<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Polymorphic Capital</title>
        <link>https://paragraph.com/@pmc</link>
        <description>Polymorphic Capital is an application-centric Web3 venture capital firm focused on fostering practical use cases built on Web3 infrastructure.</description>
        <lastBuildDate>Sat, 18 Apr 2026 15:06:23 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Polymorphic Capital</title>
            <url>https://storage.googleapis.com/papyrus_images/ea5d30e12e5a46328a83e294506824176cde79ebddecb6e76fb0a010813f9457.png</url>
            <link>https://paragraph.com/@pmc</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[The Hidden Holes in Standard SAFEs: Three Real Cases and How to Fix Them]]></title>
            <link>https://paragraph.com/@pmc/the-hidden-holes-in-standard-safes-three-real-cases-and-how-to-fix-them</link>
            <guid>RyHn2kFkXN8nTlhxmXDD</guid>
            <pubDate>Mon, 04 Aug 2025 13:58:30 GMT</pubDate>
            <description><![CDATA[IntroductionThe SAFE (Simple Agreement for Future Equity) was introduced by Y Combinator in 2013 to simplify early-stage funding. Its premise is straightforward: an investor provides capital today in exchange for the right to receive shares in the future when the company raises its next equity round. SAFEs became the default instrument for pre-seed and seed rounds due to their simplicity and low legal overhead. In Web3, the situation is unique: SAFEs are often used not just at the earliest st...]]></description>
            <content:encoded><![CDATA[<h2 id="h-introduction" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Introduction</h2><p>The SAFE (Simple Agreement for Future Equity) was introduced by Y Combinator in 2013 to simplify early-stage funding. Its premise is straightforward: an investor provides capital today in exchange for the right to receive shares in the future when the company raises its next equity round. SAFEs became the default instrument for pre-seed and seed rounds due to their simplicity and low legal overhead.</p><p>In Web3, the situation is unique: SAFEs are often used not just at the earliest stages but also for <strong>large, multi-million-dollar rounds</strong>, sometimes even in later stages where complexity and risks are much higher. But behind this simplicity lie significant gaps that can cost investors dearly. Below, we share <strong>three real cases</strong> that demonstrate why a standard SAFE alone is not enough, and what you can do to close these gaps.</p><h2 id="h-case-1-forced-conversion-via-fake-equity-financing" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Case 1: Forced Conversion via “Fake” Equity Financing</h2><p>A company raises $3M in a seed round through standard SAFEs with a valuation cap. Later, the market cools, and the startup struggles to raise the next round at a desirable valuation. Normally, this isn’t catastrophic: SAFEs protect investors by converting at the lower price.</p><p>But here’s the loophole: the founder runs a <strong>$100K crowdfunding campaign</strong> on an equity platform, selling shares at a valuation <strong>above the SAFE cap</strong>. Technically, this qualifies as an “Equity Financing Event” under the SAFE, so the company converts all SAFEs <strong>at the highest allowed valuation</strong>, not the actual market price. Investors expecting downside protection suddenly find themselves vulnerable.</p><p>✅ Solution:</p><p>Define <strong>Qualified Equity Financing</strong> in the SAFE or side letter. For example:</p><p><em>“Qualified Equity Financing” means an equity financing in which the Company raises at least [$X million] of new money at least in part from new investors on an arm’s length basis in a single transaction or series of related transactions. No other equity issuance shall trigger automatic conversion.”</em></p><p>This prevents small or strategic rounds from being used to manipulate conversion terms.</p><h2 id="h-case-2-radical-pivot-after-raising-capital" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Case 2: Radical Pivot After Raising Capital</h2><p>A startup raises Seed round through SAFEs. Two months later, the founders realize the product is failing and decide to <strong>pivot to an entirely different industry</strong> — one completely outside the mandate of the original investors.</p><p>95% of the money is still in the bank, but investors can’t stop the pivot or recover their capital. A standard SAFE gives no governance rights, no consent rights, and no covenants restricting strategic direction. Investors end up funding a project they would never have backed.</p><p>✅ Solution:</p><p>Include a <strong>Company Purpose Definition</strong> and <strong>change-of-business restriction</strong> in a side letter:</p><p><em>“The Company shall conduct its business in accordance with the business plan and field of activity as set forth in [Annex X]. Any material change to the Company’s purpose or principal line of business shall require the prior written consent of holders of SAFEs representing at least [X%] of the Purchase Amount.”</em></p><p>This ensures investors have a say in major strategic shifts.</p><h2 id="h-case-3-ip-transfer-to-a-new-company" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Case 3: IP Transfer to a New Company</h2><p>The founder is heavily diluted after the SAFE round and cannot attract new investors on reasonable terms. A new investor offers to fund a <strong>new entity</strong>, on the condition that the IP is transferred there.