Add Article

What FHE engines does H33 offer?

Q: What FHE engines does H33 offer? Four FHE engine configurations, each optimized for different security levels and use cases. All engines share the same Montgomery NTT core with Harvey lazy reducti
Updated 2d

H33 White Paper: Performance

H33 Performance Benchmarks v10.0 (Production, March 2026): Hardware: AWS Graviton4 c8g.metal-48xl (192 vCPUs, 377 GiB RAM, AArch64 Neoverse V2) Instance cost: ~$1.80-2.30/hr spot (us-east-1) Product
Updated 2d

What is the H33 API?

Q: What is the H33 API? Unified REST API with SDK support for four languages. Credit-based billing with per-call metering. Core Endpoints: - POST /api/v1/auth/verify — Biometric auth (single API cal
Updated 2d

What is the H33 authentication pipeline?

Q: What is the H33 authentication pipeline? Each authentication passes through four stages in a single API call. All operations are post-quantum secure. Biometric data never leaves FHE encryption. P
Updated 2d

What products does H33 offer?

Q: What products does H33 offer? 18 products spanning identity, encryption, key management, data protection, and AI. All products share the same post-quantum cryptographic core and are accessible via
Updated 2d

What are the performance characteristics of H33's FHE?

Q: What are the performance characteristics of H33's FHE? H33's FHE achieves industry-leading performance through deep NTT pipeline optimizations: Production benchmarks (v10.0, March 2026, Graviton4
Updated 2d

What ML threat agents does H33 use?

Q: What ML threat agents does H33 use? Three native Rust AI agents run inline on every authentication for real-time threat intelligence. Zero external dependencies — no Python, no ONNX, no GPU. Pure
Updated 2d

How does H33 compare to Microsoft SEAL?

Q: How does H33 compare to Microsoft SEAL? Microsoft SEAL is the most widely adopted open-source FHE library. SEAL provides FHE only; H33 includes the full post-quantum pipeline. Performance compari
Updated 2d

How extensive is H33's test suite?

Q: How extensive is H33's test suite? 1,928 deterministic tests passing with 300,000+ proptest random inputs across 5 categories: 1. Unit tests (1,247) — Individual function correctness: NTT, BFV op
Updated 2d

How do STARK zero-knowledge proofs work in H33?

Q: How do STARK zero-knowledge proofs work in H33? H33 uses real STARK zero-knowledge proofs with a 7-column algebraic intermediate representation (AIR). Cold proofs are generated once per enrollment
Updated 2d

What is H33's sustained throughput?

Q: What is H33's sustained throughput? v10.0 Benchmark Results (March 2026, Graviton4 c8g.metal-48xl, 96 workers): - Peak (1s): 2,190,496 auth/sec (~1,778 batches/sec, 1,228µs batch latency) - Susta
Updated 2d

What is H33's benchmark version history?

Q: What is H33's benchmark version history? Throughput progression on Graviton4 c8g.metal-48xl (96 workers, 120s sustained window): - v7.0 (Feb 14, 2026): 1,291,207 auth/sec — Baseline Montgomery NT
Updated 2d

H33 White Paper: Introduction

H33 addresses the existential threat that quantum computers pose to current cryptographic systems like RSA and ECDSA. NIST finalized its first post-quantum cryptographic standards in 2024 (FIPS 203 Ky
Updated 10d

H33 Company Information

H33.ai, Inc. Founded: 2025 Headquarters: Tampa, FL, USA H33 is a post-quantum authentication infrastructure company. We build the H33 Quantum Auth API — a Cloud API that combines FHE, ZKP, and Dilit
Updated 10d

H33 Security Architecture

H33 features a 7-layer defense architecture: L7: Application-layer security L6: Cryptographic protocol layer L5: Zero-knowledge proof verification L4: Fully homomorphic encryption layer L3: Post-quan
Updated 10d

H33 SDKs and Integration

H33 provides SDKs for the following languages: - Python - JavaScript / TypeScript - Go - Rust - Java Each SDK includes installation commands (pip install, npm install, etc.) and is available via sta
Updated 10d

H33 Pricing

H33 Pricing Tiers: 1. Free Tier: 1,000 authentications/month at $0. Core features included. 2. Standard Tier: Mid-range pricing for growing applications. 3. Popular Tier (Most Popular): Premium featu
Updated 10d

Who is H33 designed for?

