BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key

Every mortgage closing, insurance claim, and government contract shares the same vulnerability.

The sensitive fields inside those documents — SSNs, bank accounts, medical records — sit in plaintext databases, protected by nothing more than access controls and audit logs. When a breach happens, the data is already in the clear.

We built H33-Vault to fix this — without touching your database, without changing your workflow, without a migration.

See How It Works

H33-Vault is a joint product from H33.ai and Cachee.ai that brings real cryptography to document validation pipelines.

Not checkbox compliance. Mathematical guarantees.

Here’s what happens when an operator reviews a document in H33-Vault.

Step 1
FHE Field Encryption
Every sensitive field — SSN, bank account, DOB, medical record — is FHE-encrypted at extraction. The plaintext value never touches a database, never enters a log, never appears in a cache key.
Every sensitive field — SSN, bank account, DOB, medical record — is FHE-encrypted at extraction. The plaintext value never touches a database, never enters a log, never appears in a cache key.
Step 2
Cryptographic Proof Per Decision
Every validation decision generates a SHA3-256 commitment proof with a Fiat-Shamir challenge — cryptographically binding the operator, the document, the field, and the decision into a single non-interactive proof. No trusted setup. No external ceremony. Under 5 microseconds.
Every validation decision generates a SHA3-256 commitment proof with a Fiat-Shamir challenge — cryptographically binding the operator, the document, the field, and the decision into a single non-interactive proof. No trusted setup. No external ceremony. Under 5 microseconds.
Step 3
Encrypted Operator Monitoring
Operator behavior is monitored with FHE-encrypted velocity counters. The system tracks validations per hour, SSN views per hour, and edit rates without ever decrypting the actual count. Even we can’t see the number without an explicit admin decryption step.
Operator behavior is monitored with FHE-encrypted velocity counters. The system tracks validations per hour, SSN views per hour, and edit rates without ever decrypting the actual count. Even we can’t see the number without an explicit admin decryption step.
Step 4
Post-Quantum Finalization
Document finalization computes a SHA3-256 Merkle root over all field hashes and signs the entire package with CRYSTALS-Dilithium ML-DSA-65, NIST FIPS 204 — a post-quantum signature that no future computer can forge.
Document finalization computes a SHA3-256 Merkle root over all field hashes and signs the entire package with CRYSTALS-Dilithium ML-DSA-65, NIST FIPS 204 — a post-quantum signature that no future computer can forge.
Step 5
Biometric Step-Up for Critical Fields
Critical fields require biometric step-up authentication within a 15-minute freshness window. The decrypted value displays in a vault overlay that auto-hides after 30 seconds.
Critical fields require biometric step-up authentication within a 15-minute freshness window. The decrypted value displays in a vault overlay that auto-hides after 30 seconds.

The speed layer matters as much as the trust layer.

Cachee.ai provides the speed infrastructure underneath H33-Vault. Field retrieval under 15 milliseconds. L1 in-process DashMap overlay with a 5-second TTL, backed by a Redis-protocol L2 layer. 99.9% cache hit rate at steady state.

For a 500-person operations floor processing mortgage documents, that sub-15ms retrieval eliminates the 15-second field load times that plague legacy systems. At 8 hours per operator per day, that is 125 hours per day returned to productive work.

125 hours/day
returned to productive work on a 500-person operations floor

The entire cryptographic pipeline — commitment, proof, verification, velocity counter increment — completes before the operator’s finger lifts off the mouse button.

Same pipeline. Same database. Different payload.

Before
Document ingested
Fields extracted (SSN, DOB, account #)
Plaintext written to database
Access control = only protection
Breach exposes everything
Data is in the clear.
After — H33-Vault
FHE Field Encrypt (BFV-64)
SHA3-256 Commitment Proof
FHE Velocity Counter Increment
Cachee Field Cache Write
Dilithium Sign + Verify (ML-DSA-65)
Total: —
Your database didn’t change. What it receives did.
Live Pipeline
Mortgage and Title
Mortgage 1003, closing packages
Quantum harvest attacks on SSN and account data in multi-decade documents.
No RSA. No ECDSA.
Insurance Claims
Medical claims, liability assessments
HIPAA compliance as a mathematical property, not a policy document.
No RSA. No ECDSA.
Government Contracts
SF-86, DD-214, federal procurement
FIPS 204 mandated by 2027. Not optional.
No RSA. No ECDSA.
Healthcare Intake
Patient records, consent forms
Sensitive field encryption by cryptographic design, not database policy.
No RSA. No ECDSA.

