H33 Consolidated Benchmark Reference
Reconciling measurements across Pure FHE, API Stack, and Full PQC contexts
February 4, 2026 | Corrected for NIST Compliance
Understanding The Three Contexts
| Context | Hardware | What's Measured | Headline | Use For |
|---|---|---|---|---|
| Pure FHE | Local (single-thread) | Raw Rust BFV crypto only | 38µs multiply | vs SEAL comparison |
| API Stack | c7i.4xlarge (16 vCPU) | HTTP + FHE + ZKP + Cache | 911µs full auth | Real-world latency |
| Full QR Stack | c7i.4xlarge (16 vCPU) | FHE + ZKP Lookups + Kyber + Dilithium + Audit | 911µs full auth | 100% quantum-resistant |
Pure FHE: Fair Comparison
Fair Comparison: Same Security Level
Apples-to-apples comparison at equivalent parameters. H33 Precision (N=4096, 128-bit) vs SEAL (N=4096, 128-bit).
| Comparison | H33 | SEAL | Speedup | Notes |
|---|---|---|---|---|
| Fair (N=4096 vs N=4096) | 618µs | ~25ms | ~40x | Same 128-bit security |
| Turbo (N=1024) vs SEAL (N=16384) | 38µs | ~50ms | ~1,300x | Different security levels |
Security Level Transparency
Turbo (N=1024): ~100-bit security — suitable for session keys, ephemeral data
Standard (N=2048): ~112-bit security — general purpose
Precision (N=4096): ~128-bit security — NIST compliant for sensitive data
For HIPAA/PCI compliance, use Standard or Precision mode.
Fair Comparison (N=4096)
Rust vs C++ Overhead
Algorithm Optimization
Homomorphic Operations by Mode
| Operation | Turbo (N=1024) | Standard (N=2048) | Precision (N=4096) | SEAL (N=16384) |
|---|---|---|---|---|
| Add | 1.9µs | 6.8µs | 22µs | ~2,000µs |
| Subtract | 0.8µs | 2.7µs | 9.4µs | ~2,000µs |
| Multiply | 38µs | 132µs | 618µs | ~180,000µs |
| Square | 38µs | 132µs | 617µs | ~180,000µs |
Full Authentication Flow by Mode
| Mode | Polynomial N | Pure FHE Auth | Full API Stack | Security |
|---|---|---|---|---|
| TURBO | 1,024 | 435µs | ~911µs | 100-bit |
| STANDARD | 2,048 | 1.48ms | ~1.8ms | 112-bit |
| PRECISION | 4,096 | 5.63ms | ~6.5ms | 128-bit |
SIMD Batching & Limitations
128-dim biometric: 424µs ─┐ 256-dim biometric: 423µs ─┼── Same performance (fits in 1 ciphertext) 512-dim biometric: 422µs ─┘ 1024-dim biometric: ~850µs ← Requires 2 ciphertexts (2x operations) 2048-dim biometric: ~1.7ms ← Requires 4 ciphertexts SIMD slots per mode: Turbo (N=1024): 512 slots → max 512-dim in single ciphertext Standard (N=2048): 1024 slots → max 1024-dim in single ciphertext Precision (N=4096): 2048 slots → max 2048-dim in single ciphertext
Noise Budget & Multiplicative Depth
| Mode | Max Mult Depth | Biometric Ops Supported | Use Case |
|---|---|---|---|
| TURBO | 1-2 multiplications | Simple distance (sub + square) | Fast matching, low-security |
| STANDARD | 3-5 multiplications | Euclidean distance + threshold | General biometric auth |
| PRECISION | 8-10 multiplications | Complex matching + multiple comparisons | High-security, compliance |
Note: Biometric Euclidean distance requires: subtract (depth 0) → square (depth 1) → accumulate (depth 1). Turbo mode supports this. More complex operations require Standard or Precision.
Full Quantum-Resistant Biometric Auth
Complete Zero-Plaintext Stack
Full cryptographic protection at every layer. No plaintext PII/PHI anywhere in the pipeline.
| Component | Time | Protection |
|---|---|---|
| Edge Encryption (PII/PHI) | ~50µs | AES-256-GCM at API gateway (server-side) |
| H33 FHE Biometric Auth | 435µs | BFV Turbo (N=1024, 100-bit security) |
| H33 ZKP Lookups Verify | ~0.2µs | O(1) lookup table proof (SHA3-256, QR hash) |
| Kyber768 Key Exchange | 32µs | Quantum-resistant session keys (FIPS 203) |
| Dilithium3 Sign + Verify | 145µs | Non-repudiation (FIPS 204) |
| Blockchain Audit (batched) | ~5µs amortized | Merkle tree, 5000x compressed |
| HTTP + Cache + Routing | ~244µs | API overhead |
| TOTAL (Full Quantum-Resistant Stack) | ~911µs | 100% post-quantum: FHE + Kyber + Dilithium + SHA3 |
AWS Production Scaling
| Environment | Latency | Throughput |
|---|---|---|
| c7i.4xlarge (Full QR API Stack) | 911µs | ~1,100/sec |
| c7i.48xlarge (single request) | ~230µs | ~4,350/sec |
| AWS BATCHED 1K batch | ~25µs/auth | ~1.2M/sec |
Full Quantum-Resistant Stack
911µs = 100% Post-Quantum Security, Sub-Millisecond
Every component quantum-resistant: BFV-FHE (lattice-based), Kyber768 ML-KEM (NIST), Dilithium3 ML-DSA (NIST), H33 ZKP Lookups (SHA3-256), AES-256-GCM. No elliptic curve cryptography. No pairing-based proofs. Future-proof against quantum attacks.
