Horizen Labs
Solutions
Confidential Verification for Defense
Quantum Resistance
Systems
Horizen
Regulatory-compliant Privacy Layer
zkVerify
#1 Universal Verification System
Kurier
Zero Knowledge Proof Verification APIs
Vela
Confidential Compute Layer for the Open Market
Discover
Use Cases
Cryptographic Research
Discover
Use Cases
Cryptographic Research
Company
About Us
How We Work With You
Blog
Careers
Contact Us
Horizen Labs

Offices:

US – New York, San Juan - PR

Italy – Milan

Singapore

© 2026 Horizen Labs. All rights reserved.

Privacy Policy

Building the Infrastructure of the Verifiable Web

Make advanced cryptography usable, so organizations can build, transact, and coordinate with confidence and privacy.

We build systems that make truth verifiable and privacy practical. From our own products to mission-critical client work, we deliver privacy tech, protocol design, and post-quantum readiness built for production.

Talk to an Expert

Privacy Solutions for High-Stakes Environments

We embed applied cryptographic research into real and high-performance system design, so privacy and verification work under operational constraints, not just in theory.

We build privacy solutions that protect sensitive work and stand up to real-world scrutiny, scale, and change.

Our Expertises

Privacy Technology

We build privacy systems using zero-knowledge proofs and TEEs to protect confidentiality with controlled disclosure.

Cryptographic Primitives and Protocol Design

We design the cryptographic foundations and protocols behind secure systems.

Production Engineering and Delivery

We deliver end-to-end product engineering, designed for real operations.

Post-Quantum Readiness

We help teams assess risk and plan migration paths, so critical systems stay secure as post-quantum standards and threats evolve.

High-Stakes
Delivery at Scale

We launch and operate mission-critical systems where security, uptime, and migration risk are non-negotiable.

01

Secure and Reliable Execution

Security-first delivery; designed for long-term operability and upgrades.

02

Large-scale Launches & Migrations

Complex launches and live migrations with minimal disruption.

03

Proven in Production

Built for real load, adversarial conditions, and operational constraints.

01

Secure and Reliable Execution

Security-first delivery; designed for long-term operability and upgrades.

02

Large-scale Launches & Migrations

Complex launches and live migrations with minimal disruption.

03

Proven in Production

Built for real load, adversarial conditions, and operational constraints.

Systems We've Built and Operated

Regulatory-Compliant Privacy Layer

A platform designed to protect confidential information while preserving verifiable integrity. Reduces real-world exposure risk without sacrificing auditability.

  • Confidential transactions and workflows on public rails

  • Selective disclosure for compliance and oversight

  • Privacy-preserving integrations for apps and services

Explore horizen

Universal Verification System

High-Stakes Ecosystem Infrastructure

Regulatory-Compliant Privacy Layer

Universal Verification System

High-Stakes Ecosystem Infrastructure

A platform designed to protect confidential information while preserving verifiable integrity. Reduces real-world exposure risk without sacrificing auditability.

  • Confidential transactions and workflows on public rails

  • Selective disclosure for compliance and oversight

  • Privacy-preserving integrations for apps and services

Explore horizen

We partner end-to-end, from architecture and security design to implementation, integration, and operational readiness.

Backed By

DCG logo
Liberty City Ventures logo
Kenetic logo
LionTree logo
SOUND logo
Deribit logo

Blog

The Latest Insights

Introducing Vela: New Confidential Compute Layer that Brings Private Execution to Public…

Introducing Vela: New Confidential Compute Layer that Brings Private Execution to Public…

Introducing Vela: New Confidential Compute Layer that Brings Private Execution to Public Blockchains Horizen Labs introduces Vela: New Confidential...

Read More

The Regulatory Reckoning for Web3 Privacy: What Enterprises Need to Know

The Regulatory Reckoning for Web3 Privacy: What Enterprises Need to Know

TL;DR Public blockchains aren’t anonymous. They’re pseudonymous, meaning one small data leak can expose a user’s entire transaction history. Privacy...

Read More

Verifiable Federated Learning: Verifying Training, Data Use, and Aggregation

Verifiable Federated Learning: Verifying Training, Data Use, and Aggregation

TL;DR: Federated Learning keeps data private, but it still relies on trust. Clients or aggregators can cheat, poison updates, free-ride, or tamper...

Read More

Go to Blog

BLOG

The Latest Cryptographic Research

5 min read

Verifiable Federated Learning: Verifying Training, Data Use, and Aggregation

Mar 5, 2026Horizen Labs Tech

TL;DR: Federated Learning keeps data private, but it still relies on trust. Clients or aggregators can cheat, poison updates, free-ride, or tamper...

read more
5 min read

Recovering Encrypted Data Without Your Decryption Key

Mar 2, 2026Horizen Labs Tech

Private cloud backups are a vital tool in today’s digital landscape. Backups, in general, allow users to store important information off-site on a...

read more
5 min read

ZK Analysis: The True Cost of ZK Verification

Dec 3, 2025Horizen Labs Tech

How much does it cost to verify a zero-knowledge proof on-chain? And, what does it mean exactly? In this blog post we are going to have a look at...

read more
Read More

STAY UP TO DATE

Subscribe to our newsletter