BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
FHE COMPARISON · 8 min read

H33 vs Zama:
2.15M Auth/Sec vs Academic Benchmarks

Zama has done important work advancing fully homomorphic encryption research and tooling. Their TFHE-rs library and Concrete compiler lower the barrier to FHE experimentation. But when the benchmark is sustained production throughput — millions of authenticated users per second with post-quantum guarantees — the architectural gap is measured in orders of magnitude.

36µs
H33 per auth
~20ms
Zama PBS op
556×
H33 faster
H33 measured on c8g.metal-48xl (96 cores, AWS Graviton4, Neoverse V2) · Criterion.rs v0.5 · March 2026

What Is Zama?

Zama is a French cryptography startup founded in 2020, backed by a $73M Series A in 2024. Their mission is to make fully homomorphic encryption accessible to developers who have no cryptographic background. They ship three primary products:

This is genuinely useful work. Concrete in particular has helped hundreds of researchers explore FHE without manually tuning noise budgets. But Zama's architecture is optimized for generality and programmability, not for the sustained, high-throughput authentication workloads that enterprise security demands.

Where Zama Falls Short for Authentication

The fundamental bottleneck in Zama's stack is programmable bootstrapping. PBS is TFHE's most powerful primitive — it allows you to evaluate any function as a lookup table on encrypted data while simultaneously refreshing the ciphertext noise. This is elegant theory. In practice, a single PBS operation takes roughly 10–50 milliseconds depending on parameter sets, hardware, and the lookup table size.

The PBS Wall

Programmable bootstrapping is TFHE's strength and its ceiling. Every non-trivial operation chains through PBS, and each PBS costs 10–50ms. An authentication pipeline requiring multiple encrypted comparisons accumulates latency that cannot be parallelized away at the single-user level.

Beyond raw latency, Zama's architecture has structural gaps when evaluated against production authentication requirements:

How H33 Solves the Same Problem Differently

H33 does not attempt to be a general-purpose FHE toolkit. The entire stack is purpose-built for one mission: post-quantum biometric authentication at production scale. Every architectural decision flows from that constraint.

The H33 authentication pipeline completes in a single API call. A 32-user batch flows through three stages:

  1. FHE Batch (BFV) — 32 biometric templates are SIMD-packed into one ciphertext. A single encrypted inner product computes all 32 match scores in 967µs. The NTT engine uses Montgomery multiplication with pre-computed twiddle factors, parallel moduli processing via Rayon, and pre-NTT public keys to eliminate redundant transforms.
  2. ZKP Verification — An in-process DashMap lookup retrieves the cached STARK proof for the batch in 0.062µs. No TCP, no serialization, no inter-process communication. The proof verifies that the FHE computation was performed correctly without revealing the biometric data.
  3. Post-Quantum Attestation — A single CRYSTALS-Dilithium sign-and-verify cycle binds the entire batch result to an unforgeable, quantum-resistant attestation in 191µs. One signature covers all 32 users — a 31x reduction versus individual attestation.

Total batch latency: ~1,160µs for 32 users. Per-authentication cost: ~36µs. Sustained throughput on a single Graviton4 instance (c8g.metal-48xl, 96 workers): 1,714,496 auth/sec over 120 seconds, with a 30-second peak of 2,154,351 auth/sec. These are Criterion.rs-measured numbers on production hardware, not theoretical projections.

Test Coverage

H33's cryptographic stack is backed by 2,227 tests covering BFV, CKKS, NTT, Dilithium, Kyber, ZKP, biometric enrollment, batch verification, and edge cases. 108 patent claims are pending across the FHE, ZKP, and post-quantum signature pipeline. NIST FIPS 203 (ML-KEM) and FIPS 204 (ML-DSA) compliant.

Head-to-Head Comparison

Metric H33 Zama (TFHE-rs / Concrete)
FHE Scheme BFV (exact arithmetic) + CKKS (approximate) TFHE (Torus FHE)
Per-Operation Latency 36µs per auth (32-user SIMD batch) ~10–50ms per PBS operation
Batching Model CRT SIMD: 32 users per ciphertext (4096 slots ÷ 128 dims) No SIMD batching; per-integer operations
Sustained Throughput 1.71M auth/sec (120s, Graviton4) Academic benchmarks only; no published sustained auth numbers
Post-Quantum Signatures CRYSTALS-Dilithium (FIPS 204 ML-DSA), 191µs attest None integrated
ZKP Integration STARK proofs + in-process DashMap cache (0.062µs) None integrated
Biometric Pipeline FHE-encrypted enrollment, matching, and verification in one API call No biometric support; general-purpose FHE only
Primary Use Case Enterprise authentication & identity at scale FHE tooling, blockchain confidential compute (fhEVM)

The comparison is not entirely apples-to-apples, and that is precisely the point. Zama builds general-purpose FHE tools. H33 builds a vertically integrated authentication engine. When the evaluation criterion is "authenticate millions of users per second with post-quantum guarantees," the vertical approach wins by three orders of magnitude.

When to Use Each

Choose Zama when:

Choose H33 when:

Not a Zero-Sum Comparison

Zama's contributions to FHE accessibility are real. Concrete has made FHE approachable for thousands of developers. TFHE-rs is well-engineered Rust code. The question is not whether Zama is good — it is whether general-purpose FHE tooling can match a purpose-built authentication engine when the metric is production throughput. It cannot.

Try It Yourself

H33's authentication API is live today. A single POST to the H33 API runs the full FHE + ZKP + Dilithium pipeline in under 36µs per user. No parameter tuning, no compilation step, no separate libraries to integrate.

Get API Key View Benchmarks Read Docs

Related Comparisons

Comparison
H33 vs Microsoft SEAL
Research-grade BFV/CKKS library vs production authentication engine.
Comparison
H33 vs OpenFHE
DARPA-funded multi-scheme library vs vertically integrated pipeline.
Comparison
H33 vs IBM HElib
Pioneering BGV/CKKS research library vs real-time auth infrastructure.
Verify It Yourself