</p><p>What stops the founder from moving the core IP out of the existing company?</p><p><strong>Nothing</strong>.</p><p>Standard SAFEs have no IP protection provisions. There’s no restriction on asset transfers, and SAFE holders lack veto rights. The IP moves, the original entity becomes an empty shell, and SAFE investors are left with worthless paper.</p><p>✅ Solution:</p><p>Add an <strong>IP &amp; Materials Assets Transfer Restriction</strong> in the SAFE or side letter:</p><p>“<em>The Company shall not sell, assign, license (other than in the ordinary course of business), pledge, or otherwise transfer all or substantially all of its intellectual property without the prior written consent of holders of SAFEs representing at least [X%] of the aggregate Purchase Amount of all outstanding SAFEs.</em>”</p><p>This creates a binding covenant preventing asset stripping.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Conclusion</h2><p>The SAFE is a brilliant tool for one thing: <strong>giving founders fast access to capital with minimal friction</strong>. But the standard SAFE agreement does not protect investors from strategic risk, governance issues, or bad-faith actions.</p><p>If you are investing significant amounts or backing Web3 projects at later stages, <strong>a standard SAFE is not enough</strong>.</p><p>Use side letters to add:</p><ul><li><p>Qualified financing definitions</p></li><li><p>Business purpose restrictions</p></li><li><p>IP &amp; Material Assets transfer covenants</p></li></ul><p>Alternatively, for larger checks, consider transitioning to a full <strong>investment agreement</strong> with protective provisions.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/bd2e026bad52940ac8ef6fae0053797084ddc184b4378c80210191519460a9a4.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/bd2e026bad52940ac8ef6fae0053797084ddc184b4378c80210191519460a9a4.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure>]]></content:encoded>
            <author>pmc@newsletter.paragraph.com (Polymorphic Capital)</author>
        </item>
        <item>
            <title><![CDATA[Fully Homomorphic Encryption: Looking Forward]]></title>
            <link>https://paragraph.com/@pmc/fully-homomorphic-encryption-looking-forward</link>
            <guid>eOUPDxK97DNsaywa1Lra</guid>
            <pubDate>Wed, 06 Dec 2023 17:14:46 GMT</pubDate>
            <description><![CDATA[Fully Homomorphic Encryption (FHE) is a form of encryption that enables computations to be run directly on encrypted data, meaning third parties can leverage private data without any trust assumptions. Please find a general motivation and introduction of the topic here. Today, FHE is rarely discussed without an accompanying lament of its downsides: painfully slow and unwieldy. That being said, we wish to share some interesting developments we’ve come across to mitigate these pains and broaden...]]></description>
            <content:encoded><![CDATA[<p>Fully Homomorphic Encryption (FHE) is a form of encryption that enables computations to be run directly on encrypted data, meaning third parties can leverage private data without any trust assumptions. Please find a general motivation and introduction of the topic <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://mirror.xyz/pmc.eth/2Axx5tLUP8c0BVhtMRJKzThTEdViWN2LIFVpX_MV6ds">here</a>.</p><p>Today, FHE is rarely discussed without an accompanying lament of its downsides: painfully slow and unwieldy. That being said, we wish to share some interesting developments we’ve come across to mitigate these pains and broaden adoption, all the while introducing some other cool facets of this family of encryption schemes.</p><p>We broadly categorize the problem space into four major areas of development: developer experience, compilers, hardware, cryptography. We’ll describe the four areas but spend most time looking at developer experience and compilers as they’re of more interest to us. Before we start, we’ll loosely introduce the cryptography that underpins FHE as a basis for a few of the upcoming points.</p><h3 id="h-learning-with-errors-lwe" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Learning-With-Errors (LWE)</strong></h3><p>Encryption schemes rely on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Computational_hardness_assumption">computationally hard problems</a>, problems that computers can’t easily solve at a big enough scale. For a familiar example, RSA security (the asymmetric encryption scheme we use to protect ourselves online) relies on the assumption that we don’t have efficient ways to factor big numbers. The bigger these numbers get, the more secure the messages encoded through them.</p><p>There are multiple FHE schemes but most of the modern ones are based on LWE. LWE is a problem that banks on the complexity of solving systems of linear equations that are perturbed by small errors (often called noise). Unless you already know the solution, it’s hard to isolate the noise and recover the content. Under the hood, it’s a rephrasing of <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.youtube.com/watch?v=QDdOoYdb748">Lattice problems</a> which— in case you were wondering— are secure even with quantum computers. We recommend this <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.youtube.com/watch?v=K026C5YaB3A">video</a> for a short intro.