BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
FHE COMPARISON · 10 min read

Google FHE Transpiler vs H33:
Compiler vs Production API

Google built a transpiler that converts ordinary C++ into FHE circuits automatically. It is a genuinely clever approach to the hardest problem in homomorphic encryption—developer usability. But a compiler that makes FHE easier to write is not the same thing as an API that makes FHE work in production. Here is how they compare.

1 API call
H33 full pipeline
36µs
H33 per auth
~seconds
Transpiled FHE ops

Google's FHE Transpiler is one of the most interesting experiments in making fully homomorphic encryption accessible. The premise is elegant: write standard C++, run a compiler, and get an equivalent program that operates entirely on encrypted data. No manual circuit design, no parameter tuning, no FHE expertise required. For researchers exploring what FHE can do, it is a remarkable shortcut. For teams that need to ship production authentication this quarter, it is the beginning of a very long road.

H33 takes the opposite approach. Instead of making it easier to write arbitrary FHE programs, H33 ships a purpose-built API where the FHE, zero-knowledge proofs, and post-quantum signatures are already optimized, tested, and running at scale. One HTTP request authenticates 32 users in 967 microseconds. No compiler step. No circuit tuning. No assembly required.

2.15M/s
H33 sustained auth throughput (Graviton4)
967µs
H33 FHE batch (32 users)
2,227
Tests passing, 108 patent claims

What Is Google's FHE Transpiler?

Released as an open-source project on GitHub, Google's FHE Transpiler is a compiler toolchain that takes C++ source code and automatically converts it into a TFHE (Torus FHE) boolean circuit. The developer writes a function using standard integer arithmetic and boolean logic—say, a string comparison or a simple calculation—and the transpiler handles the translation into gate-level FHE operations that can run on encrypted inputs.

The innovation here is real and worth acknowledging. FHE circuit design is notoriously difficult. Choosing the right encoding, managing noise budgets, structuring computations to minimize multiplicative depth—these are problems that typically require graduate-level cryptography expertise. Google's transpiler abstracts all of that away at compile time. A developer who has never heard of bootstrapping or noise growth can write int add(int a, int b) { return a + b; } and get a working FHE circuit. That is a meaningful contribution to the field.

Under the hood, the transpiler uses the TFHE scheme, which operates on encrypted bits via boolean gates (AND, OR, XOR, NOT). Each gate involves a bootstrapping operation that refreshes the ciphertext noise, enabling arbitrary computation at the cost of per-gate latency. The transpiler chains these gates together to implement whatever logic the original C++ expressed.

Where the Transpiler Falls Short

The elegance of the approach also defines its constraints. Transpiling C++ to boolean circuits produces correct results. It does not produce fast results.

Performance: The 100–1000x Penalty

TFHE boolean gates are inherently expensive. Each gate requires a bootstrapping operation, and the transpiler chains hundreds or thousands of gates for even simple programs. A transpiled integer addition that takes nanoseconds in plaintext C++ can take milliseconds to seconds in FHE. More complex operations—the kind needed for biometric template matching, for example—scale into seconds or minutes of computation per operation.

This is not a bug in the transpiler. It is a fundamental property of the TFHE gate-by-gate approach. Google's tool optimizes for generality and developer experience, not for raw throughput on specific workloads. H33 makes the opposite trade: it supports exactly the computations needed for authentication and biometrics, and optimizes them down to the hardware level. The result is 36 microseconds per authentication—a gap of four to five orders of magnitude compared to transpiled equivalents.

The Generality Tax

General-purpose FHE compilation produces circuits that are correct for any input program but optimized for none. H33's BFV engine uses a single 56-bit modulus, ring dimension N=4096, SIMD batching of 32 users per ciphertext, and Montgomery NTT with Harvey lazy reduction—none of which a general compiler can discover. Purpose-built optimization is the only path to microsecond-scale FHE.

Limited Program Support

The transpiler supports a subset of C++: integer arithmetic, boolean logic, simple control flow. It does not handle floating-point operations, dynamic memory allocation, loops with data-dependent bounds, or the complex polynomial arithmetic required for biometric inner products. Building a production authentication pipeline—with template enrollment, encrypted matching across multiple users, threshold decryption, and score normalization—exceeds what the transpiler can express.

