Programmable
Privacy for the EVM
Use Zama's fhEVM to enable confidential smart contracts in your blockchain, unlocking new use cases in DeFi, gaming and more!








Zama's fhEVM enables confidential smart contracts using fully homomorphic encryption (FHE).
On-chain data is public by design, making it hard to build dapps that require confidentiality. Zama's fhEVM, the first private smart contract protocol using fully homomorphic encryption (FHE), enables transaction data and on-chain state to remain encrypted end-to-end, even during processing.
.png)
E2E encryption of transactions and state

Composability & data availability on-chain
.png)
No impact on existing dapps and state
Unlock a myriad of new use cases, for consumers, businesses and regulated industries.

Tokenization
Swap tokens and RWAs on-chain without others seeing the amounts.

Blind auctions
Bid on items without revealing the amount or the winner.

On-chain games
Keep moves, selections, cards, or items hidden until ready to reveal.

Confidential voting
Prevents bribery and blackmailing by keeping votes private.

Encrypted DIDs
Store identities on-chain and generate attestations without ZK.

Private transfers
Keep balances and amounts private, without using mixers.
Got a use case in mind? Contact us.
Build confidential dapps just as you would regular ones.
Solidity Integration
FhEVM contracts are simple solidity contracts that are built using traditional solidity toolchains.
Simple DevX
Developers can use the euint data types to mark which part of their contracts should be private.
Programmable Privacy
All the logic for access control of encrypted states is defined by developers in their smart contracts.
Powerful features available out of the box.
High precision encrypted integers
Up to 256 bits of precision for integers
Full range of encrypted operators
All operators available: +,-,*,/,<,>,==,...
Encrypted If-Else conditionals
Check conditions on encrypted states
On-chain PRNG
Generate randomness without using oracles
Configurable decryption
Threshold, centralized or KMS decryption
Unbounded compute depth
Unlimited consecutive FHE operations
Operational versatility by design.

Consensus:
■ Proof of Stake (permissionless)
■ Proof of Authority (permissioned)
Deployment:
■ L1, L2 or L3 public or enterprise chain
■ App chain
■ ZK-fraud-proof rollup (coming 2024)
Decryption:
■ PoS or PoA threshold decryption
■ KMS or HSM based centralized decryption
Zama's fhEVM combines state of the art cryptography to achieve unprecedented levels of privacy and security.

FHE
Fully homomorphic encryption is used to compute on private state, directly on-chain.
+

MPC
Multi-party computation is used for threshold decryption of FHE ciphertexts.
+

ZK
Zero-knowledge proofs are used to ensure encryption and decryption integrity.
Read more with our paper: Practical and Efficient FHE-based MPC
More resources.
Read our latest articles and learn with our developer tutorials and presentations.