The Kiosk Model

Self-Destructing FHE on Consumer Hardware

The Problem with Centralized FHE

Centralized FHE servers hold cryptographic keys in memory continuously, creating a persistent attack surface. The algebraic homomorphism that enables encrypted computation also creates structural vulnerabilities inherent to the deployment model — not bugs that can be patched, but consequences of the architecture itself.

The Inversion

Instead of running FHE on provider-owned servers, ship self-destructing disposable computation units to consumer hardware. The provider sells cryptographic capability, not compute time. Units exist only during active computation — milliseconds of attack surface instead of 24/7 exposure.

Three Deployment Models

1

BULLET

Single computation. One encrypted operation, then destruction. Secure voting, sealed-bid auctions, medical queries.

N

CAPSULE

N computations. A measured allocation of encrypted operations before automatic destruction. Recurring analytics, ML inference batches.

T

FUSE

Time-limited window. Active for a defined duration, then destruction regardless of operations consumed. Development, testing, burst workloads.

Self-Destruction

Destruction is not cleanup — it is an integral part of the computation lifecycle. After computation completes, cryptographic state is transformed into algebraic meaninglessness and zeroed from memory in microseconds. A destruction receipt — a cryptographic hash of the final system state — proves the computation occurred and the unit self-destructed, without revealing inputs, outputs, or keys.

Shadow Entropy Metering

Every FHE computation produces an irreducible cryptographic byproduct: shadow entropy. This byproduct serves simultaneously as the billing mechanism and the tamper detection system. The amount of shadow entropy a computation produces is deterministic and predictable from the circuit description — which is always public in FHE. Enforcement is mathematical, not contractual. There is no DRM to crack, no license server to spoof.

Dead Man's Switch

Five independent triggers fire immediate destruction with no graceful shutdown: integrity mismatch, memory access violation, clock anomaly, heartbeat timeout, and client-initiated abort. If destruction fires from the first four triggers, the client receives no result. The adversary gets nothing.

Development Status

Production

Core FHE Engine

Production-ready — 935+ tests, 0 failures

Implemented

Shadow Entropy Harvesting

Implemented

Verified

Three-Lock Bootstrap

Verified — 3 paths, exact recovery

In Progress

Fold / Destruction / Receipt

Implementation phase

Planned

WASM Compilation Target

Planned

Design

Consumer Provisioning

Design phase

Interested in Licensing?

The Kiosk architecture is available for licensing. Get in touch to discuss integration, deployment models, and commercial arrangements.

Top