Fully homomorphic biometric matching. Templates are encrypted client-side, stored encrypted, and matched in the encrypted domain. 50µs per authentication. The server literally cannot see your face, fingerprint, or voice.
From capture to match decision, your biometric template never exists as plaintext on the server. Every step is cryptographically protected.
Every traditional biometric system has the same fundamental flaw: the server must decrypt your data to match it. That window of exposure is a window of vulnerability.
FHE means the server provably never sees the biometric. There is no plaintext to steal, no decryption window to exploit, and no raw biometric data to regulate — because it never exists on the server.
Encrypted biometric matching at speeds that make plaintext systems look slow. Measured on AWS Graviton4 with 96 workers.
Four endpoints. Encrypt, match, attest. All operating on ciphertexts — the server never touches plaintext biometrics.
# Match an encrypted biometric probe against stored template curl -X POST https://api.h33.ai/v1/fhe/h33-128/biometric-match \ -H "Authorization: Bearer h33_sk_..." \ -H "Content-Type: application/json" \ -d '{ "probe_ciphertext": "<base64-encoded FHE ciphertext>", "template_id": "usr_8f2a...c41b", "threshold": 0.85 }' # Response { "match": true, "confidence": "above_threshold", "latency_us": 48, "batch_id": "batch_a9f3...e712", "plaintext_exposed": false, "fhe_params": { "scheme": "BFV", "n": 4096, "t": 65537, "batch_size": 32 } }
Also available on H33-256 (/v1/fhe/h33-256/*) for NIST Level 5 security.
Not just "encrypted in transit" or "encrypted at rest." Encrypted during computation. Provably.
Any application handling biometric data can eliminate its highest-risk liability with a single API integration.
Your model extracts the embedding. H33 encrypts and matches it. Pre-built adapters for popular open-source models, plus a generic adapter for any model producing float vectors.
21 attack types detected. Liveness checks run before FHE matching — spoofs never waste compute. Challenge-response verification with configurable risk levels.
If liveness fails, the FHE verification is never executed. Zero compute wasted on attack attempts. Configurable risk levels (low/medium/high) control challenge difficulty.
FHE biometrics satisfy the strictest biometric privacy laws by mathematical guarantee, not by policy promise. The server provably cannot access the biometric data it processes.
unenroll() API with Dilithium-signed deletion receipt. H33 as service provider stores only BFV ciphertexts.One API call. Zero biometric exposure. Post-quantum secure. Drop-in integration with any biometric pipeline.