01. Vision
Confidential and Verifiable Computation
This layer uses FHE, MPC, and Threshold Cryptography to perform verifiable
computations on the blockchain while keeping sensitive data confidential.
We're a research-driven company building on quantum-resistant FHE (Fully Homomorphic Encryption) and MPC (Multi-Party Computation) to make data security and privacy sustainable. Moreover, multi- users’ data can be securely and privately processed — decrypting only when needed and extracting statistical insights if necessary.📊📈
(To be disclosed in Oct. 2025)
f321ce2f5032c6d408f553606755b51378366c99adfa37337c95c1a330577139
(To be disclosed 1H 2026)
e4462274db0498727f14b6ae254c32bbe0b1eda2f61c192ef71c896c88e7b7f5
(To be disclosed 1H 2026)
ffc2d4c64b8a683cc44cc98f910d2d9f7d7d873668f10b0bae14d025421016d8
(To be disclosed 2H 2026)
6c0214904ca1f25da77c4db533603d793f3c1cb335086e84f918ea10677c45d5
Flagship Product — Deterministic Confidential Coprocessor 🏁
Executes blockchain state data on FHE16, enabling public verification. 🔍
Unlike traditional ZK systems limited to fixed states,FHE16-based technology supports dynamic state verification. 🔄✅
03. Solutions
Deterministic Confidential Coprocessor
Normal transactions stay on-chain, while sensitive data/compute run in a confidential FHE coprocessor—keeping state public.
Encrypted data stays hidden
02. Technology
FHE16
A 16-bit integer computation–centric deterministic FHE structure eliminating floating-point operations and ensuring identical results regardless of the execution environment
- Elimination of floating-point operations, ensuring identical results regardless of execution environments
- Elimination of floating-point environment-specific error issues
- Ultra-fast 2.89 ms bootstrapping through GINX gate optimization (suitable for real-time and low-latency applications)
waLLLnut's Property is,
- Each private state is deterministically encrypted under FHE16 and recorded on-chain.
- Any state change can be verified by all network participants.
- State disclosure is propagated via a Threshold Decryption protocol.
Launch of SVM-based Confidential Layer module
LatticA
The Solana-native confidential computing that makes encrypted data computable and verifiable anywhere.
Launch of EVM-based Confidential Layer module
04. Team
We are pioneering
Fully Homomorphic Encryption(FHE)
for decentralized, secure, and verifiable computation.