HAVEN

Homomorphic Accelerated Vector ENgine

HAVEN searches and compares information inside encrypted databases, keeping both the data and the queries fully confidential.

HAVEN computes similarity on encrypted vectors without ever seeing the vector database and embeddings.

What is HAVEN

Lattica enables vector‑database similarity searches over encrypted embeddings and queries. We do this
without any plaintext vectors or queries touching Lattica’s servers by using FHE, which means Lattica
stores and serves only encrypted data, never plaintext vectors.

DB Administrator

End User

Vectorized DB

Query Vector

Response

Client

Database

Encrypt

Decrypt

Deploy Encrypted DB

Encrypted Query

Encrypted Response

Similarity Search FHE Engine
Server

How it works:

  1. Encrypt your vector database locally and upload the encrypted files to Lattica.
  2. Send encrypted queries through our API:
    all computations run directly on ciphertexts.
  3. Receive encrypted results and decrypt them locally.

DB Administrator

End User

Vectorized DB

Query Vector

Response

Client

Database

Encrypt

Decrypt

Deploy Encrypted DB

Encrypted Query

Encrypted Response

Server
Similarity Search FHE Engine

How it works:

  1. Encrypt your vector database locally and upload the encrypted files to Lattica.
  2. Send encrypted queries through our API:
    all computations run directly on ciphertexts.
  3. Receive encrypted results and decrypt them locally.

Encrypted Vector Searches with FHE

No Trust

Plaintext searches assume the database operator and cloud provider are trustworthy. FHE removes that assumption. The server computes similarity scores without ever learning what’s inside, which means privacy doesn’t depend on anyone else.

Compliance by Design

Sensitive data is never exposed, dramatically simplifying regulatory risk, access controls and audit layers. An FHE-based approach inherently supports privacy regulations and data sovereignty requirements because data stays encrypted throughout processing.

Secure Innovation

Lattica’s HAVEN unlocks new use cases on data that has been off-limits due to privacy concerns. From healthcare to finance to LLMs, organizations can safely search and analyze extremely sensitive patient records, financial transactions and proprietary documents without exposing any protected information.

Keep your Keys

You generate and hold the secret key; we never do. HAVEN maintains a single‑key setup for a single organization, enabling multiple end‑users to search without managing too many keys.

Who It’s For

Regulated Search

For finance, healthcare, and legal data where queries and embeddings must stay private.

Biometric Authentication

Face, voice, or fingerprint matching where templates stay encrypted end-to-end.

Encrypted RAG for LLMs

Retrieve documents for large language models while keeping embeddings encrypted

Encrypted Vector Memory

Store and compare text or image embeddings securely using encrypted vector memory.

Get Started

Request Early Access to HAVEN

    FAQ

    Most “secure” approaches rely on partial encryption or trusted execution environments (TEEs) that still expose data during computation. FHE keeps both the query and database encrypted at every step. The server computes on ciphertext only, producing encrypted similarity scores that are safely decrypted by the data owner.

    With you. You generate and hold the secret key.

    You encrypt and decrypt on your side before and after querying, uploading the encrypted database and queries via Lattica’s client API.

    FHE adds overhead, but not prohibitively. HAVEN supports representative dataset sizes and latency targets and our implementation is optimized for fast, accurate results.