BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
FHE COMPARISON · 11 min read

Why OpenFHE Users
Switch to H33

OpenFHE is the most comprehensive open-source FHE library ever built—four schemes, DARPA heritage, and the best documentation in the field. It is also a toolkit that requires months of expert integration before it can authenticate a single user. H33 does it in 36 microseconds, 1,388 times faster than a typical OpenFHE operation, with post-quantum signatures and zero-knowledge proofs included.

36µs
H33 per auth
~50ms
OpenFHE typical op
1,388×
H33 faster

If you have spent any time evaluating fully homomorphic encryption libraries, OpenFHE is likely at the top of your list. It is the successor to PALISADE, carries DARPA funding lineage, supports more FHE schemes than any other library, and has the most accessible documentation in the space. For researchers and cryptography engineers exploring what FHE can do, OpenFHE is the right starting point. For teams that need to ship production authentication this quarter, it is the wrong finishing point.

H33 authenticates 2.15 million users per second on production hardware—with FHE-encrypted biometric matching, zero-knowledge proof verification, and Dilithium post-quantum attestation in every call. The gap between OpenFHE and H33 is not about which library has better primitives. It is about the distance between a comprehensive toolkit and a deployed system.

2.15M/s
H33 sustained auth throughput (Graviton4)
967µs
H33 FHE batch (32 users)
2,227
Tests passing, 108 patent claims

What Is OpenFHE?

OpenFHE is an open-source C++ library for fully homomorphic encryption, created by the team at Duality Technologies (now a joint effort with NJIT). It is the direct successor to PALISADE, a DARPA-funded library that played a foundational role in making practical FHE accessible to the broader cryptography community. OpenFHE implements four FHE schemes—BGV, BFV, CKKS, and TFHE—making it the most comprehensive multi-scheme library available today. It also provides Python bindings through OpenFHE-Python, lowering the barrier for researchers who prefer scripting over C++.

OpenFHE deserves genuine credit. Its DARPA heritage means the library was built under the rigorous standards of government-funded research. The documentation is the best in the FHE ecosystem—clear examples, scheme comparisons, and parameter guidance that no other library matches. The multi-scheme architecture lets researchers compare BGV, BFV, CKKS, and TFHE within a single framework, which is enormously valuable for academic work and prototype exploration. The community around OpenFHE is active, the maintainers are responsive, and the library continues to evolve. For advancing FHE as a field, OpenFHE has been a net positive.

The challenge is that advancing a field and deploying in production are fundamentally different activities. OpenFHE was designed to be the best possible FHE toolkit. H33 was designed to authenticate millions of users per second. Those goals produce very different systems.

Where OpenFHE Falls Short for Production

OpenFHE is comprehensive by design. It supports four FHE schemes, multiple parameter sets, serialization formats, and evaluation strategies. That comprehensiveness is its greatest strength for research and its primary liability for production deployment. Every layer of abstraction that makes OpenFHE flexible also adds overhead that purpose-built systems can eliminate.

Performance: The Cost of Generality

A typical OpenFHE operation—encrypt, evaluate, decrypt—takes 10 milliseconds to over 1 second depending on the scheme, parameters, and circuit depth. A well-tuned BFV inner product on moderate parameters might complete in 50 milliseconds. For comparison, H33 performs a full 32-user biometric authentication batch in 967 microseconds, including the FHE computation, NTT-domain fused inner product, ZKP cache lookup, and Dilithium signature attestation.

The performance gap stems from architectural decisions that compound. OpenFHE maintains multi-scheme dispatch tables, carries relinearization key chains sized for deep circuits, and uses general-purpose NTT implementations that accommodate multiple moduli configurations. H33 uses a single 56-bit modulus with N=4096, Montgomery NTT with Harvey lazy reduction (no division in the hot path), pre-computed twiddle factors in Montgomery form, and enrolled templates stored in NTT domain to skip forward transforms entirely. These are not optimizations that can be bolted onto a general-purpose library—they require designing the entire system around a specific workload.

Multi-Scheme Overhead

OpenFHE's four-scheme architecture means every operation passes through abstraction layers that determine scheme type, select parameter handling paths, and manage cross-scheme serialization. For research, this is essential. For production authentication running at 2.15 million operations per second, every microsecond of dispatch overhead is multiplied by millions. H33 compiles to a single-path BFV pipeline with zero runtime scheme selection, zero abstraction tax, and zero unused code in the hot path.

No Authentication Pipeline

OpenFHE provides Encrypt(), EvalMult(), EvalAdd(), EvalRotate(), and Decrypt(). It does not provide user enrollment, biometric template management, SIMD batching for multi-user authentication, threshold decryption with no plaintext exposure, proof generation, or post-quantum attestation. Building a production authentication system on OpenFHE means writing every component above the FHE layer from scratch, then integrating, testing, and hardening them under concurrent load. Teams that begin this journey typically discover at month six that the integration work exceeds the FHE implementation by an order of magnitude.

