Fhenix Breaks Blockchain Privacy Barrier With Decomposed BFV Encryption Breakthrough

TheNewsCryptoPubblicato 2026-02-05Pubblicato ultima volta 2026-02-05

Introduzione

Fhenix has developed a new cryptographic technology called Decomposed BFV (DBFV), a breakthrough in fully homomorphic encryption (FHE) that significantly improves the performance and practicality of encrypted computations on blockchain. FHE enables calculations on encrypted data without decryption, offering strong data privacy, but has been limited by high computational costs and noise accumulation, especially in precise schemes like BFV and BGV used in financial applications. DBFV addresses these challenges by decomposing large plaintext numbers into smaller, manageable ciphertexts called "limbs," which are processed independently. This approach enhances noise control and reduces the need for frequent bootstrapping—a computationally expensive process—thereby enabling deeper and more complex computations. Although some operations become slightly more costly, the overall efficiency gains make sustained encrypted workloads feasible for the first time. This innovation allows high-throughput, privacy-preserving applications such as financial logic, stateful apps, and data aggregation. Fhenix plans to integrate DBFV into its infrastructure later this year, making FHE a practical solution for decentralized finance and enterprise blockchain use cases without compromising performance or precision.

Fhenix, a pioneering developer of encrypted smart contracts using fully homomorphic encryption (FHE), has set a new milestone for blockchain privacy with the creation of its cutting-edge Decomposed BFV technology. It’s a remarkable new cryptographic technique that’s set to alter the performance and scalability of precise FHE schemes and allow robust, high-throughput privacy-preserving computation for real-world applications.

FHE makes it feasible to do calculations on encrypted data without ever having to decode it. It holds significant promise for data privacy, possibly allowing the secure processing and analysis of sensitive information. Nevertheless, FHE has not yet fulfilled this promise since the technology has always been limited by a major performance barrier, which is the catastrophic growth of computational costs and noise when performing arithmetic on huge numbers.

Due to the need for flawless accuracy, accurate schemes like BFV and BGV—which are crucial for computing financial logic—present a particularly severe scaling issue for FHE. As plaintext numbers rise, noise control expenses climb fast, making real-world, high-volume systems unworkable.

Accelerated Computational Throughput

Fhenix’s DBFV marks a paradigm change for encrypted arithmetic. DBFV significantly increases the performance and scalability behavior of FHE by breaking down single, huge plaintext data into smaller, independently managed BFV ciphertexts, or “limbs,” during the encryption process.

For many years, it was just not possible to execute accurate FHE on bigger numbers. Even while the math was accurate, when developers ran real-world production workloads, they would soon run into a performance wall. The significant bootstrapping expenses rendered it unfeasible for any application.

By increasing the noise control process, DBFV facilitates the usage of deeper circuits before expensive bootstrapping is necessary. It controls noise more effectively across many “limbs,” enhancing the usable depth of computation. While certain operations, such as multiplication, become somewhat more costly compared to regular BFV, DBFV’s avoidance of frequent bootstrapping greatly decreases the total computing cost of noise remediation. For the first time, it allows the cost-effective computing of sustained encrypted workloads, making FHE practical for decentralized financial protocols and enterprise-grade blockchain applications.

DBFV will facilitate the creation of a new generation of FHE applications that need speed and accuracy, including financial logic, stateful applications and high-volume data aggregation.

Fhenix wants to implement DBFV as a core feature of its infrastructure later this year, weaponizing pure cryptography to solve a barrier that many felt could never be overcome. By redefining the relationship between accuracy, noise, and circuit depth, it will make FHE a deployable reality and let developers to create intricate, privacy-preserving financial applications without compromising precise performance.

The research and development firm Fhenix is leading the way in fully homomorphic encryption (FHE) for encrypted smart contracts. Starting with a laser focus on Private DeFi, Fhenix is developing the infrastructure to deliver FHE everywhere – allowing developers, institutions, and consumers to design and utilize financial apps without sacrificing confidentiality or composability.

TagsAltcoinBlockchain

Domande pertinenti

QWhat is the main breakthrough announced by Fhenix in blockchain privacy technology?

AFhenix announced the creation of its Decomposed BFV (DBFV) technology, a new cryptographic technique that significantly enhances the performance and scalability of fully homomorphic encryption (FHE) schemes.

QWhat specific limitation of previous FHE systems does DBFV address?

