Horizen Labs
Solutions
Confidential Verification for Defense
Quantum Resistance
Systems
Horizen
Regulatory-compliant Privacy Layer
zkVerify
#1 Universal Verification System
Kurier
Zero Knowledge Proof Verification APIs
Vela
Confidential Compute Layer for the Open Market
Discover
Use Cases
Blog
Company
About Us
How We Work With You
Newsroom
Careers
Contact Us
Horizen LabsHorizen Labs

Offices:

US – New York, San Juan - PR

Italy – Milan

Singapore

© 2026 Horizen Labs. All rights reserved.

Privacy Policy

Building the Infrastructure of the Verifiable Web

Make advanced cryptography usable, so organizations can build, transact, and coordinate with confidence and privacy.

We build systems that make truth verifiable and privacy practical. From our own products to mission-critical client work, we deliver privacy tech, protocol design, and post-quantum readiness built for production.

Talk to an Expert

Privacy Solutions for High-Stakes Environments

We embed applied cryptographic research into real and high-performance system design, so privacy and verification work under operational constraints, not just in theory.

We build privacy solutions that protect sensitive work and stand up to real-world scrutiny, scale, and change.

Our Expertises

Privacy Technology

We build privacy systems using zero-knowledge proofs and TEEs to protect confidentiality with controlled disclosure.

Cryptographic Primitives and Protocol Design

We design the cryptographic foundations and protocols behind secure systems.

Production Engineering and Delivery

We deliver end-to-end product engineering, designed for real operations.

Post-Quantum Readiness

We help teams assess risk and plan migration paths, so critical systems stay secure as post-quantum standards and threats evolve.

High-Stakes
Delivery at Scale

We launch and operate mission-critical systems where security, uptime, and migration risk are non-negotiable.

01

Secure and Reliable Execution

Security-first delivery; designed for long-term operability and upgrades.

02

Large-scale Launches & Migrations

Complex launches and live migrations with minimal disruption.

03

Proven in Production

Built for real load, adversarial conditions, and operational constraints.

01

Secure and Reliable Execution

Security-first delivery; designed for long-term operability and upgrades.

02

Large-scale Launches & Migrations

Complex launches and live migrations with minimal disruption.

03

Proven in Production

Built for real load, adversarial conditions, and operational constraints.

Systems We've Built and Operated

Regulatory-Compliant Privacy Layer

A platform designed to protect confidential information while preserving verifiable integrity. Reduces real-world exposure risk without sacrificing auditability.

  • Confidential transactions and workflows on public rails

  • Selective disclosure for compliance and oversight

  • Privacy-preserving integrations for apps and services

Explore horizen

Universal Verification System

High-Stakes Ecosystem Infrastructure

Regulatory-Compliant Privacy Layer

Universal Verification System

High-Stakes Ecosystem Infrastructure

A platform designed to protect confidential information while preserving verifiable integrity. Reduces real-world exposure risk without sacrificing auditability.

  • Confidential transactions and workflows on public rails

  • Selective disclosure for compliance and oversight

  • Privacy-preserving integrations for apps and services

Explore horizen

We partner end-to-end, from architecture and security design to implementation, integration, and operational readiness.

Backed By

DCG logo
Liberty City Ventures logo
Kenetic logo
LionTree logo
SOUND logo
Deribit logo

Blog

The Latest Updates

Are You Ready for Quantum Threat

Harvest Now, Decrypt Later: The Quantum Threat is Active Today

The quantum threat isn't waiting for a sufficiently powerful computer to exist. It's already operational in the form of state-sponsored actors intercepting your encrypted data today, stockpiling it, and waiting for a quantum computer to finish the job.

Read More

The AI Agent Trust Problem: Why You Can't Verify What Agents Actually Do

The AI Agent Trust Problem: Why You Can't Verify What Agents Actually Do

An agent says it ran 16 security checks on your smart contract. Did it actually run all 16? Did it run any? Right now, there's no way to know.

Read More

Multipass Sandbox: The Missing Layer Between AI Agents and Your Production Secrets

Multipass Sandbox: The Missing Layer Between AI Agents and Your Production Secrets

Autonomous AI coding agents are powerful when you take the brakes off. On a blockchain engineer's machine, that also means the agent has access to private keys, deployment credentials, and API secrets for production systems. A single leak is irreversible. The recommended fix, Docker sandboxing, falls short in ways that actually matter in practice. We needed something that contained the blast radius without breaking the workflow. This is what we built.

Read More

Go to Blog

BLOG

The Latest Cryptographic Research

2 min read

Recovering Encrypted Data Without Your Decryption Key

Mar 2, 2026Horizen Labs Tech

Private cloud backups are a vital tool in today’s digital landscape. Backups, in general, allow users to store important information…

read more
5 min read

Griffin: Fast and Efficient Hashing in Zero-Knowledge Settings

Jul 25, 2023Horizen Labs Tech

This work is the result of a collaboration between Horizen Labs and various universities and other companies, including Graz University of…

read more
5 min read

Introducing Monolith, for faster hashing in ZK settings

Jul 12, 2023Horizen Labs Tech

Evaluating hash functions is a major bottleneck in many modern proving systems. Introducing Monolith, the fastest hash function to-date.

read more
Read More

Stay Up to Date

Subscribe to our newsletter