Jonykien95 (vukien95)

Jonykien95

Holder for $ETH, $SOL $Near ... NFT Channel development & content creation && Esoteric studies

25 Followers

Recent casts

I would like to introduce the Zama Protocol, a pioneering platform that combines Fully Homomorphic Encryption (FHE) with blockchain technology. To ensure security, transparency, and high performance, the Zama Protocol uses the Delegated Proof of Stake (DPoS) mechanism. In the initial phase, the Zama network is operated by 18 operators, including 13 KMS nodes responsible for managing security keys, and 5 FHE coprocessors in charge of encrypted computation tasks. I would like to update the first five projects through a video, there are 13 operators left that Zama will announce soon, and I’ll make a video about it ! @zama #ZamaCreatorProgram

  • 0 replies
  • 0 recasts
  • 0 reactions

I’ve added music to my video @zama #ZamaCreatorProgram Thank all watching my video

  • 0 replies
  • 0 recasts
  • 0 reactions

I would like to request permission to use a video segment from Rand Hindi to create a piece supporting the video content creation movement. Through this video, I aim to share a positive message with everyone ,whether they are already familiar with Zama’s FHE or learning about it for the first time ,to help raise awareness of the importance of FHE in the future and to recognize the relentless efforts of the Zama team in integrating FHE technology into AI and on-chain applications. Today, FHE has already demonstrated remarkable potential in practical use cases. Zama continues to innovate and optimize FHE’s performance over time, bringing this transformative technology ever closer to becoming an essential part of everyday reality. @zama #ZamaCreatorProgram

  • 4 replies
  • 2 recasts
  • 5 reactions

Top casts

I would like to request permission to use a video segment from Rand Hindi to create a piece supporting the video content creation movement. Through this video, I aim to share a positive message with everyone ,whether they are already familiar with Zama’s FHE or learning about it for the first time ,to help raise awareness of the importance of FHE in the future and to recognize the relentless efforts of the Zama team in integrating FHE technology into AI and on-chain applications. Today, FHE has already demonstrated remarkable potential in practical use cases. Zama continues to innovate and optimize FHE’s performance over time, bringing this transformative technology ever closer to becoming an essential part of everyday reality. @zama #ZamaCreatorProgram

  • 4 replies
  • 2 recasts
  • 5 reactions

Homomorphic Encryption (HE) is an encryption technique that allows computations to be performed directly on encrypted data without decryption, thereby protecting the privacy of information. The idea was first proposed by Rivest, Adleman, and Dertouzos in 1978, but it was not until 2009 that Craig Gentry successfully built the first feasible Fully Homomorphic Encryption (FHE) scheme. HE is divided into three main types: PHE (supporting a single operation), SWHE (supporting both addition and multiplication with limitations), and FHE (supporting unlimited operations). The strength of FHE lies in its ability to process sensitive data while ensuring security, especially in fields such as healthcare, finance, and artificial intelligence. Early applications of FHE demonstrate its great potential in cloud computing and data security, paving the way for widespread adoption in the future. @zama #ZamaCreatorProgram More detailed : https://x.com/kien36666/status/1962952170913071310

  • 0 replies
  • 0 recasts
  • 4 reactions

🎸 The Data Guitar: Where Zama Composes the Symphony of Privacy How Fully Homomorphic Encryption Turns Data Protection into an Art Form In the digital world, data is like music. Each click, message, and transaction forms a note in the symphony of our online lives. But just as a song needs protection from distortion to retain its beauty, our data needs shielding from exposure to remain secure. This is where Zama steps in—like a skilled musician tuning a guitar—to bring harmony to the world of data privacy. 🎼 The Problem: Today’s Data Sounds Out of Tune Most of the time, encrypted data is like a guitar locked in a case: safe, but unusable. Whenever we need to process that data—whether in an AI model, a finance app, or a smart contract—we have to “open the case,” decrypting the information and exposing it to risk. That’s the weak point where hackers strike, companies misuse info, and users lose control. @zama #ZamaCreatorProgram ! Still below 👇

  • 0 replies
  • 0 recasts
  • 4 reactions

Chapter 1: Fundamentals (Journey with FHE) @zama 1 - Core Concepts To begin, it’s important to understand the difference between classical encryption and FHE. Traditional schemes like AES and RSA ensure that data is secure while being stored or transmitted. However, whenever computations are required, the data must first be decrypted, which introduces the risk of leakage. In contrast, FHE allows us to perform computations directly on encrypted data, and once decrypted, the result is exactly the same as if the computation had been performed on the raw data. This is the breakthrough that sets FHE apart from classical encryption. At the heart of this idea lies Homomorphic Encryption (HE) – a special type of encryption that preserves an algebraic structure between plaintexts and ciphertexts. In simple terms, an operation carried out on ciphertexts corresponds directly to the same operation on the original data after decryption #ZamaCreatorProgram HE ?

  • 0 replies
  • 0 recasts
  • 3 reactions

Onchain profile

Ethereum addresses