages. One early method is the Caesar cipher from 60 BC, which swaps letters in the alphabet. With the internet, we generate a lot of private data, leading to more data breaches and surveillance. To protect our data, we now use advanced encryption, like end-to-end encryption in everyday apps. But how does end-to-end encryption work? And how will it change the internet?

How Your Data Is Protected Today

Data Is Still Being Stolen Because It Isn't Encrypted During Processing.

By The Numbers

85
%

The percentage of breaches that involved data stored in the cloud.

4.45
million USD

The global average total cost of a data breach in the year 2024.

277
days

The average time it takes a company to identify a data breach.

Source: IBM Security - 2024 report

We Need End-To-End Encryption Now More Than Ever.

Healthcare data breaches of 500+ records

Introduction to Fully Homomorphic Encryption

Fully Homomorphic Encryption or FHE for short is a technology that enables processing data without decrypting it. This means companies can offer their services without ever seeing their users’ data, and users will never notice a difference in functionality. With data encrypted both in transit and during processing, everything we do online could now be encrypted end-to-end, not just sending messages!

It's Not Dark Magic.

Thanks to Homomorphic Encryption, you can now use your favorite online services without revealing any of your personal data. From your point of view, the services don’t change: You can use it as you always have. But from the server point of view, everything is encrypted, no company, government or hacker can ever see your data.

How FHE Will Change The Future

Preventive Medicine

Imagine knowing in advance what you need to do to stay healthy throughout your life. This is increasingly possible with AI, but requires sharing all your health data, everything from your DNA to your medical history to your lifestyle habits. With FHE, you could send all this data while keeping it encrypted, and the AI would respond with encrypted health recommendations that you alone have the ability to see.

Facial Recognition

From science fiction to the palm of your hand, facial recognition is now a part of our everyday experience. We use facial recognition to enter buildings, unlock our phones, tag people in pictures and soon to login to websites everywhere. This however requires someone to have your biometric fingerprint, which in the wrong hands can be used to impersonate you. With FHE, you could authenticate yourself securely, without anybody being able to steal your biometric data.

Confidential Smart Contracts

By design, blockchains are public, meaning all the user data flowing into web3 applications are visible to the entire world. With FHE, we can enable private smart contracts, where the inputs and outputs are encrypted end to end, meaning you can safely build decentralized applications that use sensitive personal data - think on-chain identity, private NFT metadata or geolocated Dapps.

How FHE Will Change The Internet

When the internet first appeared, we accessed websites via an HTTP address. Nothing was encrypted, and anybody could listen to what you sent online. Then came HTTPS, which encrypts data in transit. We believe FHE will enable a new internet protocol, HTTPZ, where everything is encrypted end to end. Privacy wouldn't matter anymore, not because it isn't important, but because it would be guaranteed by design in the internet itself.

1. HTTP:

No encryption at all, everyone can see everything.

2. HTTPS:

Data is encrypted when sent, but not while processing.

3. HTTPS

Data is encrypted from end to end, all the time.

Ready to implement FHE?

Get in touch to discuss your project with the team.

Are you a developer?

Discover our open-source libraries on Github and explore our developer resources to implement FHE with Zama.

See on Github

Talk to the Zama team

Leverage FHE using Zama’s libraries, products, and solutions to unlock new privacy-enhancing capabilities.

Start a conversation