The more you seal, the less each one costs.

H33-Vault-0
50 units per document
Dilithium signature + SHA3 commitment chain on every field. Full audit log. No FHE.
Small$3.00
Mid-market$1.25
Enterprise$0.30
H33-Vault-1
100 units per document
Vault-0 + BFV FHE encryption on all High and Critical fields. Encrypted velocity counters.
Small$6.00
Mid-market$2.50
Enterprise$0.60
H33-Vault-2
200 units per document
Vault-1 + ZKP proofs on every validation event. Blockchain attestation of the finalized document hash.
Small$12.00
Mid-market$5.00
Enterprise$1.20
H33-Vault-3
300 units per document
Vault-2 + TEE secure display, biometric step-up, 3-of-5 threshold decryption, ZK-compressed audit trail.
Small$18.00
Mid-market$7.50
Enterprise$1.80
2,500 docs/mo
Monthly Spend
$12,500
Per Document
$5.00
Annual
$150,000
H33-VaultDocuSignBlend
Per-document (mid-market)$5.00$8–25$15–40
Post-quantum signaturesDilithium (FIPS 204)
FHE field encryptionBFV lattice
ZKP validation proofsSHA3-256 Fiat-Shamir
Blockchain attestationSolana on-chain

No RSA. No ECDSA. No plaintext audit logs pretending to be security.

Pure H33 stack: BFV FHE + SHA3-256 proofs + Dilithium signatures + Cachee speed.

Also from H33

Sealed Documents. Shared Intelligence.

H33-Vault seals your documents. H33-Share lets banks do what they’ve always wished they could — share fraud intelligence across institutions — without violating a single regulation. Each bank defines its own data parameters and categories. Nothing leaves your perimeter unencrypted. Fully customizable. Legal. Private. Instant.

$0.12
per query at scale
Full FHE + Kyber + Dilithium + DP
0 units
to submit signals
Free ingest drives network effects
$10-12B
preventable fraud/year
Cross-institution sharing catches 3X more
Explore H33-Share Read the Deep Dive
Use Cases

Built for the Hardest Security Problems

Enterprise Key Management
Centralized vault for FHE keys, ZKP proofs, and Dilithium signing keys. Role-based access with threshold decryption. Automatic key rotation on configurable schedules.
Multi-Cloud Secrets
Store and retrieve encrypted secrets across AWS, GCP, and Azure. H33-Vault's field-level FHE encryption means cloud providers never see plaintext. Single API for all clouds.
Compliance Vault
SOC 2, HIPAA, PCI DSS compliant secret storage. Every access logged with Dilithium-signed audit trail. ZKP-verified access policies without exposing the policies themselves.
CI/CD Secret Injection
Inject encrypted secrets into deployment pipelines. Secrets are decrypted only inside the build environment. Threshold policies require multiple approvers for production secrets.
Comparison

How H33-Vault Compares

Feature H33-Vault HashiCorp Vault AWS Secrets Manager Azure Key Vault 1Password Business
Encryption FHE field-level AES-256 at rest AES-256 at rest AES-256 at rest AES-256
Post-quantum ML-KEM + ML-DSA No No No No
Zero-knowledge access ZKP-verified No IAM policies RBAC No
Audit trail Dilithium-signed Unsigned logs CloudTrail Activity logs Event logs
Threshold decryption Built-in (k-of-n) Shamir unseal No No No
Field-level encryption Native No No No No
Vendor lock-in None (REST API) OSS / Enterprise AWS only Azure only SaaS
Key rotation Automatic + ZKP Manual / Auto Automatic Automatic Manual

