Benchmarks Stack Ranking H33 FHE H33 ZK APIs Pricing PQC Docs Blog About
Compliance GDPR · 16 min read

GDPR Article 9 and FHE Biometrics:
Privacy by Design, Not by Promise

The GDPR classifies biometric data as a "special category" under Article 9 — the most protected class of personal data in European law. Every biometric vendor promises compliance. H33 enforces it with mathematics. Fully Homomorphic Encryption means the processor never accesses plaintext biometric data. This is not a policy. It is a cryptographic invariant.

Art. 9
Special Category
0
Plaintext Exposed
PQ
Post-Quantum Secure
Art. 25
Privacy by Design
BFV lattice-based FHE · N=4096, single 56-bit modulus · ~50µs per auth · 1.2M auth/sec (Graviton4)

Why GDPR Article 9 Is Different

Most personal data falls under the general processing rules of GDPR Articles 5 and 6. Biometric data does not. Article 9(1) explicitly prohibits the processing of "biometric data for the purpose of uniquely identifying a natural person" unless one of ten narrowly defined exceptions applies. This is not a graduated risk framework — it is a categorical prohibition with enumerated derogations.

Article 9(1) — The Prohibition

"Processing of [...] biometric data for the purpose of uniquely identifying a natural person [...] shall be prohibited." — GDPR Article 9(1). This is not a suggestion. It is a default prohibition. Every biometric deployment must affirmatively satisfy one of the Article 9(2) exceptions or face enforcement action under Article 83(5) — fines up to EUR 20 million or 4% of global annual turnover, whichever is higher.

The practical consequence: any organization deploying biometric authentication in the EU must navigate not just Article 9 but a web of supporting obligations — explicit consent (Art. 9(2)(a)), privacy by design (Art. 25), security of processing (Art. 32), and a mandatory Data Protection Impact Assessment (Art. 35). Traditional biometric systems treat these as compliance checkboxes. H33's architecture treats them as engineering constraints.

The Core Question: Does FHE Processing Constitute "Processing of Biometric Data"?

This is the central legal-technical question. Article 9(1) prohibits "processing of biometric data." H33 processes only BFV ciphertexts — lattice-based encrypted representations from which the underlying biometric template cannot be recovered without the decryption key. The processor (H33) never holds the decryption key. The controller (the customer) holds the key or delegates it to a threshold scheme.

The FHE Argument

Under BFV fully homomorphic encryption, the data processed by H33 is a vector of polynomial coefficients over Zq. No algorithm — classical or quantum — can extract the plaintext biometric template from these coefficients without the secret key. If the processor cannot access the personal data, the argument is that the processor is not "processing biometric data" within the meaning of Article 9(1). This position is supported by Recital 26, which states that the principles of data protection "should not apply to anonymous information, namely information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable."

This argument is strong but not settled law. The EDPB (European Data Protection Board) has not issued definitive guidance on FHE-processed biometric data. H33's compliance framework therefore satisfies Article 9(2) requirements regardless of how this question is ultimately resolved — belt and suspenders.

Article 9(2)(a): Explicit Consent

The most common lawful basis for biometric processing is explicit consent under Article 9(2)(a): the data subject has given "explicit consent to the processing of those personal data for one or more specified purposes." This is a higher bar than the ordinary consent required under Article 6(1)(a). "Explicit" means unambiguous, specific, informed, and freely given — with a clear affirmative act.

H33 enforces consent architecturally. The SDK integration requires customers to implement consent flows before biometric enrollment can proceed. The API rejects enrollment requests that do not include a valid consent token.

Shell · curl POST /biometric/enroll
curl -X POST https://api.h33.ai/v1/biometric/enroll \
  -H "Authorization: Bearer $H33_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "user_id": "user_8xKf...",
    "template": "base64_encrypted_bfv_ciphertext",
    "consent_token": "cst_v1_signed_...",
    "consent_purpose": "biometric_authentication",
    "consent_timestamp": "2026-02-23T14:30:00Z"
  }'

// Response
{
  "enrolled": true,
  "consent_verified": true,
  "consent_hash": "sha3_256:a1b2c3...",
  "template_format": "BFV_N4096_Q56",
  "plaintext_exposure": "none"
}

The consent_token is a signed JWT generated client-side after the user completes an explicit consent flow. H33 verifies the token signature and records the consent hash on-chain for auditability. If the token is missing, expired, or invalid, the enrollment request is rejected with HTTP 422 and a machine-readable error code.