</p><p>So, for the RSA scheme we owe our security to the size of the number we have to factor. What are the parameters for LWE? Here, we not only have to worry about the dimension of our system of equations but we also need to define how precise we want to be with these small errors and how many possible values we want to be able to encrypt per equation in our system. Put together, these parameters generally present a security, efficiency, and correctness tradeoff.</p><p>Now, let’s dive back into the areas of R&amp;D:</p><h3 id="h-developer-experience-devx" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Developer Experience (DevX):</strong></h3><p>FHE has some adoption barriers with the DevX as they introduce a new set of development limitations. For example, developers have to be considerate using branching structures with encrypted information: to avoid any information leakage, both branches of if-else statements have to be evaluated on different copies of the state and then reconciled homomorphically at the end. There are similar concerns with loops: when does the program stop iterating the loop in order to avoid leaking information on the encrypted condition? Existing approaches include running the loop for a fixed and sufficient number of iterations, storing all the different states, and merging them homomorphically at the end. This can lead to massive increases in computation requirements.</p><p>Naive solutions crafted without a deep understanding of these constraints are generally orders of magnitude less efficient than those crafted by experts. On this front, we see DevX improvements coming from the development of libraries with high-level, optimized functions for most algorithms and computations. This is analogous to Python libraries like numpy: this library provides out-of-the-box, optimized, high-level mathematical functions and no one needs to care about their compilation in C and the tricks for efficiency like contiguous memory allocation or homogeneous data types; they work and they make code go zoom.</p><p>Most FHE libraries have bounty programs or partnerships with universities to crowdsource the development of their offerings but these are small and fragmented communities.</p><h3 id="h-compiler-improvements" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Compiler Improvements:</strong></h3><p>Exciting developments to look forward to! One notable area of discussion is the potential of hybrid compilations. In this approach, a single program could be compiled into different cryptographic schemes, depending on which scheme offers optimal performance for a given operation. For example, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://eprint.iacr.org/2018/421.pdf">TFHE</a> is well suited to work on exact computations and lots of logic but <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://eprint.iacr.org/2016/421.pdf">CKKS</a> is a better choice to handle large dataset and approximate arithmetic (ie. data science tasks).</p><p>This type of compilation hinges on the development of two things: efficient transciphering and appropriate Intermediate Representations (IR).</p><p>Transciphering is translating from one scheme to another without decrypting the data in the process. Because these schemes each have their set of parameters, and noise structures, it’s complicated to map each characteristic over correctly, and every mapping has to be done individually. Transciphering also introduces a lot of complexity and overhead, particularly with big datasets. Finally, the keys used in the process have to be managed securely. It’s early days on this topic but you can start on existing research with <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://eprint.iacr.org/2023/1244.pdf">Hermes</a>, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://eprint.iacr.org/2020/1606.pdf">Pegasus</a>, and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.researchgate.net/publication/343692691_CHIMERA_Combining_ring-LWE-based_fully_homomorphic_encryption_schemes">Chimera</a>.</p><p>Secondly, IRs are a stack of lower-level languages that can progressively specialize or generalize to optimize the different parts of the codebase into the optimal schemes. Coupled with transciphering, this gives compilers the potential to orchestrate the transitions, optimize at different levels, and for different schemes. The image below shows how a high level language program could first be lowered to a generic FHE IR, before lowering further into specialised IRs that can handle the different schemes, before going down into the  hardware considerations of a compiler.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9a780ba0b19bcda591a8af69416b51db45cd779b07718235d4c85563994345d2.png" alt="How compilers can lower high level languages into optimised hybrid compilations" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="">How compilers can lower high level languages into optimised hybrid compilations</figcaption></figure><p>However, these IRs require standardization across the ecosystem and while it’s still early, there are development and standardization efforts led by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://homomorphicencryption.org/">HomomorphicEncryption.org</a> that include most of the key players in the space. You can also check out the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://eprint.iacr.org/2023/1445.pdf">HEIR</a> paper that describes the implementation of a two-level IR stack like the one sketched out above.</p><p>Another interesting space— though not as significant as optimizing programs and compilers in general— is the selection of cryptographic parameters chosen for a FHE program.