Confidential coprocessor overview
Confidential Coprocessor for Fair and Verifiable RWA Markets FHE16
+ MPC + Threshold Cryptography — Privacy that scales with performance.

Confidential and Verifiable Computation

This layer uses FHE, MPC, and Threshold Cryptography to perform verifiable
computations on the blockchain while keeping sensitive data confidential.

We're a research-driven company building on quantum-resistant FHE (Fully Homomorphic Encryption) and MPC (Multi-Party Computation) to make data security and privacy sustainable. Moreover, multi- users’ data can be securely and privately processed — decrypting only when needed and extracting statistical insights if necessary.📊📈

(To be disclosed in Oct. 2025)

f321ce2f5032c6d408f553606755b51378366c99adfa37337c95c1a330577139

SHA256("Primitive Gate")

Go LatticA https://x.com/LatticAwaLLLnut/status/1994684910401987064

(To be disclosed 1H 2026)

e4462274db0498727f14b6ae254c32bbe0b1eda2f61c192ef71c896c88e7b7f5

(To be disclosed 1H 2026)

ffc2d4c64b8a683cc44cc98f910d2d9f7d7d873668f10b0bae14d025421016d8

(To be disclosed 2H 2026)

6c0214904ca1f25da77c4db533603d793f3c1cb335086e84f918ea10677c45d5

Flagship Product — Deterministic Confidential Coprocessor 🏁

Executes blockchain state data on FHE16, enabling public verification. 🔍

Unlike traditional ZK systems limited to fixed state verification, FHE16 keeps the entire state fully encrypted and enables true dynamic state verification without revealing any computation results.

Deterministic Confidential Coprocessor

Normal transactions stay on-chain, while sensitive data/compute run in a confidential FHE coprocessor—keeping state public.

Encrypted data stays hidden

Illustration of FHE16 chip architecture

FHE16

A 16-bit integer computation–centric deterministic FHE structure eliminating floating-point operations and ensuring identical results regardless of the execution environment

Key Features
  • Elimination of floating-point operations, ensuring identical results regardless of execution environments
  • Elimination of floating-point environment-specific error issues
  • Ultra-fast 2.89 ms bootstrapping through GINX gate optimization (suitable for real-time and low-latency applications)

Reference: ePrint 2024/1916

waLLLnut's Property is,

  • Each private state is deterministically encrypted under FHE16 and recorded on-chain.
  • Any state change can be verified by all network participants.
  • State disclosure is propagated via a Threshold Decryption protocol.
Use case
  • Protecting DeFi transaction data & preventing MEV

    Keep your crypto trades private so others can't peek at your orders. Block unfair bot tactics that jump ahead to profit from your trade (often called MEV).

  • On-chain voting (selective anonymity + public verifiability)

    Vote on the blockchain while your identity and choice stay private. Anyone can still verify the overall results are real.

  • Data marketplaces (perform computations without revealing raw data)

    Buy and sell insights without handing over your raw data. The marketplace runs computations on protected data, so the originals stay private.

  • Privacy-preserving messaging/SNS

    Chat and share on social without giving up your privacy. Your content stays encrypted, and you decide who sees what.

Roadmap title graphic
~Dec.2026 Ongoing

Launch of SVM-based Confidential Layer module

~Nov.2026

LatticA
The Solana-native confidential computing that makes encrypted data computable and verifiable anywhere.

~Dec.2027

Launch of EVM-based Confidential Layer module

We are pioneering
Fully Homomorphic Encryption(FHE)
for decentralized, secure, and verifiable computation.