LatticaAI
  • Platform
  • Workloads
  • Technology▼
    • FHE
    • HEAL
    • Whitepaper
    • Documentation
  • About
  • News
  • Contact
LATTICA BLOG

News & Updates

Latest insights, announcements, and developments from LatticaAI

← Back to All News
Practical TFHE for SaaS: Exact, Encrypted Logic in Production
Technology August 2025

Practical TFHE for SaaS: Exact, Encrypted Logic in Production

Run TFHE workloads in production without exposing data-in-use.

Lattica enables TFHE-powered applications that involve complex decision logic in partnership with Sunscreen. Anything from genetic imputation to smart contracts.

Get Started

Two Paths for Encrypted Computation
CKKS vs. TFHE

CKKS

  • Ideal for AI workload.
  • Excels for data-heavy tasks.
  • Parallelized operations on multiple values.
  • GPU‑accelerated.

FHE Applications

Encrypted DB
AI Inference
Smart Contracts

FHE Software Stack

Algorithms

CKKS
TFHE

Core Building Blocks

Polynomial arithmetic
KeySwitch
Bootstrap

TFHE

  • Ideal for secure voting or blockchain logic.
  • Excels at exact computation.
  • Bootstrapping by design.
  • CPU-based.

Under the Hood: Sunscreen and Lattica

Lattica

Deploys and Operates

  • Orchestration and workflow automation
  • Query Clients
  • Computer resource allocation
  • Management and monitoring

Sunscreen Compiler

Compile your program

arrow
arrow
arrow

Lattica
Management Client

  • Create a key set

  • Encrypt

  • Decrypt

Program Owner

arrow

Deploy Compiled Program

arrow

Deploy Evaluation Key

arrow

Encrypted Query

arrow

Encrypted Response

TFHE Engine
(Cloud)

Lattica powers Sunscreen's encrypted compute flow and returns the encrypted response
Sunscreen

The TFHE Engine

  • Encrypted computation at the language and compiler level: TFHE Compiler (Parasol)
  • TFHE runtime for encrypted programs
  • See Sunscreen demos...

Get Started

Run TFHE Programs with Lattica and Sunscreen
Step 1 - Compile with Sunscreen
Step 1

Compile with Sunscreen

Compile your TFHE program locally with Sunscreen and produce the deployable artifact.
Step 2 - Deploy your compiled program
Step 2

Deploy your compiled program

Upload and deploy your compiled artifact.
Step 3 - Configure access and resources
Step 3

Configure access and resources

Set permissions, choose resources, and control credit usage.
Step 4 - Your program is now ready for use
Step 4

Your program is now ready for use

Click and learn more about running encrypted queries.
SIGN UP TO GET 3 FREE COMPUTE HOURS

TFHE and CKKS are commonly used names for a family of FHE algorithms.

← Back to All News

More from Lattica

Technical Whitepaper: Production-Ready Performance
Research September 2025

Technical Whitepaper: Production-Ready Performance

This whitepaper covers our tensor programming model, benchmarks, and extensibility to custom hardware. Models run directly on encrypted data.

Read More →
Announcing HEAL 1.0
Announcement June 2025

Announcing HEAL 1.0

We are excited to announce HEAL 1.0, with integer-only tensor runtime, enhanced support, and updated documentation for production integration.

Read More →
What the FHE Community Thinks About the Future
Survey March 2025

What the FHE Community Thinks About the Future

Lattica surveyed cryptographers, engineers, and researchers to understand where FHE is headed. The responses reveal a mix of optimism and skepticism: progress is happening, but challenges remain.

Read More →

Stay Updated

Subscribe to our newsletter to receive the latest news, updates, and insights on encrypted compute and privacy-preserving AI.

We respect your privacy. Unsubscribe at any time.

LatticaAI

Making encrypted compute
a cloud-native capability.

Technology

  • Platform
  • Workloads
  • HEAL
  • FHE

Resources

  • Survey
  • Documentation
  • News
  • Platform Access

Company

  • Contact

© 2026 LatticaAI. All rights reserved.