ADBFV addresses the major performance barrier of catastrophic growth in computational costs and noise when performing arithmetic on large numbers, which made real-world, high-volume systems unworkable for precise schemes like BFV and BGV.

QHow does the Decomposed BFV (DBFV) method work to improve FHE performance?

ADBFV improves FHE performance by breaking down single, large plaintext data into smaller, independently managed BFV ciphertexts called 'limbs' during encryption. This enhances noise control across these limbs, increasing the usable computational depth and avoiding the need for frequent, expensive bootstrapping.

QWhat types of applications are expected to benefit from DBFV technology?

AApplications that require speed and accuracy, such as financial logic, stateful applications, and high-volume data aggregation, particularly in decentralized financial protocols and enterprise-grade blockchain applications, are expected to benefit from DBFV.

QWhat is Fhenix's broader goal in developing this technology?

AFhenix's broader goal is to lead in fully homomorphic encryption for encrypted smart contracts, starting with a focus on Private DeFi. They aim to develop infrastructure that allows developers, institutions, and consumers to create and use financial applications without sacrificing confidentiality or composability.

Letture associate

From Theft to Re-entry: How Was $292 Million "Laundered"?

A sophisticated crypto laundering operation was executed following the $292 million hack of Kelp DAO on April 18. The attack, attributed to the North Korean Lazarus group, began with anonymous infrastructure preparation using Tornado Cash to fund wallets untraceably. The hacker exploited a vulnerability in Kelp’s cross-chain bridge, stealing 116,500 rsETH. To avoid crashing the market, the attacker used Aave and Compound as laundering tools—depositing the stolen rsETH as collateral to borrow $190 million in clean, liquid ETH. This move triggered a bank run on Aave, causing an $8 billion drop in TVL. After consolidating funds, the attacker fragmented them across hundreds of wallets to evade detection. A major breakpoint was THORChain, where over $460 million in volume—30 times its usual activity—was processed in 24 hours, converting ETH into Bitcoin. This shift to Bitcoin’s UTXO model exponentially increased tracing complexity by shattering funds into countless untraceable fragments. The final destination was Tron-based USDT, the primary channel for illicit crypto flows. From there, funds were cashed out via OTC brokers in China and Southeast Asia, using unlicensed underground banks and UnionPay networks outside Western sanctions scope. Ultimately, the laundered money supports North Korea’s weapons programs, which rely heavily on crypto hacking for foreign currency. The incident underscores structural challenges in DeFi: its openness, composability, and lack of central control make such laundering not just possible, but inherently difficult to prevent.

marsbit1 h fa

From Theft to Re-entry: How Was $292 Million "Laundered"?

marsbit1 h fa

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

In a span of four days, Amazon announced an additional $25 billion investment, and Google pledged up to $40 billion—both direct competitors pouring over $65 billion into the same AI startup, Anthropic. Rather than a typical venture capital move, this signals the latest escalation in the cloud wars. The core of the deal is not equity but compute pre-orders: Anthropic must spend the majority of these funds on AWS and Google Cloud services and chips, effectively locking in massive future compute consumption. This reflects a shift in cloud market dynamics—enterprises now choose cloud providers based on which hosts the best AI models, not just price or stability. With OpenAI deeply tied to Microsoft, Anthropic’s Claude has become the only viable strategic asset for Google and Amazon to remain competitive. Anthropic’s annualized revenue has surged to $30 billion, and it is expanding into verticals like biotech, positioning itself as a cross-industry AI infrastructure layer. However, this funding comes with constraints: Anthropic’s independence is challenged as it balances two rival investors, its safety-first narrative faces pressure from regulatory scrutiny, and its path to IPO introduces new financial pressures. Globally, this accelerates a "tri-polar" closed-loop structure in AI infrastructure, with Microsoft-OpenAI, Google-Anthropic, and Amazon-Anthropic forming exclusive model-cloud alliances. In contrast, China’s landscape differs—investments like Alibaba and Tencent backing open-source model firm DeepSeek reflect a more decoupled approach, though closed-source models from major cloud providers still dominate. The $65 billion bet is ultimately about securing a seat at the table in an AI-defined future—where missing the model layer means losing the cloud war.

marsbit7 h fa

Google and Amazon Simultaneously Invest Heavily in a Competitor: The Most Absurd Business Logic of the AI Era Is Becoming Reality

marsbit7 h fa

Trading

Spot
Futures
活动图片