Enclave is now The Interfold. Learn more

Interfold Community Update: April 2026

Interfold Community Update: April 2026

Over the past development cycle, our focus has been on moving The Interfold from a research-driven prototype toward a system that can operate under real-world conditions. Our goals this month focused on validating the protocol end-to-end, testing the system under secure parameters, and preparing the remaining verification components required for a testnet-ready deployment.

At its core, the Interfold is a distributed network for confidential coordination. It enables multiple independent parties to contribute private inputs to a shared computation without giving a single operator control over execution or outcome release. In practice, that means private inputs remain protected, outcomes remain trust-minimized, and verification can happen without revealing the underlying data.

To achieve that, our recent work has focused on both protocol implementation and the research required to scale it efficiently.


Milestone 2 Completed: End-to-End Protocol Validation

We completed Milestone 2 by running the protocol end to end across a micro-committee of three nodes.

This execution included nearly all major protocol components, with the exception of proof aggregation and onchain proof verification. For this phase, we intentionally used an insecure parameter set to prioritize rapid iteration, integration testing, and system-level debugging. 

This milestone confirmed that the protocol’s core components work together coherently under realistic execution flows. Rather than validating isolated modules, we were able to test the architecture as an integrated whole.

Additional technical progress during this phase included:

  • 90% of protocol circuits implemented and optimized
  • completion of commitment linking across all Rust circuits
  • updated commitment computation so that inputs and outputs remain cryptographically aligned
  • comprehensive internal documentation covering protocol architecture, circuit logic, and implementation details

Together, these improvements give us stronger confidence that the protocol design remains sound as we move toward production.

Milestone 3 Underway: Production Parameters

With the architecture validated, we have now begun Milestone 3, which shifts the project from experimental validation toward production readiness.

The first priority has been rerunning the same committee configuration using secure production-grade cryptographic parameters. While the protocol already functions under test parameters, secure parameters introduce a different class of engineering constraints:

  • increased computational overhead
  • longer proving times
  • memory optimization requirements
  • greater coordination complexity across nodes

These are exactly the engineering constraints that have to be resolved before public deployment.

At the same time, we have started designing the remaining verifiability layer:

  • proof aggregation
  • recursive proof folding
  • onchain proof submission

These components will complete the protocol’s external verification pipeline, making it possible for execution to be verified onchain.

Research & Cryptographic Optimization

Beyond implementation, a significant part of our work has been dedicated to improving the protocol’s long-term scalability. Research has begun into how we can support larger committees more efficiently by refining the cryptographic parameter set. One area of focus is reducing the number of moduli and lowering computational cost, while preserving security guarantees. The goal is to scale beyond small committee sizes without introducing unsustainable performance trade-offs.

Exploring Additional FHE Schemes

We are also investigating support for alternative Fully Homomorphic Encryption (FHE) approaches, including TFHE and related experimental schemes. Expanding beyond the current architecture could provide faster execution for some workloads, better flexibility across use cases, and broader protocol adaptability over time. This research is still ongoing, but it is an important part of evaluating how the protocol should evolve beyond its current implementation path.

Ecosystem Readiness

As technical development continues, we are also improving the documentation and interfaces needed for future ecosystem participation.

Recent efforts include:

  • maintaining up-to-date technical documentation
  • formalizing circuit behavior and interfaces
  • improving developer readability of the protocol stack
  • preparing the codebase for future external contributors

Clear documentation is essential as we move from internal development into a broader ecosystem phase.

What Comes Next

Over the next phase, our focus is on completing the final pieces required before testnet. Immediate priorities include:

  • stabilize execution under secure parameters
  • complete proof aggregation
  • implement onchain proof posting
  • improve performance across larger committee sizes
  • continue protocol optimization for scalability
  • finalize documentation for external review

The transition from prototype to production is where many systems reveal their weaknesses. Our current work is focused on ensuring that the Interfold can meet that challenge with a foundation that is both secure and scalable.

Milestone 2 confirmed that the protocol works as an integrated system. Milestone 3 is about proving that the same system can operate securely under production-grade conditions. We are now entering the phase where The Interfold evolves from a promising research system into infrastructure for confidential coordination under real network conditions. The work ahead remains substantial, but the protocol is steadily moving closer to that goal.

The Interfold x Taiko

We’re excited to announce our partnership with Taiko, bringing the Interfold’s confidential coordination layer to one of Ethereum’s most aligned execution environments. By combining Taiko’s Ethereum-equivalent infrastructure with The Interfold’s privacy-preserving compute, we’re enabling a new class of applications where private user inputs can still produce verifiable onchain outcomes. Initial areas of collaboration include private governance through secret ballots, agentic coordination for DAOs, and sealed-bid market mechanisms that improve fairness without exposing sensitive information. Find out more here

Quick Links

Subscribe to Interfold