BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
Performance · 5 min read

Full Auth in 1.36ms:
220x Faster Than a Blink

H33 completes full authentication in 1,360 microseconds. A human blink takes 300,000. We authenticate you 209 times before your eye closes.

2.17M/s
Auth/sec
~42µs
Per Auth
96
CPU Cores
Graviton4
Platform

A human blink takes 300,000 microseconds. H33 completes full post-quantum authentication in 1,360 microseconds. That means we can authenticate you 209 times before your eye finishes closing.

This isn't a theoretical benchmark. It's production performance, measured on standard cloud infrastructure (AWS c8g.metal-48xl with AWS Graviton4 (Neoverse V2)), processing real authentication requests.

The Blink Comparison

Human blink: 300,000µs (300ms)
H33 Full Auth: 1.36ms
Ratio: 220x faster
Authentications per blink: ~209

Why This Matters

Zero-knowledge proofs have traditionally been considered "slow cryptography." Early ZK systems took seconds or even minutes to generate proofs. This made them impractical for real-time authentication.

H33 changes this equation entirely. At 1.36ms, full authentication is now faster than most database queries. It's faster than network round-trips. It's faster than you can perceive.

1.36ms
Full Auth (Turbo)
42µs
Per Auth (Batched)
32µs
Cached Proof Verify
2.17M/s
Sustained Throughput

The Three-Stage Pipeline

Every H33 authentication executes three cryptographic stages in a single API call. Each stage is fully post-quantum secure, and the entire pipeline completes within a 32-user batch in approximately 1,356 microseconds — roughly 42 microseconds per individual authentication.

Stage Operation Latency PQ-Secure
1. FHE Batch BFV inner product (32 users/ciphertext) ~1,109 µs Yes (lattice)
2. ZKP Verify In-process DashMap lookup 0.085 µs Yes (SHA3-256)
3. Attestation SHA3 digest + Dilithium sign+verify ~244 µs Yes (ML-DSA)
Total (32 users) ~1,356 µs
Per auth ~42 µs

The dominant cost is the FHE biometric match in Stage 1. Biometric templates are encrypted under BFV (Brakerski/Fan-Vercauteren) with polynomial degree N=4096 and a single 56-bit modulus, then matched via an encrypted inner-product operation. Because BFV supports SIMD batching — 4,096 plaintext slots divided by 128 biometric dimensions — we pack 32 users into a single ciphertext and verify them all in one fused NTT-domain multiply-accumulate pass.

Key Insight

The ZKP verification stage costs just 85 nanoseconds. By caching STARK proofs in an in-process DashMap rather than routing through a TCP-based cache proxy, H33 eliminated the single largest source of contention at scale. A TCP cache serializes connections under 96 concurrent workers; in-process lookup does not.

The Technical Achievement

Reaching 1.36ms required innovations across the entire stack:

// Rust: single API call — FHE + ZKP + Dilithium attestation
let result = h33::auth::verify_batch(&encrypted_templates, &probe, 32)?;

// result.fhe_us     = 1109   (BFV inner product, 32 users)
// result.zkp_us     = 0.085  (DashMap cache hit)
// result.attest_us  = 244    (SHA3 + Dilithium sign+verify)
// result.total_us   = 1356   (full pipeline)
// result.per_auth   = 42     (per-user amortized)

Real-World Impact

What does 1.36ms authentication mean in practice?

For users: Authentication feels instant. No loading spinners. No perceived delay. The security happens invisibly.

For developers: You can add ZK-based privacy to your authentication without performance concerns. The overhead is negligible — a single H33 auth call adds less latency than a typical DNS lookup.

For enterprises: At sustained throughput of 2,172,518 authentications per second on a single Graviton4 instance, H33 handles peak traffic events without horizontal scaling. Black Friday surges, concert ticket releases, election-day identity verification — one machine, one process, no queuing.

Benchmark Details

Our February 2026 production benchmarks were conducted on:

Metric Value
Batch size32 users / ciphertext
Batch latency~1,109 µs (FHE) + 0.085 µs (ZKP) + ~244 µs (attestation)
Per-auth latency~42 µs
Sustained throughput2,172,518 auth/sec
Template storage~256 KB/user (128x reduction via SIMD batching)
Post-quantum securityAll three stages (lattice FHE, SHA3 ZKP, ML-DSA attestation)
// Single ZK proof generation
const result = await h33.auth.generateProof({
  userId: 'user_123',
  claims: ['identity', 'age_over_18'],
  mode: 'turbo'
});
// Completes in 1.36ms

// Batch processing (32 users per ciphertext)
const batchResult = await h33.auth.batchProof({
  requests: thirtyTwoUsers,
  mode: 'parallel'
});
// ~1,356µs total = ~42µs per auth

The Complete Performance Picture

ZK proofs are just one part of our performance story. Here's how the full authentication stack performs:

Key Insight

Every cryptographic primitive in the H33 pipeline is post-quantum secure. The BFV lattice scheme resists Shor's algorithm. The ZKP cache uses SHA3-256 commitments (quantum-resistant hash). The attestation layer uses CRYSTALS-Dilithium (NIST ML-DSA standard). There is no classical-only weak link in the chain.

Try It Yourself

These aren't numbers you have to take on faith. Sign up for a free API key and run your own benchmarks. The performance is real, reproducible, and available today.

Experience 1.36ms Authentication

Get your free API key and see the performance for yourself. 1,000 free auths, no credit card required.

Get Free API Key

Build With Post-Quantum Security

Enterprise-grade FHE, ZKP, and post-quantum cryptography. One API call. Sub-millisecond latency.

Get Free API Key → Read the Docs
Free tier · 10,000 API calls/month · No credit card required
Verify It Yourself