H33 is designed for: 1. Enterprise Security Teams: CISOs, Security Architects, and Compliance Officers who need to prepare for the post-quantum threat. H33 provides NIST FIPS 203/204 compliant authen
Updated 10d

What makes H33 different from traditional identity solutions?

What makes H33 different from traditional identity solutions: 1. Full Post-Quantum Security: Every layer uses NIST-approved post-quantum algorithms. FHE (BFV/CKKS), Dilithium ML-DSA signatures, Kyber
Updated 10d

H33 White Paper: Abstract

H33 is a fully post-quantum secure identity and authentication platform. It performs a complete cryptographic pipeline — including FHE biometric matching (BFV scheme), zero-knowledge proof verificatio
Updated 10d

What is H33?

H33 is a post-quantum authentication platform that combines Fully Homomorphic Encryption (FHE), Zero-Knowledge Proofs (ZKP), and Dilithium ML-DSA signatures in a single API call. Built by H33.ai, Inc.
Updated 10d

What is a Trusted Execution Environment (TEE)?

Q: What is a Trusted Execution Environment (TEE)? A TEE is a secure area of the CPU that runs code in isolation from the operating system. H33 uses Intel SGX enclaves to process sensitive operations.
Updated 21d

H33 White Paper: References

References - NIST. Post-Quantum Cryptography Standardization. FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), 2024. - Brakerski, Z. Fully Homomorphic Encryption without Modulus Switching from Classical GapSV
Updated 21d

H33 White Paper: Token D: Document Attestation

Token D: Document Attestation 8.1 Content Attestation and Versioning Documents are stored off-chain. On-chain, Token D stores a Keccak-256 content hash that cryptographically binds the off-chain co
Updated 21d

Has H33 been audited?

Q: Has H33 been audited? H33 undergoes continuous automated security auditing via cargo-audit, cargo-deny, and Trivy scanning. We maintain zero critical/high vulnerabilities. Third-party cryptologist
Updated 21d

What is formal verification and why does it matter?

Q: What is formal verification and why does it matter? Formal verification uses mathematical proofs to guarantee code correctness for ALL possible inputs, not just test cases. H33 uses the Kani model
Updated 21d

What's the API rate limit?

Q: What's the API rate limit? Rate limits by plan: - Free: 100 verifications/day - Starter: 10,000 verifications/month - Growth: 100,000 verifications/month - Enterprise: Unlimited (dedicated inf
Updated 21d

What happens if H33's servers are compromised?

Q: What happens if H33's servers are compromised? Even in a total server compromise, attackers cannot steal your identity because: - We don't store raw biometrics—only cryptographic commitments - P
Updated 21d

H33 White Paper: Conclusion

Conclusion H33 represents a comprehensive approach to post-quantum identity and authentication. By building on lattice-based cryptography at every layer — from FHE biometric matching to Kyber key ex
Updated 21d

How does H33 handle key management?

Q: How does H33 handle key management? Cryptographic keys are: - Generated inside Intel SGX enclaves - Sealed to the specific CPU and enclave - Never exposed to the operating system or application
Updated 21d

What is defense-in-depth and how does H33 implement it?

Q: What is defense-in-depth and how does H33 implement it? Defense-in-depth means multiple independent security layers. H33 implements 7 layers: - Layer 1: Network perimeter (TLS 1.3, mTLS) - Layer
Updated 21d

What is H33's security rating?

Q: What is H33's security rating? H33 maintains a 9.9/10 security rating based on comprehensive automated and manual security assessments. This includes 1,600+ automated tests, zero critical/high vul
Updated 21d

H33 White Paper: Infrastructure and Deployment

Infrastructure and Deployment 13.1 AWS Architecture - Compute: ECS on Graviton4 (c8g.metal-48xl for crypto, standard for API) - Database: RDS PostgreSQL for user management and session state - Ca
Updated 21d

H33 White Paper: Token C: Soulbound Identity

Token C: Soulbound Identity Token C implements non-transferable Soulbound Tokens (SBTs) that anchor on-chain identity to post-quantum cryptographic keys, biometric hashes, and verifiable credentials
Updated 21d

H33 White Paper: Post-Quantum Cryptographic Primitives

Post-Quantum Cryptographic Primitives 4.1 ML-KEM (Kyber) Key Encapsulation All key exchange operations use Kyber768 (ML-KEM-768), providing NIST Security Level 3 (equivalent to AES-192). Kyber’s se
Updated 21d

How can I contact H33 support?