No SIMD Batching for Authentication

OpenFHE supports SIMD-style batching through CRT slot packing, but it provides no abstraction for packing multiple user templates into a single ciphertext. H33's batching architecture packs 32 biometric templates into one ciphertext (4096 slots / 128 dimensions = 32 users), amortizing the FHE cost across the entire batch. This is why the per-authentication latency drops to 36µs even though the batch operation takes 967µs. Achieving this on OpenFHE would require custom slot management, enrollment pipelines, and a batch orchestration layer—none of which the library provides.

No Post-Quantum Signatures or ZKP Integration

OpenFHE's FHE schemes are lattice-based and believed to be quantum-resistant at the encryption layer. However, the library provides no digital signatures, no key exchange protocols, no zero-knowledge proof generation, and no attestation mechanism. A production system needs to prove that the FHE computation was executed correctly and that the result is bound to a specific time and identity. On OpenFHE, that means integrating external ZKP libraries, adding Dilithium or another post-quantum signature scheme, and building the plumbing that connects them. On H33, it is NIST FIPS 204 (ML-DSA/Dilithium) attestation in 191µs and STARK-based ZKP lookup in 0.062µs—every call, automatically.

H33's Approach: One API Call, Fully Post-Quantum

H33 is not a library. It is a production authentication platform where a single API call triggers the complete pipeline: BFV encrypt with SIMD batching across 32 users, NTT-domain fused inner product for encrypted biometric matching, threshold decryption with zero plaintext exposure, SHA3-256 ZKP cache lookup via in-process DashMap, and ML-DSA Dilithium sign+verify for post-quantum attestation. The full sequence completes in 36 microseconds per authentication at production scale on AWS Graviton4 hardware.

The Single API Call

One HTTP request. Inside: BFV encrypt with SIMD batching (32 users per ciphertext), NTT-domain fused inner product with Montgomery reduction, threshold decryption with no plaintext exposure, SHA3-256 ZKP cache lookup in 0.062µs, and ML-DSA Dilithium sign+verify in 191µs. Total pipeline: 967µs for 32 users. No scheme selection. No parameter tuning. No C++ compilation. No PhD required.

Key management is fully automated. Enrolled biometric templates are stored in NTT form, eliminating a forward transform on every authentication. Public keys are pre-computed in pipeline NTT form at keygen time. Secret keys never leave the threshold decryption boundary. Pre-computed delta*m values remove u128 multiplication from the encrypt hot loop. Every optimization is invisible to the caller—they see one API call and one result.

The Rust implementation eliminates entire classes of bugs that C++ FHE libraries contend with: use-after-free in key material, buffer overflows in polynomial arithmetic, data races in concurrent batch processing. H33 passes 2,227 tests across the full pipeline, and the 108 patent claims protect the specific innovations—NTT-domain persistence, fused inner products, batch attestation—that make this performance possible.

Head-to-Head Comparison

Capability OpenFHE H33
Type C++ FHE toolkit (Python bindings) Production auth platform (Rust)
FHE Schemes BGV, BFV, CKKS, TFHE BFV, CKKS + ZKP + PQC signatures
Typical Operation Latency 10ms–1s (scheme/param dependent) 967µs batch / 36µs per auth
Throughput (production) No built-in batching or scaling 2.15M auth/sec (96 cores)
Post-Quantum Signatures None (BYO) ML-DSA (Dilithium) — 191µs
Zero-Knowledge Proofs None STARK + DashMap cache (0.062µs)
Biometric Authentication None (FHE primitives only) 32-user SIMD batch, NTT-form templates
Key Management Manual serialization/storage Auto lifecycle, NTT-form pre-compute, threshold split

When to Use Each

OpenFHE and H33 solve different problems. The right choice depends entirely on what you are building and when you need it deployed.

Use OpenFHE When Research & Exploration

Use H33 When Production Deployment

Fair Assessment

OpenFHE is the best FHE toolkit available. Its DARPA heritage, four-scheme coverage, and documentation quality are unmatched. If you are a researcher, student, or engineer exploring what homomorphic encryption can do, OpenFHE is where you should start. But a toolkit is not a product. The distance between EvalMult() and 2.15 million authenticated users per second is measured in years of engineering, thousands of tests, and 108 patent claims worth of innovation in batching, NTT optimization, cache-aware proof verification, and post-quantum attestation. H33 ships that distance as a single API call.

The pattern is consistent across every team that evaluates OpenFHE for production authentication. They begin with the library's excellent documentation, build a working prototype in weeks, then spend months discovering that the hardest problems—concurrent batch processing, key lifecycle management, proof generation, attestation, thermal-aware worker scheduling, and SIMD slot management for multi-user ciphertexts—sit entirely outside the library's scope. The FHE primitives are the foundation, but the foundation is 10% of a building.

H33 ships the other 90%—benchmarked at 2.15 million authentications per second on Graviton4, verified by 2,227 tests, and protected by 108 patent claims. One API call. Full post-quantum security. No assembly required.

Ship Production FHE Today

One API call. 2.15 million authentications per second. Post-quantum from day one.

Get Free API Key → Read the Docs Live Demo
Free tier · 1,000 operations/month · No credit card required
Verify It Yourself