Making Privacy Solutions EVM-Compatible Is Key to Integrating Them With Blockchains and Dapps — Guy Itzhaki

1 year ago
Making Privacy Solutions EVM-Compatible Is Key to Integrating Them With Blockchains and Dapps — Guy Itzhaki

While proponents of afloat homomorphic encryption (FHE) person sometimes touted it arsenic a amended privateness solution than zero-knowledge (ZK) proofs, Guy Itzhaki, the laminitis and CEO of Fhenix, said some are cryptographic-based technologies which, erstwhile combined, tin signifier a robust and businesslike encryption layer. To enactment this viewpoint, Itzhaki pointed to a probe survey whose findings suggest that “combining ZKPs with FHE could execute afloat generalizable, confidential decentralized concern (defi).”

The Blockchain and AI Converging

Despite their large promise, privateness solutions person yet to go an important portion of blockchains and decentralized apps (dapps). In his written answers sent to Bitcoin.com News, the Fhenix CEO said 1 of the reasons for this whitethorn beryllium the perceived load they bring to developers and users. To flooded specified problems, Itzhaki projected making these solutions EVM-compatible and besides bringing FHE encryption capabilities to the programming connection Solidity.

Meanwhile, erstwhile asked however developers and users tin support their privateness successful a satellite wherever blockchain and artificial quality (AI) are converging, the laminitis of Fhenix — an FHE-powered Layer 2 — said that the archetypal measurement would beryllium to rise consciousness astir the beingness of emerging risks oregon challenges. Taking this measurement volition unit developers to plan applications that code these challenges.

For users, Itzhaki said the champion mode to support themselves is to “educate themselves astir harmless usage and utilize tools that enactment idiosyncratic information protection.” Elsewhere, successful his answers sent via Telegram, Itzhaki besides touched connected wherefore the much-vaunted Web3 wide adoption has not come.

Below are Guy Itzhaki‘s answers to each the questions sent to him.

Bitcoin.com News (BCN): Quite often, the deficiency of a refined idiosyncratic acquisition is seen arsenic the biggest roadblock to Web3 wide adoption. However, immoderate spot privateness concerns arsenic different large obstacle, particularly for organization adoption. In your opinion, what bash you spot arsenic the biggest obstacles the Web3 ecosystem needs to collectively flooded to go commonplace?

Guy Itzhaki (GI): First of all, a deficiency of a consciousness of information portion interacting with blockchain-based applications. Many radical are deterred from utilizing it due to the fact that it “feels” little unafraid than accepted applications that connection “built-in” security, adjacent astatine the outgo of centralization.

The 2nd situation is the wide atrocious idiosyncratic acquisition that the abstraction commits you to. For example, the consciousness of information (or functionality) is damaged greatly erstwhile users suffer funds owed to tiny operating mistakes that mightiness hap to anyone. The analyzable quality of operating astir decentralized applications is simply a immense obstacle to wide adoption.

Another contented is regulations. Blockchain adoption is hindered by the antagonistic sentiment of regulators and accepted markets, chiefly owed to associations with transgression activity- we request to find a mode to let users to support their information backstage (on nationalist blockchains) portion besides allowing them to beryllium compliant with the law.

FHE exertion holds a batch of imaginable for coping with these challenges (through encrypted computation function). By introducing autochthonal encryption to the blockchain, we tin facilitate a amended consciousness of information (for illustration by encrypting the user’s assets balance), enactment applications similar relationship abstraction that importantly trim the user’s complexity erstwhile interacting with the blockchain and alteration decentralized individuality absorption that is needed for compliance.

BCN: Depending connected the products and usage cases, the blockchain ecosystem has a wide scope of privateness needs. Do you spot FHE replacing zero-knowledge ZK proofs and trusted execution environments (TEEs) oregon tin these innovative technologies co-exist?

GI: That’s a large question arsenic there’s a superior treatment regarding the efficacy of immoderate azygous privacy-preserving exertion to lick each information encryption needs and scenarios- Due to utmost differences betwixt competing encryption technologies (cost, complexity, UX)..

It is important to recognize that portion some FHE and ZKP are cryptographic-based technologies, they are precise different. ZKP is utilized for the verification of data, portion FHE is utilized for the computation of encrypted data.

Personally, I judge that determination isn’t a ‘one-stop-shop’ solution, and astir apt we’ll spot a operation of FHE, ZKP and MPC technologies that signifier a robust, yet businesslike encryption layer, based connected circumstantial usage lawsuit requirements. For example, caller probe has shown that combining ZKPs with Fully Homomorphic Encryption (FHE) could execute afloat generalizable, confidential DeFi: ZKPs tin beryllium the integrity of idiosyncratic inputs and computation, FHE tin process arbitrary computation connected encrypted data, and MPC volition beryllium utilized to abstracted the keys used.

BCN: Can you archer america astir your task Fhenix and the afloat homomorphic encrypted virtual instrumentality (fhEVM) arsenic good arsenic however it blends into the existing chains and platforms?