</p><p>As far as we know, finding optimal combinations is an open problem; experts have developed an art more than a science on figuring these parameters out. Most compilers take care of this for users but there’s always work being done on parameter picking: the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.zama.ai/concrete">Zama compiler</a> takes care of this for users by turning circuits into subgraphs with better defined requirements and then finding the best aggregate secure-and-efficient set of parameters. Interestingly, these subgraphs can also be used as benchmarks to find more efficient ways to structure circuits. This is described in detail in their <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.zama.ai/post/parameter-optimization-and-larger-precision-for-tfhe">blogpost</a>.</p><h3 id="h-hardware" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Hardware</strong>:</h3><p>Hardware is another dimension where speedups are anticipated, owing to the promise of FHE itself, but also benefiting from the work being poured into Zero-Knowledge (ZK) hardware as there is some overlap in the calculations that are being optimized.</p><p>While advancements in hardware can provide some boosts in performance, they won&apos;t address the foundational inefficiencies that arise from non-expertly designed solutions. Additionally, since cryptographic standards for FHE are still evolving, it adds another layer of complexity to the development of dedicated hardware. Without fixed standards, there&apos;s added risk in committing to hardware designs that might become obsolete as the cryptographic landscape changes. Fixing standards will also create trade-offs in program efficiency as compilers won’t have as much freedom to optimize the parameters based on the program.</p><p>We refer you to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/hashkey-capital-insights/challenges-solutions-of-onchain-fhe-unlocking-the-holy-grail-d7c00abed166">HashKey’s article</a> for more on Hardware.</p><h3 id="h-cryptographic-improvements-to-schemes" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Cryptographic Improvements to schemes</strong>:</h3><p>The world of cryptography witnessed significant advancements in FHE since its conceptualization in 2009. State-of-the-art schemes were gaining orders of magnitudes in efficiency nearly every year until around 2016 (Gm, CKKS and TFHE!). However, there has been diminishing returns on these improvements and we’re focusing on the other areas for more immediate mega speed gainz.</p><p>--------------------------------------------</p><p>In short, for the better part of the last two decades, FHE research and development was theoretical, in major part due to its limitations. We’re starting to see application-focused research and tooling, increasingly accessible content, and more mindshare. At Polymorphic Capital, we&apos;re excited about the future of FHE and its applications. We&apos;re eager to collaborate with those pushing this frontier. If you&apos;re building in this space, reach out to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://twitter.com/romdespoel">@romdespoel</a> on X/tg!</p>]]></content:encoded>
            <author>pmc@newsletter.paragraph.com (Polymorphic Capital)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/b517b45412ea2562ce60c4605e1dadd8a656359fd3d37fc03d228cd09c7f922a.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[A Soft Introduction to Fully Homomorphic Encryption]]></title>
            <link>https://paragraph.com/@pmc/a-soft-introduction-to-fully-homomorphic-encryption</link>
            <guid>QyFBn3jsuXO1YyyYDTCZ</guid>
            <pubDate>Mon, 03 Jul 2023 12:38:21 GMT</pubDate>
            <description><![CDATA[There has always been a contentious trade-off between extracting utility from a user’s data and preserving their privacy— what if you could do both? This article gives an introduction to Fully Homomorphic Encryption (FHE), a family of encryption schemes that allows users to perform computations on encrypted data, upending the utility-privacy trade-offs. The theory was first floated around in the late 70s (notably, by R and A of the RSA encryption team) but the first functional scheme was only...]]></description>
            <content:encoded><![CDATA[<p>There has always been a contentious trade-off between extracting utility from a user’s data and preserving their privacy— what if you could do both? This article gives an introduction to Fully Homomorphic Encryption (FHE), a family of encryption schemes that allows users to perform computations on encrypted data, upending the utility-privacy trade-offs.</p><p>The theory was first floated around in the late 70s (notably, by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://citeseerx.ist.psu.edu/document?repid=rep1&amp;type=pdf&amp;doi=c365f01d330b2211e74069120e88cff37eacbcf5">R and A</a> of the RSA encryption team) but the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf">first functional scheme</a> was only proposed in 2009 by Craig Gentry. It was offensively inefficient, with multiplications of two encrypted numbers taking minutes. Since then, the pace of improvements and iterations has been ramping up and FHE has gone from prohibitively expensive to just impractical. With all it promises— whether in privacy-preserving ML, encrypted blockchains, or others— it’s becoming an important part of the conversation on privacy. So, read on!</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/a369147bca18e75bfeb08c26d844888bb8914a0f8e329e64b2393db0b8fd40eb.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><h2 id="h-how-does-it-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">How does it work?