PQC Component Breakdown
Kyber768 (ML-KEM)
Dilithium3 (ML-DSA)
Combined PQC Overhead
H33 ZKP Lookups: What It Proves
Hash-Based Authenticated Lookup
Statement: "The validator's action is authorized and recorded in the compliance set."
Mechanism:
- Commitment: H = SHA3-256(validator_id || action || timestamp || nonce)
- Lookup: Verify H exists in precomputed authorized-actions table (O(1))
- Binding: Commitment is Dilithium-signed and blockchain-anchored
Security Properties:
- Collision-resistant: SHA3-256 (256-bit, QR)
- Non-repudiation: Dilithium signature binds identity
- Immutability: Blockchain anchor prevents tampering
Note: This is hash-based authenticated lookup, not pairing-based ZKP. The commitment H is revealed to the verifier. For applications requiring witness privacy, use a true ZK system (not included in QR stack due to ECC dependency).
Validation Methodologies
Independent Cryptographic Audit
H33 Rust FHE and ZKP implementations validated through rigorous, multi-layered verification methodology.
| Component | Methodology | Validation |
|---|---|---|
| BFV-FHE Correctness | Roundtrip testing: Decrypt(Encrypt(m)) = m | 10,000+ test vectors, property-based fuzzing |
| Homomorphic Operations | Algebraic verification: E(a) + E(b) = E(a + b) | Exhaustive small-domain tests, cross-validation vs SEAL |
| Security Parameters | Lattice estimator analysis (N, q, sigma) | Turbo: 100-bit, Standard: 112-bit, Precision: 128-bit verified |
| H33 ZKP Lookups | SHA3-256 collision resistance, O(1) lookup | Quantum-resistant hash-based verification |
| PQC Correctness | NIST test vectors (Kyber, Dilithium) | KAT vectors pass, API usage audited |
| Side-Channel Resistance | Timing attack analysis | Constant-time implementations verified |
| Noise Budget Management | Noise growth tracking per operation | Operations stay within decryption threshold |
Cross-Validation Framework
| H33 Component | Reference Oracle |
|---|---|
| H33 BFV-FHE | Microsoft SEAL 4.1 |
| H33 ZKP Lookups | SHA3-256 (NIST FIPS 202) |
| H33 Kyber768 | pqc_kyber (NIST ML-KEM FIPS 203) |
| H33 Dilithium3 | pqcrypto (NIST ML-DSA FIPS 204) |
Audit Scope
In Scope: Pure cryptographic implementations (BFV, ZKP, PQC), parameter security, test coverage
Out of Scope: Business logic, API design, infrastructure
Deliverable: Signed attestation of cryptographic correctness
Benchmark Methodology
| Aspect | Method | Tool |
|---|---|---|
| Microbenchmarks | Statistical sampling with warmup, outlier rejection | Criterion.rs (100+ samples per test) |
| End-to-End Latency | Full stack timing with real payloads | Criterion.rs + custom harness |
| Throughput | Sustained load testing, batched operations | Custom benchmarks with rayon parallelism |
| Memory Profile | Peak allocation tracking | mimalloc + custom instrumentation |
| AWS Production | c7i.4xlarge and c7i.48xlarge instances | Identical binaries, production config |
Test Vectors
Property Tests
Cross-Validation
Marketing Headlines
Primary: Fair Performance Claim
"~40x faster than Microsoft SEAL at equivalent security"
618µs vs ~25ms at N=4096 (128-bit security). Rust implementation with optimized NTT/RNS.
Secondary: 100% Quantum-Resistant
"911µs Full Post-Quantum Stack"
Every component QR: BFV-FHE (lattice), Kyber768 (ML-KEM), Dilithium3 (ML-DSA), H33 ZKP Lookups (SHA3-256). No elliptic curves. No pairings. NIST Level 3.
Tertiary: Practical (with limitations)
"Sub-millisecond biometric auth up to 512 dimensions"
435µs Turbo mode (100-bit). For 128-bit compliance, use Precision mode (~5.6ms). Vectors >512-dim require multiple ciphertexts.
Corrections & Clarifications
Issues Addressed in This Document
The following concerns were raised during cryptographic review and have been corrected:
| Original Claim | Issue | Correction |
|---|---|---|
| "4,737x faster than SEAL" | Compared N=1024 (100-bit) to N=16384 (128-bit) | ~40x at same N=4096 is the fair comparison |
| "0.2µs ZKP verification" | H33 ZKP Lookups is SHA3-256 hash-based | H33 ZKP Lookups = 0.2µs (O(1), quantum-resistant) |
| "SEAL takes 180ms" | Published SEAL benchmarks show 10-50ms | ~25-50ms is more accurate for SEAL |
| "Dimension independent" | Only true up to SIMD slot count (512 for Turbo) | 512-dim max per ciphertext. 1024-dim = 2x time |
| "+0µs client-side encryption" | Misleading—encryption happens server-side at gateway | ~50µs at API gateway (server-side) |
| "Turbo mode for all use cases" | 100-bit security below NIST minimum | Use Precision (N=4096) for compliance |
| No noise budget analysis | Critical for FHE correctness | Added: Turbo=1-2 mults, Standard=3-5, Precision=8-10 |
Verified Claims Summary
What H33 Full QR Stack delivers:
- ~40x faster than SEAL at equivalent security (N=4096, 128-bit)
- 435µs FHE biometric auth (Turbo, 100-bit)
- ~5.6ms FHE biometric auth (Precision, 128-bit NIST compliant)
- 911µs Full QR Stack: FHE + Kyber768 + Dilithium3 + H33 ZKP Lookups + Audit
- 100% Quantum-Resistant: Lattice-based FHE, NIST PQC, SHA3-256 (no ECC/pairings)
- SIMD batching: Up to N/2 dimensions per ciphertext