Customer Responsibility

H33 provides the consent verification infrastructure, but the consent UX is the customer's responsibility. GDPR Article 7 requires that consent be as easy to withdraw as to give. Customers must implement a consent withdrawal mechanism and call DELETE /biometric/consent/{user_id} when a user revokes consent. H33 will cryptographically shred the enrolled template within 72 hours of revocation.

Article 25: Data Protection by Design and by Default

Article 25 requires controllers to implement "appropriate technical and organisational measures [...] designed to implement data-protection principles [...] in an effective manner." The article specifically calls out data minimisation and pseudonymisation as examples. FHE goes further than either.

Traditional "Privacy by Design" vs. Cryptographic Privacy by Design

Most biometric vendors claim "privacy by design" through policy controls: access management, logging, encryption at rest, encryption in transit. These are necessary but not sufficient. They protect data from external attackers, not from the processor itself. A rogue employee, a compromised server, or a law enforcement subpoena can still expose plaintext biometric templates.

Attack Surface Traditional Biometric H33 FHE Approach
Data at rest AES-256 encrypted — decryptable by server admin BFV ciphertext — server has no decryption key
Data in transit TLS 1.3 — plaintext in server memory after termination Kyber+TLS — data arrives already FHE-encrypted
Data in use (matching) Plaintext comparison in secure enclave or server RAM Inner product on ciphertexts — zero plaintext
Insider threat Admin can dump plaintext templates from DB or RAM Admin sees only polynomial coefficients mod q
Subpoena / legal compulsion Server can be compelled to decrypt and produce templates Server cannot decrypt — key held by controller
Database breach Encrypted templates + server key — full exposure Ciphertexts without key — computationally useless
Harvest-now-decrypt-later RSA/ECC keys broken by quantum — retroactive exposure Lattice-based BFV — post-quantum secure

The distinction is structural. Traditional encryption protects data from unauthorized parties. FHE protects data from all parties including the processor. This is not a policy promise — it is a mathematical property of the BFV lattice scheme. The security reduction goes to the Module Learning With Errors problem, which is believed to be hard for both classical and quantum computers.

Article 25 Compliance Summary

By design: BFV FHE ensures the processor never accesses plaintext biometric data. The cryptographic scheme enforces data minimisation at the mathematical level — the processor operates on encrypted data and returns encrypted results.

By default: The H33 API does not offer a "plaintext mode." All biometric processing is FHE-only. There is no configuration that exposes plaintext templates. The most privacy-protective setting is the only setting.

Article 32: Security of Processing

Article 32 requires "appropriate technical and organisational measures to ensure a level of security appropriate to the risk," explicitly listing pseudonymisation, encryption, confidentiality, integrity, and availability as relevant measures. H33's stack exceeds every listed requirement.

The Full Security Stack

H33 Article 32 Security Measures

Pseudonymisation (Art. 32(1)(a))

All biometric data exists exclusively in the encrypted domain. The BFV ciphertext is a pseudonymised representation that cannot be reversed without the controller's secret key. This exceeds pseudonymisation — it is functional encryption.

Encryption (Art. 32(1)(a))

Triple-layer encryption: BFV FHE for computation, Kyber-768 (ML-KEM) for key transport, AES-256-GCM for symmetric payloads. All three are post-quantum secure or quantum-resistant.

Confidentiality (Art. 32(1)(b))

FHE ensures confidentiality against the processor itself. Dilithium-5 (ML-DSA-87) attestation signatures provide non-repudiation. Threshold decryption prevents single-point key compromise.

Integrity (Art. 32(1)(b))

SHA3-256 digests on every ciphertext. Dilithium attestation binds each authentication result to a specific ciphertext input. STARK lookup proofs verify computation correctness.

Post-Quantum Guarantee

Article 32 requires security "appropriate to the risk." For biometric data that cannot be revoked (you cannot change your fingerprint), the risk horizon extends decades. A biometric template stolen today and stored by an adversary must remain protected when large-scale quantum computers become available.

