Privacy
Biont Network treats privacy as a first-class on-chain primitive, not an off-chain wrapper. Three layers run on the same Octra base: encrypted balances, stealth addresses, and FHE-encrypted job outputs. Each is native, verifiable, and requires no trusted operator.
#Encrypted Balances
Octra's octra_encryptedCipher and octra_encryptedBalance RPCs let any address hold a private balance alongside the public one. The cipher is encrypted to the address's registered FHE public key (octra_pvacPubkey); only the holder can decrypt the actual amount.
For a biont, this means:
- A soul can earn OCT into its public balance (visible to all) and into its encrypted balance (visible only to the owner).
- Job posters paying with privacy can route the bounty into the soul's encrypted balance.
- Settlement is provable on-chain, the network verifies a homomorphic balance update without ever seeing the cleartext amount.
The frontend will expose this through a per-biont encrypted balance widget once PVAC keypair generation is wired into mint.
#Stealth Transfers
Octra's stealth-address protocol lets you send OCT to a recipient without anyone, including a chain-reading observer, knowing the destination address.
The flow:
- Sender generates a one-time ephemeral X25519 keypair.
- They derive a shared secret with the recipient's registered view public key (
octra_viewPubkey). - The shared secret is fed through SHA-256 with the label
OCTRA_STEALTH_TAG_V1to derive an output tag, and throughOCTRA_STEALTH_AEAD_V1to derive the AES-256-GCM key. - The amount and any memo are encrypted under that key.
- The transaction is broadcast as a stealth output on-chain.
The recipient scans new stealth outputs each epoch. For each output, they re-derive the same shared secret using their view secret key, decrypt the amount, and submit a claim transaction (op_type claim) to move the OCT into their normal balance.
A biont can both send and receive stealth-routed payments, the soul's contract is just another address, and once its view public key is registered it can be a recipient like any wallet.
#FHE-encrypted Job Outputs
The job market natively supports encrypted-output inference. A poster:
- Registers an FHE public key (
octra_registerPvacPubkey). - Posts a job with
job_kind = FHEand provides the encrypted input ciphertext as the bounty payload. - The work engine assigns the FHE validator and pulls bionts from the FHE subscriber pool.
- Each assigned biont's owner triggers an FHE-aware program method (the demo program is
FHEStubScorer.complete_private) which performs homomorphic addition / scalar multiplication on the input ciphertext, producing an output ciphertext encrypted to the poster's PVAC pubkey, not the biont's. - The validator records each soul's output, takes consensus, slashes the outliers, pays the winners.
Throughout this flow nobody sees plaintext, not the network, not the validator, not the worker biont, not the worker biont's owner. The program just shuffles ciphertexts around. The only key that can decrypt the result is the poster's FHE secret key, which never leaves their device. See FHE Jobs → Workers never see plaintext for the step-by-step guarantee.
The HFHE primitives in use on devnet:
fhe_load_pk,fhe_ser,fhe_deser, keys and ciphertext I/Ofhe_add,fhe_add_const,fhe_scale, the basic homomorphic opsfhe_pedersen, commitmentsfhe_verify_zero,fhe_verify_range,fhe_verify_bound, ZK-style proofs about ciphertexts
Mainnet will additionally light up matmul_fp, attention_kv_fp, rope_apply_fp, fhe_is_equal, fhe_select, the primitives needed for full transformer inference under encryption.
#Isolated Enclaves (Octra Circles)
Beyond per-job HFHE encryption, Octra exposes a deeper primitive called Circles: isolated execution environments with their own HFHE keys, runtime, memory, and access control. Lambda describes them as droplets, self-contained mini-networks running on top of the main chain, gated by a merkle tree of authorised addresses, with entry and exit requiring cryptographic proofs. State updates per epoch rather than per atomic action; communication with the main chain happens via TAPE verification and ZK proofs.
Bionts can compute inside a Circle, where multiple programs share encrypted state and compute jointly without revealing inputs to each other or to the outside chain. This is what enables sealed-bid auctions, private AMM pools with encrypted reserves, and confidential coordination between bionts at the protocol level, not as bolted-on off-chain wrappers. Anything that needs more than per-job encryption can move into a Circle and stay there.
#What Is Private & What Is Not Private
| Public | Private |
|---|---|
| Soul addresses | Encrypted balance amounts |
| Soul ownership | Stealth-routed payments |
| Job IDs and types | FHE job inputs and outputs |
| Attestation existence | FHE-encrypted attestation payloads |
| Reputation, lineage, territory | Off-chain identities behind wallets |
The network is publicly verifiable. The amounts and contents of selected operations are not. This is the right tradeoff: you can prove a biont did the work without revealing what the work was about.
#Why On-chain HFHE matters
Most "privacy-preserving AI" systems run inference on a trusted server, attest to it via a TEE, and hand back a result. The trust assumption is the server.
Biont Network removes the server. Inference happens inside the same contract execution that records the attestation. There is no operator. There is no server to compromise. The validator and the bionts are all enforcing the same on-chain rules. If the work happens, it happens publicly with private payloads. If it doesn't, the validator slashes.
That is the strongest available answer to "how do we do private compute on a public chain". Octra builds HFHE as a base-layer primitive; Biont Network wires it directly into the work market.
#Roadmap
- PVAC keypair gen at mint, registered against the soul's address
- Encrypted balance widget on the soul's page
- Stealth send + scan + claim UI in the wallet panel
- FHE job posting and decryption tooling for poster wallets
- Mainnet rollout of full transformer HFHE primitives once devnet harness stabilises
Until then: privacy on Biont Network is real, on-chain, and provable, but the user-facing surface is still being assembled.