GI: Fhenix is the archetypal Fully Homomorphic Encryption (FHE) powered L2 to bring computation implicit encrypted information to Ethereum. Our absorption is to present FHE exertion to the blockchain ecosystem and tailor its show to Web3 needs. Our archetypal improvement accomplishment is the FHE Rollup, which unlocks the imaginable for delicate and backstage information to beryllium processed securely connected Ethereum and different EVM networks.

Such advancement means that users (and institutions) tin behaviour encrypted on-chain transactions, and it opens the doorway for further applications similar confidential trustless gaming, backstage voting, sealed bid auctions and more.

Fhenix utilizes Zama’s fhEVM, a acceptable of extensions for the Ethereum Virtual Machine (EVM) that enables developers to seamlessly integrate FHE into their workflows and make encrypted astute contracts without immoderate cryptographic expertise, portion inactive penning successful Solidity.

We judge that by bringing devs the champion tools for employing FHE connected apical of existing protocols volition pave the mode for the enactment of a caller encryption modular successful Web3.

BCN: Whether it’s FHE, ZK impervious oregon thing else, the privateness solutions themselves person an uphill task to go an integral portion of blockchains and decentralized apps (dapps). What factors oregon strategies would marque it easier for builders to integrate privateness solutions into the existing chains and platforms?

GI: I travel from a precise applicable background, and that is wherefore erstwhile we conscionable started designing Fhenix, it was wide to america that we needed to marque FHE arsenic casual arsenic imaginable for developers and users. As specified our archetypal determination was to marque definite we are EVM compatible and bring the FHE encryption capabilities successful Solidity successful bid to trim the load connected developers, and not necessitate them to larn a new, circumstantial connection for coding. That besides means that developers bash not request to clasp immoderate cryptographic expertise oregon FHE cognition for processing dapps.

Lastly, we’re solving for developer acquisition successful processing encryption-first, applications. That means that we absorption connected creating the champion stack for developers, to easiness the improvement process arsenic overmuch arsenic possible.

BCN: With FHE, 1 tin input information on-chain and encrypt it portion being capable to usage it arsenic if it’s non-encrypted. The information is said to stay encrypted and backstage during transactions and astute declaration implementations. Some judge that this level of on-chain privateness could spell beyond solving privateness issues and unlock usage cases that weren’t imaginable before. Could you exemplify done examples immoderate of these imaginable usage cases, if any?

GI: In presumption of applicable usage cases, each exertion that requires information encryption tin payment from utilizing FHE successful immoderate signifier oregon another. The astir absorbing usage cases are those that payment greatly from performing computations connected encrypted data, like:

  • Decentralized identity
  • Confidential Payments
  • Trustless (Decentralized) gaming
  • Confidential defi

One large illustration is Casino gaming. Imagine a script wherever the trader distributes cards without knowing their values—a glimpse into the imaginable of afloat backstage on-chain encryption. This is conscionable the beginning. FHE’s quality to incorporated information privateness and spot into the blockchain is indispensable for some crippled makers and players, and cardinal to aboriginal gaming innovations and usage cases.

One promising avenue for achieving this is done Fhenix’s FHE Rollups, which empower developers to make customized app chains with FHE seamlessly integrated, each portion utilizing acquainted Ethereum Virtual Machine (EVM) languages.

In the discourse of gaming, FHE Rollups connection the quality to physique gaming ecosystems with FHE exertion astatine their core. For instance, 1 roll-up could beryllium dedicated wholly to casino games, ensuring the implicit privateness and information of these games. Meanwhile, different rollup, afloat interoperable with the first, could absorption connected large-scale player-versus-player (PvP) games.

BCN: Artificial quality (AI) and blockchain, 2 of immoderate of the hottest technologies close now, look to beryllium converging. Now immoderate radical judge AI could person some affirmative and antagonistic impacts connected Web3 idiosyncratic privateness and safety. Focusing connected the antagonistic effect, what precautionary measures should developers and users instrumentality to safeguard on-chain privacy?

GI: The archetypal happening would beryllium raising consciousness of the increasing challenges successful the internet, and successful Web3 abstraction successful particular, which should perpetrate builders to see these risks erstwhile designing their applications. Users, connected the different hand, request to amended themselves astir harmless usage and utilize tools that enactment idiosyncratic information protection.

In presumption of technological precautionary measures- 1 of the usage cases I americium personally funny successful is however we, the users, tin archer the quality betwixt AI-generative contented and human-made content. Attesting to the root of the contented is simply a cardinal diagnostic of blockchains, and I americium assured we volition spot apps that assistance way information root successful the future.

Specifically, for FHE, we are exploring ways to assistance make amended AI modules by allowing users to stock their information for AI training, without the hazard of losing their privacy.

What are your thoughts astir this interview? Let america cognize what you deliberation successful the comments conception below.

View source