Confidential coprocessor overview
Confidential Coprocessor
Coprocessor lettering
for Fair and Verifiable RWA Markets FHE16
+ MPC + Threshold Cryptography — Privacy that scales with performance.

Confidential and Verifiable Computation

This layer uses FHE, MPC, and Threshold Cryptography to perform verifiable
computations on the blockchain while keeping sensitive data confidential.

We're a research-driven company building on quantum-resistant FHE (Fully Homomorphic Encryption) and MPC (Multi-Party Computation) to make data security and privacy sustainable. Moreover, multi- users’ data can be securely and privately processed — decrypting only when needed and extracting statistical insights if necessary.📊📈

(To be disclosed in Oct. 2025)

f321ce2f5032c6d408f553606755b51378366c99adfa37337c95c1a330577139

(To be disclosed 1H 2026)

e4462274db0498727f14b6ae254c32bbe0b1eda2f61c192ef71c896c88e7b7f5

(To be disclosed 1H 2026)

ffc2d4c64b8a683cc44cc98f910d2d9f7d7d873668f10b0bae14d025421016d8

(To be disclosed 2H 2026)

6c0214904ca1f25da77c4db533603d793f3c1cb335086e84f918ea10677c45d5

Flagship Product — Deterministic Confidential Coprocessor 🏁

Executes blockchain state data on FHE16, enabling public verification. 🔍

Unlike traditional ZK systems limited to fixed states,FHE16-based technology supports dynamic state verification. 🔄✅

Deterministic Confidential Coprocessor

Normal transactions stay on-chain, while sensitive data/compute run in a confidential FHE coprocessor—keeping state public.

Encrypted data stays hidden

Illustration of FHE16 chip architecture

FHE16

A 16-bit integer computation–centric deterministic FHE structure eliminating floating-point operations and ensuring identical results regardless of the execution environment

Key Features
  • Elimination of floating-point operations, ensuring identical results regardless of execution environments
  • Elimination of floating-point environment-specific error issues
  • Ultra-fast 2.89 ms bootstrapping through GINX gate optimization (suitable for real-time and low-latency applications)

Reference: ePrint 2024/1916

waLLLnut's Property is,

  • Each private state is deterministically encrypted under FHE16 and recorded on-chain.
  • Any state change can be verified by all network participants.
  • State disclosure is propagated via a Threshold Decryption protocol.
Use case
  • Protecting DeFi transaction data & preventing MEV

    Keep your crypto trades private so others can't peek at your orders. Block unfair bot tactics that jump ahead to profit from your trade (often called MEV).

  • On-chain voting (selective anonymity + public verifiability)

    Vote on the blockchain while your identity and choice stay private. Anyone can still verify the overall results are real.

  • Data marketplaces (perform computations without revealing raw data)

    Buy and sell insights without handing over your raw data. The marketplace runs computations on protected data, so the originals stay private.

  • Privacy-preserving messaging/SNS

    Chat and share on social without giving up your privacy. Your content stays encrypted, and you decide who sees what.

Roadmap title graphic
~Dec.2026 Ongoing

Launch of SVM-based Confidential Layer module

~Nov.2026

LatticA
The Solana-native confidential computing that makes encrypted data computable and verifiable anywhere.

~Dec.2027

Launch of EVM-based Confidential Layer module

We are pioneering
Fully Homomorphic Encryption(FHE)
for decentralized, secure, and verifiable computation.