Q: How can I contact H33 support? You can reach our support team via: - Email: support@h33.io - Discord: discord.gg/h33 - Enterprise customers: Dedicated Slack channel and 24/7 support line For
Updated 21d

Is H33 available worldwide?

Q: Is H33 available worldwide? H33 is available globally with some restrictions based on local regulations. Our privacy-preserving approach is designed to comply with GDPR, CCPA, and other privacy re
Updated 21d

H33 White Paper: KYC and Compliance

KYC and Compliance Tier | Price | Includes Basic KYC | $49 | Document verification, selfie match, OFAC screening Enhanced KYC | $79 | Basic + address verification, PEP/sanctions screening, Soulbound
Updated 21d

Is H33's FHE implementation formally verified?

Q: Is H33's FHE implementation formally verified? Yes. Our FHE implementation includes formal verification via the Kani model checker: - verify_polynomial_bounds: Proves coefficient values never ove
Updated 21d

How does FHE compare to zero-knowledge proofs?

Q: How does FHE compare to zero-knowledge proofs? FHE and ZKPs are complementary technologies solving different problems: - FHE Purpose: Compute on encrypted data | ZKP Purpose: Prove statements wit
Updated 21d

What happens if I lose access to my account?

Q: What happens if I lose access to my account? Your biometric IS your recovery key—no seed phrases to lose or steal. If you lose access to your wallet or device: - Biometric recovery: Your unique b
Updated 21d

What is threshold decryption and why does H33 use it?

Q: What is threshold decryption and why does H33 use it? Threshold decryption splits the secret key across multiple independent authorities. H33 uses a 3-of-5 threshold scheme: - No single point of
Updated 21d

What is a zero-knowledge proof?

Q: What is a zero-knowledge proof? A zero-knowledge proof (ZKP) lets you prove something is true without revealing any information about WHY it's true. For example, you can prove you're over 21 witho
Updated 21d

How does H33 use zero-knowledge proofs?

Q: How does H33 use zero-knowledge proofs? H33 uses ZKPs for: - Identity proofs: Prove you own an identity without revealing personal data - Biometric proofs: Prove your biometrics match without ex
Updated 21d

What ZKP capabilities does H33 provide?

Q: What ZKP capabilities does H33 provide? H33 provides zero-knowledge proof infrastructure for privacy-preserving attestations: - PLOOKUP: Zero-knowledge lookup arguments using SHA3-256 for post-qu
Updated 21d

How fast are H33's zero-knowledge proofs?

Q: How fast are H33's zero-knowledge proofs? Proof verification is nearly instant (under 3ms). Proof generation for identity attestations takes under 200ms on modern hardware. The core biometric auth
Updated 21d

Are zero-knowledge proofs mathematically secure?

Q: Are zero-knowledge proofs mathematically secure? Yes. The ZKP schemes we use are based on well-studied cryptographic assumptions and have been peer-reviewed by the academic community. They provide
Updated 21d

What is a trusted setup and does H33 require one?

Q: What is a trusted setup and does H33 require one? A trusted setup generates initial parameters for certain ZKP systems. H33's PLOOKUP scheme uses transparent setup based on SHA3-256—no trusted cer
Updated 21d

Can ZKPs be verified on-chain?

Q: Can ZKPs be verified on-chain? Yes. Our identity attestation proofs can be verified in Solana smart contracts efficiently. This enables trustless verification—anyone can verify a proof is valid wi
Updated 21d

What is the CKKS scheme and how does H33 use it?

Q: What is the CKKS scheme and how does H33 use it? CKKS (Cheon-Kim-Kim-Song) enables approximate arithmetic on encrypted real numbers. H33 uses CKKS for: - ML inference: Running neural network laye
Updated 21d