Dhanushka Rumesh | M☉NAD pfp
Dhanushka Rumesh | M☉NAD

@dhanushka

Here’s what that looks like: Let’s say you encrypt the numbers 3 and 2. Using the public key, you generate two encrypted blobs. The evaluation key lets the network compute on those blobs directly; in this case, adding them to produce an encrypted version of 5. The private key can then decrypt that final result. At no point were 3 or 2 ever revealed. Only the final 5 , if you choose to reveal it. Explore Zama FHE docs: https://docs.zama.ai
0 reply
0 recast
0 reaction