H33's entire stack is post-quantum secure:

Why Post-Quantum Matters for GDPR

Biometric data is irrevocable. If a fingerprint template encrypted with RSA-2048 is exfiltrated today and stored, a quantum computer in 2035 can decrypt it. The data subject cannot change their fingerprint. Under Article 32, the controller's risk assessment must account for the full lifetime of the data — not just the current threat landscape. Post-quantum encryption is not a luxury for biometric data. It is a necessity for Article 32 compliance with a forward-looking risk assessment.

GDPR Data Flow: Controller, Processor, Sub-processor

GDPR assigns distinct obligations to controllers (who determine purposes and means), processors (who process on behalf of controllers), and sub-processors (processors engaged by a processor). H33's architecture maps cleanly onto these roles.

CONTROLLER
(Customer)
Data Controller — Your Organization
Determines the purpose and means of biometric processing. Collects consent from the data subject. Holds the FHE decryption key (or threshold shares). Encrypts the biometric template client-side before sending to H33. Only party that can access plaintext biometric data.
Art. 24 obligations Holds FHE secret key Consent management DPIA responsibility
↓ BFV ciphertext (encrypted biometric) via Kyber+TLS
PROCESSOR
(H33)
Data Processor — H33 Infrastructure
Receives only BFV ciphertexts. Performs homomorphic inner-product matching on encrypted data. Returns encrypted match result + Dilithium attestation + STARK proof. Cannot decrypt any biometric data at any point. No access to plaintext templates, match scores, or biometric features.
Art. 28 DPA required No decryption key FHE compute only ~50µs per auth
↓ Encrypted result + attestation + ZK proof
SUB-PROC
(Infra)
Sub-processor — Cloud Infrastructure (AWS)
Hosts the compute infrastructure. Sees only encrypted network traffic. Has no access to FHE ciphertexts in application memory (memory isolation). Standard sub-processor DPA with AWS covers infrastructure-level processing.
Art. 28(2) sub-processor No application data access AWS DPA in place

The critical property: at no point in this flow does any party other than the controller have access to plaintext biometric data. H33 (the processor) performs computation on ciphertexts. AWS (the sub-processor) transports encrypted network packets. The data subject's biometric template exists in plaintext only on the data subject's device and in the controller's key-holding infrastructure.

Article 35: Data Protection Impact Assessment

Article 35(1) requires a DPIA when processing is "likely to result in a high risk to the rights and freedoms of natural persons." Article 35(3)(b) explicitly requires a DPIA for "processing on a large scale of special categories of data referred to in Article 9(1)." Biometric authentication at scale triggers this requirement in every case.

The following template is designed for customers deploying H33 biometric authentication. It covers the required elements of Article 35(7) and can be submitted directly to your Data Protection Officer or supervisory authority.

DPIA Template — H33 FHE Biometric Authentication

Section 1: Description of Processing

Section 2: Necessity and Proportionality

Section 3: Risk Assessment

Section 4: Measures to Address Risks


Attack Surface Comparison

The following table compares the attack surface of a traditional biometric system (server-side template matching with encryption at rest) versus H33's FHE approach. Each row represents a specific threat vector and the architectural response.

Threat Vector Traditional System H33 FHE System GDPR Article
Template extraction from DB Decrypt with server key → full plaintext No key on server → ciphertext only Art. 32(1)(a)
Memory dump during matching Plaintext in RAM during comparison FHE ops on ciphertext → zero plaintext in RAM Art. 32(1)(b)
Rogue administrator Full access to templates + encryption keys Admin sees polynomial coefficients mod q Art. 25(1)
Law enforcement compulsion Server operator can be compelled to decrypt Server operator cannot decrypt (no key) Art. 32(1)(a)
Supply chain compromise Backdoor in SDK exposes plaintext pipeline Client-side encryption; server never sees plaintext Art. 25(2)
Quantum computing (2035+) RSA/ECC keys broken → all stored templates exposed Lattice-based FHE → PQ-secure by construction Art. 32(1)(a)

The Irrevocability Problem

Passwords can be changed. API keys can be rotated. Biometric data cannot. A fingerprint compromised in 2026 is compromised for life. This is why GDPR treats biometric data as a special category — the harm from a breach is permanent and irreversible.