</h2><p>Traditionally, if an application had to perform some computation on encrypted data, the application would have to decrypt the data first, perform the desired task on the plaintext data, and then re-encrypt the data. When working with trusted third-parties, that works well. However, it introduces issues when you don’t trust the guys on the other side. For example, I’d be all about using my genomic data to further science but I don’t know who’s getting their grubby little hands on my GATTACAs after I dutifully spit in a sample tube.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e50b984d87f1b6105dcf7e30bfce0372e439637ddcbf7be29487454eb6e27e8c.gif" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>FHE’s proposal is to remove the application’s need to decrypt anything. This works by finding ways to encrypt data so that you can apply functions +_{enc} and \times_{enc} that maintain the same properties as normal addition and multiplication when you do them over the encrypted data (hence, the name homomorphic— maintaining the same shape). If you can do that, you can work on encrypted data, and, on decryption, get a matching output. For example,</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/788640284a2fbd7af1cdc463b07a1388e141f2e9bbd9799ce7fc065081982181.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>I can encrypt the values $3$ and $5$, and make someone compute $3 + 5$ on those encrypted inputs without them knowing what they’re actually adding. The result to that computation, however, can be decrypted to the plaintext output by whoever has the key.</p><p>“Why addition and multiplication?”, you might ask. It turns out these two operations are computationally complete, meaning that any computation can be expressed as combinations of these so that— more generically— for any computation $f$ (and its equivalent on encrypted data, $f_{enc}$) on a message $m$, you get something like this:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/259c0a2c6adcd34a86313d5392da316a56b371dba24f0cd15eaf353bdf0aebce.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>I could encrypt my message $m$, send it to some snakey third-party that won’t be able to decipher it but will still be able to produce something useful by applying $f_{enc}$ on it. In this example, if I have the key, I can then decipher what I get back.</p><p>Seeing this, we get an idea of how FHE can have an enormous impact on how we understand data privacy. For example, users would be able to offload expensive computations to cloud providers in such a way that the providers would not have access to the plaintext data at all.</p><h2 id="h-where-could-this-be-used" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Where could this be used?</h2><p>In a nutshell, this lets multiple parties work collaboratively on data without having to trust each other. Unapologetically, we’ll start with Web3 use cases ¯\<em>(ツ)</em>/¯</p><h3 id="h-web3" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Web3</h3><p>Recently very popular, Zero Knowledge (ZK) has been sold in every shape and form as crypto’s solution to privacy. It will undoubtedly play a huge part in increasing the privacy of distributed systems but has limitations when it comes to shared private states. For example, try to come up with a protocol for private on-chain voting.</p><p>This is where FHE shines as no sensitive data has to be decrypted before being aggregated. This unlocks:</p><ul><li><p>Full composable and programmable private blockchains</p></li><li><p>Sealed-bid auctions</p></li><li><p>Private on-chain voting</p></li><li><p>Dark pools (private exchanges)</p></li><li><p>More flavours of on-chain gaming with incomplete information</p></li><li><p>Trustless bridges</p></li><li><p>All the use cases below are also portable to blockchains</p></li></ul><h3 id="h-web2" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Web2</h3><ul><li><p>Private information retrieval: googling something or querying a database without giving the server any information on what you’re actually looking for</p></li><li><p>Machine Learning on private data: you could contribute your sensitive data to training models without revealing anything about yourself. For example, getting privacy-preserving tailored advertising or contributing health data to create more accurate medical models.</p></li><li><p>Private AML, KYC: Let someone check you’re not doing anything naughty without having to reveal who you are or what you do!</p></li><li><p>Privacy-preserving location based services: Leveraging your location without the current accompanying privacy and security concerns</p></li></ul><h2 id="h-challenges" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Challenges</h2><p>Regardless, there are still major barriers to widespread adoption of FHE, which I will be covering these in more depth soon™. For now, the headlines are:</p><ul><li><p>It’s performance (both in terms of size and speed), still has major room for improvement</p></li><li><p>Expertise is required to write secure and efficient solutions as there are subtleties to converting arbitrary programs into FHE circuits. Code written by non-experts can lag behind expert-written solutions by many orders of magnitude</p></li><li><p>User education on the above and documentation is lacking</p></li><li><p>Lack of standardisation for the existing schemes to facilitate research and increase security</p></li><li><p>FHE is not a silver bullet to privacy. It’s a significant tool in the suite of Privacy Enhancing Technologies (PETs) that will help facilitate privacy across all the webs but a lot of work still needs to be done in other privacy areas like ZK, MPC, mixnets, etc.