Frequently Asked Questions

How is H33-Vault different from DocuSign or Adobe Sign?
DocuSign and Adobe Sign validate who signed a document. H33-Vault validates what's inside it. Every field is encrypted with BFV fully homomorphic encryption, hashed with SHA3-256, and signed with Dilithium post-quantum signatures. Traditional e-signature platforms use RSA or ECDSA, which quantum computers will break. Vault's entire chain is post-quantum secure from day one.
How does fully homomorphic encryption apply to documents?
BFV-64 FHE lets H33-Vault validate encrypted fields without ever decrypting them. A compliance check can confirm that a salary field falls within a range, or that a date is before a deadline, all while the actual values remain encrypted. The server never sees plaintext data at any point during validation.
What do SHA3-256 proofs actually prove?
Each document field gets a SHA3-256 commitment hash at validation time. These proofs create a tamper-evident chain: if anyone modifies a single byte in any field after validation, the hash breaks and the document fails re-verification. SHA3-256 is NIST-approved and resistant to both classical and quantum collision attacks.
What does blockchain attestation add at Vault-2 and above?
Vault-2 anchors a Merkle root of all document proofs to a public blockchain. This gives you an immutable, third-party timestamp that proves the document existed in its validated state at a specific moment. It's useful for regulatory disputes, legal holds, and audit evidence where you need proof that isn't controlled by any single party.
Can H33-Vault handle PDFs, images, and scanned documents?
Yes. Vault accepts PDFs, PNG, JPEG, TIFF, and common office formats. For scanned documents, structured field extraction identifies and encrypts individual data fields before validation. The cryptographic proofs attach to the extracted field values, not the raw pixel data.
How fast is document validation?
A single document completes full validation in approximately 1.3ms, including FHE field encryption, SHA3-256 proof generation, and Dilithium signing. Vault-0 (Dilithium + SHA3 only) is faster since it skips FHE. Vault-3 adds TEE and biometric steps but stays under 5ms for most documents.
Is H33-Vault compliant with SOC 2 and HIPAA?
H33-Vault is built to satisfy SOC 2 (In Progress) controls for data integrity and confidentiality, and HIPAA technical safeguard requirements under §164.312. Dilithium-signed audit trails provide non-repudiation for every validation event. Compliance documentation and BAA execution are available for enterprise accounts.
How do I integrate H33-Vault into my application?
Vault exposes a REST API. Send a POST /v1/vault/validate request with your document payload and tier selection. The response includes encrypted field commitments, the Dilithium signature, and a verification receipt. SDKs are available for Python, Node.js, Go, and Rust. Most integrations take under an hour.
What happens if H33 goes down? Can I still verify documents?
Every validated document comes with a self-contained verification receipt that includes the SHA3-256 proof chain and the Dilithium public key. You can verify document integrity offline using the open-source h33-verify CLI tool or any Dilithium-compatible library. No network call to H33 is required for re-verification.
Can I self-host H33-Vault?
Yes. Vault is available as a Docker container or a Kubernetes Helm chart for on-premises deployment. Self-hosted instances include the full cryptographic pipeline (BFV, SHA3, Dilithium) and run entirely air-gapped if needed. Licensing is per-node with an annual subscription.
What makes H33-Vault post-quantum secure?
Every cryptographic primitive in the stack is lattice-based or hash-based. Key encapsulation uses Kyber-1024 (ML-KEM), signatures use Dilithium ML-DSA-65, proofs use SHA3-256, and field encryption uses BFV with a lattice hardness parameter. None of these rely on RSA or elliptic curves, which Shor's algorithm will break.
Is there a free tier?
Vault-0 starts at 50 credits per document and includes Dilithium signatures and SHA3-256 proofs. New accounts receive a trial credit balance to test the API. Volume pricing drops the per-document cost significantly, starting at $0.30/doc for Vault-0 at the highest volume tier.
Can I verify documents offline?
Yes. Every validation receipt is self-contained with the full SHA3-256 proof chain and Dilithium signature. The h33-verify CLI tool performs offline verification against the embedded proofs without contacting any server. This is critical for air-gapped environments and legal proceedings where network access isn't available.
What is threshold validation in Vault-3?
Threshold validation requires k-of-n designated parties to independently approve a document before it's considered valid. Each party signs with their own Dilithium key, and the document only passes when the configured threshold is met. This prevents single-point-of-failure approvals for high-value contracts, regulatory filings, or multi-party agreements.
Can I validate documents in batch?
Yes. The POST /v1/vault/validate-batch endpoint accepts up to 100 documents per request. Batch processing shares a single Dilithium signing context across the set, which reduces per-document overhead. A 100-document batch at Vault-1 typically completes in under 80ms total.