Concepts

This document provides a technical overview of Fully Homomorphic Encryption (FHE) capabilities implemented on the Fully Homomorphic Encrypted Virtual Machine (fhEVM) using the TFHE library. It showcases how encrypted computations can be securely performed on the blockchain without decrypting sensitive data, ensuring data privacy and security.

Key Concepts

  1. Shift Operations in TFHE Describes bitwise shift operations (TFHE.shr and TFHE.shl) on encrypted integers, with modulo behavior for the second operand.

  2. Supported Operators for Encrypted Integers Highlights support for arithmetic and bitwise operations on encrypted integers, ensuring seamless mathematical computations.

  3. Comparison Operations Explains how comparisons on encrypted values yield ebool (encrypted boolean), with a select function to handle conditional logic securely.

  4. Error Handling in Encrypted Smart Contracts Introduces a strategy for recording and managing errors in encrypted smart contracts, as automatic transaction reverts are not applicable.

  5. Random Number Generation Shows how TFHE enables fully on-chain generation of encrypted random numbers.

  6. Encrypted Inputs Details how encrypted inputs are securely passed to smart contracts, with mechanisms to prevent reuse or malicious manipulation.

  7. Access Control List (ACL) System Describes the system for granting and managing permissions to manipulate ciphertexts, including permanent and temporary allowances.

  8. Re-encryption Explains how ciphertexts encrypted with blockchain keys can be re-encrypted for secure off-chain use with client-side public keys.

Use Case Summary

These tools enable developers to create privacy-preserving blockchain applications where:

  • Data confidentiality is maintained even during computations.

  • Secure interactions occur without exposing plaintext values.

  • Enhanced trust is built into decentralized systems through FHE principles.

This technology is especially relevant for financial transactions, private bidding, and sensitive data applications in Web3 ecosystems.

Last updated