Compute on Encrypted Floats.
ML Without Decryption.
CKKS approximate arithmetic over encrypted floating-point vectors. Dot products, similarity search, bootstrapping — all on data that never leaves ciphertext. N=8192 turbo mode with auto depth management.
Full Encrypted Arithmetic
Every operation runs entirely on ciphertext. The server never sees your data — not the inputs, not the intermediates, not the results.
Turbo → Standard Auto-Switch
CKKS turbo mode (N=8192) delivers fast operations for shallow circuits. When depth is exhausted, the bridge transparently transitions to standard parameters (N=16384) for deeper computation — zero application code changes.
ckks_bridge.rs handles the parameter transition. Your application code stays identical.Three Tiers of Cryptographic Trust
Start with raw CKKS computation. Layer Dilithium signatures for post-quantum attestation. Add H33-3-Key for full triple-layer verification.
CKKS Endpoints
Example Request
curl -X POST https://api.h33.ai/v1/fhe/h33-ckks/encrypt \ -H "Authorization: Bearer $H33_API_KEY" \ -H "Content-Type: application/json" \ -d '{ "public_key_id": "pk_ckks_...", "values": [0.123, -0.456, 0.789, 1.234], "mode": "turbo" }'
CKKS + Dilithium Endpoints
Example Request
curl -X POST https://api.h33.ai/v1/fhe/h33-ckks/inner-product \ -H "Authorization: Bearer $H33_API_KEY" \ -H "Content-Type: application/json" \ -d '{ "ciphertext_a": "ct_ckks_...", "ciphertext_b": "ct_ckks_...", "dilithium_key_id": "dk_...", "sign_result": true }'
dilithium_signature field in the response, attesting that the computation was performed correctly.CKKS + H33-3-Key Endpoints
Example Request
curl -X POST https://api.h33.ai/v1/fhe/h33-ckks/similarity \ -H "Authorization: Bearer $H33_API_KEY" \ -H "Content-Type: application/json" \ -d '{ "query_ct": "ct_ckks_...", "candidates": ["ct_ckks_...", "ct_ckks_..."], "three_key_id": "3k_...", "full_attestation": true }'
CKKS Noise Management on Autopilot
CKKS is powerful but fragile — precision degrades with every multiplication. Noise Pilot manages rescaling, level tracking, and bootstrap scheduling automatically so your encrypted floats stay accurate.
Built for Real-World Encrypted Computation
From healthcare to finance, CKKS enables computation on the most sensitive floating-point data without ever exposing it.
Encrypted Activation Functions
Evaluate sigmoid, ReLU, tanh, and GELU directly on CKKS ciphertexts. Chebyshev polynomial approximation with automatic degree selection — no plaintext exposure, no manual polynomial tuning.
| Function | Degree Range | Levels Consumed |
|---|---|---|
| Sigmoid | 7 – 15 | 3 – 4 |
| ReLU | 5 – 13 | 3 – 4 |
| Tanh | 7 – 15 | 3 – 4 |
| GELU | 9 – 19 | 4 – 5 |
H33-CKKS vs. the Field
How H33-CKKS compares to Microsoft SEAL, OpenFHE, and Zama Concrete on the features that matter for production CKKS workloads.
| Feature | H33-CKKS | MS SEAL CKKS | OpenFHE CKKS | Zama Concrete |
|---|---|---|---|---|
| Language | Rust (native) | C++ | C++ | Rust/Python |
| Turbo mode (N=8192) | Yes (auto-switch) | Manual only | Manual only | No |
| Bootstrapping | Built-in, auto | Manual setup | Manual setup | Compiler-driven |
| ML inference support | Native dot product | Manual encoding | Manual encoding | Via Concrete-ML |
| Post-quantum attestation | ML-DSA-65 | None | None | None |
| ZKP integration | Built-in STARK | None | None | None |
| API model | One REST call | Library | Library | Compiler |
| Noise management | Automatic | Manual | Manual | Automatic |
| ARM NEON optimized | Yes (Graviton4) | x86 only | x86 focus | x86 focus |
| Encrypted activations | Sigmoid, ReLU, tanh, GELU | Manual polynomial | Manual polynomial | Compiler-generated |
Frequently Asked Questions
Common questions about CKKS, turbo mode, noise management, and encrypted ML inference.
What is CKKS and how does it differ from BFV?
What does “turbo mode” mean?
What precision does CKKS provide?
How does CKKS handle noise growth?
Can I run ML models on encrypted data?
What is the latency for an encrypted dot product?
Is CKKS post-quantum secure?
Can I mix CKKS and BFV operations?
What vector sizes does CKKS support?
How do I choose between CKKS and BFV?
Go Deeper
Start Building With H33-CKKS
Encrypted float arithmetic. ML inference on ciphertext. Post-quantum attestation. One API.