No Production Infrastructure

The Google FHE Transpiler is a compiler. It produces circuits. It does not provide an API, key management, user enrollment, session handling, proof generation, attestation, SLAs, or support. There is no authentication pipeline, no biometric processing, no post-quantum signature layer. A team using the transpiler must build all of that from scratch—and then contend with the performance characteristics of transpiled TFHE circuits in a system that needs to handle real user traffic.

There are no post-quantum digital signatures, no zero-knowledge proofs for verifiable computation, and no integration with NIST FIPS 203/204 standards. The transpiler handles one concern—FHE circuit generation—and leaves everything else to the implementer.

H33's Approach: Purpose-Built FHE in One API Call

H33 does not compile arbitrary programs into FHE circuits. It ships a complete, production-hardened authentication platform where the FHE operations, ZKP verification, and post-quantum attestation are already fused into a single optimized pipeline.

The Single API Call

One HTTP request. Inside that request: BFV encrypt with SIMD batching (32 users per ciphertext), NTT-domain fused inner product with Montgomery multiplication, threshold decryption with no plaintext exposure, SHA3-256 ZKP cache lookup in 0.062µs via in-process DashMap, and ML-DSA Dilithium sign+verify in 191µs. Total pipeline: 967µs for 32 users. Per authentication: 36µs. No compiler step. No PhD needed.

The performance difference comes from architectural choices that a general-purpose transpiler cannot make. H33 uses BFV (not TFHE), which operates on polynomial rings rather than individual bits. A single SIMD-batched ciphertext encodes 32 biometric templates into 4,096 slots (4096 / 128 dimensions = 32 users). The FHE inner product is computed in NTT domain with a single final INTT, avoiding per-chunk inverse transforms. Enrolled templates are stored in NTT form at enrollment time, eliminating a forward transform on every authentication. These optimizations compound: each one saves microseconds, and together they deliver a pipeline that runs four orders of magnitude faster than transpiled boolean circuits.

Beyond performance, H33 includes components that the transpiler has no concept of: Kyber key exchange for post-quantum secure transport, Dilithium signatures for every attestation, STARK-based zero-knowledge proofs for verifiable computation, and a complete key lifecycle management system. The transpiler gives you encrypted computation. H33 gives you encrypted computation inside a production security pipeline.

Head-to-Head Comparison

Capability Google FHE Transpiler H33
Type C++ to TFHE compiler (open-source) Production auth platform (Rust API)
FHE Scheme TFHE (boolean gates) BFV + CKKS + ZKP + PQC signatures
Per-Operation Latency Milliseconds to seconds (transpiled) 36µs per auth / 967µs batch
Throughput Single-circuit execution 2.15M auth/sec (96 Graviton4 cores)
Post-Quantum Signatures None ML-DSA (Dilithium) — 191µs
Zero-Knowledge Proofs None STARK + DashMap cache (0.062µs)
Authentication Pipeline None (compiler only) Full pipeline: enroll, match, attest
Production Readiness Research project, no SLA NIST FIPS 203/204 compliant, 2,227 tests

When to Use Each

The Google FHE Transpiler and H33 are not direct competitors. They solve different problems for different audiences. Choosing the right tool depends on whether you are exploring FHE or deploying it.

Use Google's FHE Transpiler When Experimentation & Learning

Use H33 When Production Deployment

Fair Assessment

Google's FHE Transpiler deserves credit for tackling one of FHE's hardest problems: making encrypted computation writable by non-experts. The insight that a compiler can bridge the gap between standard code and FHE circuits is valuable and has influenced how the entire field thinks about developer experience. But a compiler is not a product. The gap between “I can transpile my C++ function” and “I can authenticate 2.15 million users per second with post-quantum attestation” is the gap between a research prototype and production infrastructure. H33 ships that infrastructure—benchmarked, tested, and protected by 108 patent claims.

The FHE industry is still young enough that compiler approaches and purpose-built APIs will coexist for years. Google's transpiler will continue to lower the barrier for FHE experimentation, and that matters. But when the requirement moves from “can this work?” to “can this work at 36 microseconds per authentication with post-quantum signatures and zero-knowledge proofs?”—the answer requires purpose-built engineering, not general-purpose compilation.

H33 ships that engineering. One API call. 2.15 million authentications per second. No compiler required.

Ship Production FHE Today

One API call. 2.15 million authentications per second. Post-quantum from day one.

Get Free API Key → Read the Docs Live Demo
Free tier · 1,000 operations/month · No credit card required
Verify It Yourself