Traditional biometric systems attempt to mitigate this with "cancelable biometrics" or "template protection" schemes that apply transformations to the plaintext template. These schemes have been repeatedly broken in the academic literature. They are security through obscurity, not security through mathematical hardness.

FHE is different. The security of BFV encryption does not depend on the secrecy of a transformation function. It depends on the computational hardness of the Module Learning With Errors problem — a well-studied lattice problem that has resisted decades of cryptanalytic effort and is the basis of multiple NIST post-quantum standards.

Implementation: GDPR-Compliant Biometric Auth in 4 Steps

Step 1: Client-Side Encryption

The biometric template is captured and encrypted on the data subject's device using the controller's BFV public key. The plaintext template never leaves the device. The H33 SDK handles encryption transparently.

JavaScript client-side enrollment
import { H33Client } from '@h33/sdk';

const client = new H33Client({ apiKey: process.env.H33_API_KEY });

// 1. Capture biometric template (e.g., from device sensor)
const template = await captureBiometric();

// 2. Encrypt client-side with controller's BFV public key
const encrypted = await client.fhe.encrypt(template, {
    scheme: 'BFV',
    n: 4096,
    q_bits: 56,
    t: 65537
});

// 3. Collect explicit consent
const consent = await client.consent.collect({
    purpose: 'biometric_authentication',
    dataCategory: 'article_9_biometric',
    retentionPeriod: 'until_withdrawal'
});

// 4. Enroll — only encrypted ciphertext sent to H33
const result = await client.biometric.enroll({
    userId: user.id,
    template: encrypted.ciphertext,  // BFV ciphertext, not plaintext
    consentToken: consent.token
});

Step 2: Server-Side FHE Matching

H33 performs the biometric match entirely in the encrypted domain. The inner product of two BFV ciphertexts produces an encrypted similarity score. H33 never sees the plaintext templates or the plaintext score.

Step 3: Attestation and Proof

The encrypted result is signed with a Dilithium-5 attestation and accompanied by a STARK lookup proof that verifies the computation was performed correctly. The controller decrypts the result locally to obtain the match/no-match decision.

Step 4: Consent Lifecycle Management

When a data subject withdraws consent, the controller calls the deletion endpoint. H33 cryptographically shreds the enrolled ciphertext (overwrites with random data and deletes all copies). The consent withdrawal is logged with a SHA3-256 hash for audit trail purposes.

Shell · curl DELETE /biometric/consent/{user_id}
curl -X DELETE https://api.h33.ai/v1/biometric/consent/user_8xKf \
  -H "Authorization: Bearer $H33_API_KEY"

// Response
{
  "deleted": true,
  "templates_shredded": 1,
  "shred_method": "cryptographic_overwrite",
  "withdrawal_hash": "sha3_256:d4e5f6...",
  "completed_at": "2026-02-23T15:00:00Z"
}

Beyond GDPR: Global Biometric Regulation

GDPR Article 9 is the gold standard, but biometric privacy regulation is expanding worldwide. H33's FHE architecture provides a compliance foundation that translates across jurisdictions:

Regulation Jurisdiction Key Requirement H33 FHE Alignment
GDPR Art. 9 EU/EEA Special category protection, explicit consent, DPIA Full
BIPA (740 ILCS 14) Illinois, USA Written consent, retention limits, private right of action Full
CCPA/CPRA California, USA Sensitive PI category, opt-out rights, data minimization Full
PIPL Art. 28 China Separate consent for sensitive PI, necessity principle Full
LGPD Art. 11 Brazil Special category, consent or legal basis, ANPD oversight Full
POPIA S26-27 South Africa Biometric as special PI, consent or exemption Full

The common thread across all these regulations is the same: biometric data requires heightened protection. FHE provides that protection at the cryptographic layer, making compliance a property of the architecture rather than a property of the organization's policy adherence.

Biometric Compliance, Guaranteed by Math

Zero plaintext exposure. Post-quantum encryption. Consent verification built into the API. Ship GDPR Article 9 compliant biometric auth today.

Get Free API Key → Biometric API Docs Security White Paper
Free tier · 1,000 biometric auths/month · No credit card required