</p></li><li><p>Working assumption that third parties are outputting reliable data. In most of the article, I’ve been assuming an honest-but-curious third party but what if the third party decided to output adversarial data? A lot of work still needs to go into verifiable FHE. A mix of ZK &amp; FHE might be the MVP on this one but there’s a lot of work to be done due to the fundamental mathematical differences on how these systems are built today</p></li></ul><h2 id="h-the-scenery" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Scenery</h2><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9a111836de696381c3e6aca6cdacda8d82bd98ccad000dd6327a9a94de7165e0.png" alt="" blurdataurl="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=" nextheight="600" nextwidth="800" class="image-node embed"><figcaption HTMLAttributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>A majority of the work being done is still academic. Nevertheless, due to the importance of this emerging paradigm, every major company has FHE on their radar:</p><ul><li><p>In 2021, Google <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://developers.googleblog.com/2021/06/our-latest-updates-on-fully-homomorphic-encryption.html">open-sourced a transpiler</a>, a library that converts arbitrary C++ into code that can work on encrypted inputs</p></li><li><p>Microsoft released a lower-level library called <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/microsoft/SEAL#examples">SEAL</a> in 2018. It requires more FHE knowledge but is more modular as it supports different FHE schemes and lets you tinker with the scheme parameters (more on this next time). They’ve also leveraged FHE through the Edge browser to work on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.microsoft.com/en-us/research/blog/password-monitor-safeguarding-passwords-in-microsoft-edge/">password monitoring</a> (look at you go, Edge! Good job, buddy)</p></li><li><p>Intel is working on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://arxiv.org/abs/2103.16400">hardware acceleration</a> as FHE brings around significant performance challenges</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.ibm.com/security/services/homomorphic-encryption">IBM</a> is providing consulting services and tailored FHE cloud infrastructure</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.ericsson.com/en/blog/2021/9/machine-learning-on-encrypted-data">Ericsson</a> has made noise about leveraging FHE for privacy-preserving AI</p></li></ul><p>You will also find a handful of new companies specialising on the topic:</p><ul><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.zama.ai/">Zama</a> is building tools like Concrete and TFHE-rs (compilers to add FHE to Python and Rust), Concrete ML (a framework for privacy-preserving ML) and doing great work on contributing research and fostering a community</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://sunscreen.tech/">Sunscreen</a> is also building a Rust compiler, but actively focusing on the web3 space</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://scrt.network/blog/secret-2-0-building-the-next-generation-of-web3-privacy/">Secret Network</a>, a privacy-preserving programmable blockchain has historically relied on secure hardware but has been vocal about the development of FHE as a solution to hardware dependency</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blyss.dev/">Blyss</a> is developing a key-value private retrieval tool, built on one of the co-founder’s <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://eprint.iacr.org/2022/368">research</a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dualitytech.com/platform/">Duality Tech</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.enveil.com/products/">Enveil</a> propose encrypted querying of databases and a suite of privacy-preserving statistical and ML tools</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://inpher.io/xor-secret-computing/">Inpher</a> works on enterprise privacy preserving ML</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://cornami.com/trustream/">Cornami</a> is an FHE-enabled data pipeline software</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://desilo.ai/">Desilo</a>, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.loricacyber.com/">Lorica</a> and <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.decentriq.com/products/media-advertising">Decentriq</a> work on securely linking and drawing insights from different siloed datasets</p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://private.id/">Private Identity</a> is working on identity using encrypted biometrics</p></li></ul><p>That’s all we have for you today! We are aiming for a series of articles that will demystify everything FHE and if there’s anything you’d like to see, or feedback on the article, please reach out on twitter @romdespoel.</p><p>*<em>Hardware is a tough section to categorise. Due to the infancy and lack of standardisation, it’s very early to start focusing on hardware. Nevertheless, some advances in ZK hardware optimise operations like FFTs and MSMs which are also relevant for FHE. Companies working on this have been omitted.</em></p>]]></content:encoded>
            <author>pmc@newsletter.paragraph.com (Polymorphic Capital)</author>
        </item>
    </channel>
</rss>