Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper
Read Zama fhEVM white paper

Onchain Data is Public by Design, Making it Hard to Build Dapps that Require Confidentiality

Write Confidential Smart Contracts Easily on Ethereum*, Using Zama fhEVM Coprocessor

E2E encryption for inputs
and state

Full composability on
private state

Work with existing
chains


*Coming soon

It Unlocks a Myriad of New Use Cases for Consumers, Businesses, and Regulated Industries

Tokenization

Swap tokens and RWAs onchain without others seeing the amounts.

Stablecoins

Add compliant confidentiality to stablecoin and bridge it to different blockchain networks.

Confidential Networks

Build confidential DApps on Ethereum or build your own FHE-enabled chain.

Onchain Games

Keep moves, selections, cards, or items hidden until ready to reveal.

Confidential Voting

Prevent bribery and blackmailing by keeping votes private.

Blind Auctions

Bid on items without revealing the amount or the winner.

Encrypted DIDs

Store identities onchain and generate attestations without ZK.

Private Transfers

Keep balances and amounts private, without using mixers.

Confidential Supply Chain

Ensure privacy and security in the supply chain and protect businesses.

Develop Your Confidential Applications Faster With Powerful Features Available Out of the Box

High Precision Encrypted Integers

Up to 256 bits of precision for integers.

Full Range of Encrypted Operators

All operators available:
+, -, *, /, <, >, ==, ...

Onchain Secure Randomness

Generate randomness without using oracles.

Threshold Decryption

Decryption key is split amongst multiple parties.

Native Support for Tendermint & Avalanche Subnets

Deploy a Tendermint or Subnet fhEVM in a few steps.

Build FHE Dapps on Ethereum

Deploy FHE dapps on ETH using fhEVM coprocessors.

Build Confidential Dapps Just as You Would Build Regular Ones

Solidity Integration
FhEVM contracts are simple solidity contracts that are built using traditional solidity toolchains.

Simple DevX
Developers can use the euint data types to mark which part of their contracts should be private.

Programmable Privacy
‍All the logic for access control of encrypted states is defined by developers in their smart contracts.

Read documentation
function transfer(address to, einput encryptedAmount, bytes calldata inputProof) public {
        euint64 amount = TFHE.asEuint64(encryptedAmount, inputProof);
        // makes sure the owner has enough tokens
        ebool canTransfer = TFHE.le(amount, balances[msg.sender]);
        euint64 transferValue = TFHE.select(canTransfer, amount, TFHE.asEuint64(0));
        // add to the balance of `to`...
        euint64 newBalanceTo = TFHE.add(balances[to], transferValue);
        balances[to] = newBalanceTo;
        TFHE.allow(newBalanceTo, address(this));
        TFHE.allow(newBalanceTo, to);
        //  and substract from the balance of `from`.
        euint64 newBalanceFrom = TFHE.sub(balances[from], transferValue);
        balances[from] = newBalanceFrom;
        TFHE.allow(newBalanceFrom, address(this));
        TFHE.allow(newBalanceFrom, from);
    }

Operational Versatility by Design

Consensus:
Proof of Stake (permissionless)
Proof of Authority (permissioned)

Deployment:
L1, L2 or L3 public or enterprise chain
App chain
ZK-fraud-proof rollup (coming 2024)

Decryption:
PoS or PoA threshold decryption
KMS or HSM based centralized decryption

Build and Scale With Cutting-edge Technologies

FHE

Fully homomorphic encryption is used to compute on private state, directly onchain.

+

MPC

Multi-party computation is used for threshold decryption of FHE ciphertexts.

+

ZK

Zero-knowledge proofs are used to ensure encryption and decryption integrity.


Read more in our paper: Practical and Efficient FHE-based MPCPractical and Efficient FHE-based MPC

The Most Comprehensive Confidential Smart Contract Solution

Zama's fhEVM

Other FHE

ZK

Mixers

Operations
supported

Everything
Only additions & multiplications
Everything
None

Privacy model

Hides the data
Hides the data
Hides the data
Hides the identity

Encrypted state composability

Yes
Limited
No
No

Developer experience

Easy
Medium
Hard
Hard

Compliance

At the application
level
At the application
level
At the user
level
At the user
level

Security

Highest
High
High
Medium

Choose Between Hosted or Self-Managed Solutions

We make sure to build solutions that fit your needs.

Open source

Features

Complete fhEVM stack, including consensus, fhEVM libraries, client, and web sdk.


Support

Community support via a dedicated Discord channel.


License

Free for personal use, prototyping, evaluation & research.
See on Github

Hosted

Features

Key generation, decryption and reencryption as a service.

High level APIs and developer console.

Fully transparent and auditable.


Support

24/7 Premium support

99% uptime guarantee


License

Transaction fees + Support.

Coming soon

Self-managed

Features

Deploy a KMS onto your own infrastructure

Integrate with your own developer console and APIs

Customize the number of PoA and MPC nodes

Choose between multiple TEEs

Support

24/7 Premium support

99% uptime guarantee


License

Volume based license + support.

Contact us

POWERED BY ZAMA

Get notified at launch

Zama’s fhEVM Coprocessor is coming soon. Register below to receive early access.
Thank you! You'll be notified at launch, follow our latest news on Twitter: @zama_fhe
Oops! Something went wrong while submitting the form.