LatticaAI Documentation
  • Welcome to LatticaAI
  • Conceptual Guide
  • Architecture Overview
    • Management Client
    • Query Client
  • Platform Workflows
    • Account Management
    • Model Management
    • User Access Management
    • Query Submission
    • Credit Management
    • Worker Management
  • How-To Guides
    • Client Installation
      • How-To: Install Management Client
      • How-To: Install Query Client
    • Model Lifecycle
      • How-To: Deploy AI model
      • How-To: Modify AI Model Settings
    • Access Control
      • How-To: Create User Access Token
      • How-To: Modify User Access Token Setting
      • How-To: Remove Token's Assignment
      • How-To: Assign Token to Model
      • How-To: See List of Tokens
    • Resource Management
      • How-To: Start Worker
      • How-To: Stop Worker
      • How-To: Monitor Worker Performance
    • Secure Query Processing
      • How To: Upload Evaluation Key
      • How-To: Encrypt Input Message
      • How To: Execute Query
      • How-To: Decrypt Output Data
      • How-To: Encrypt, Execute, and Decrypt in One Step
    • Account and Finance Operations
      • How-To: View Payment Transaction History
      • How-To: Update Account Information
      • How-To: View Credit Balance and Add Credit to Your Account
      • How-To: Monitor Balance and Usage
  • Demo Tutorials
    • Image Sharpening with LatticaAI Demo Tutorial
    • Sentiment Analysis with LatticaAI Demo Tutorial
    • Health Analysis with LatticaAI Demo Tutorial
    • Digit Recognition with LatticaAI Demo Tutorial
    • Zooming Into Each Step of Demo Run with LatticaAI flow
Powered by GitBook
On this page

Was this helpful?

Welcome to LatticaAI

NextConceptual Guide

Last updated 2 months ago

Was this helpful?

LatticaAI is a state-of-the-art FHE-as-a-service, powered by off-the-shelf acceleration hardware, to enable secure interactions with AI models.

Our platform provides data privacy and integrity by utilizing homomorphic encryption (FHE) and a client/server usage flow of encrypting, evaluating, and decrypting.

This documentation provides detailed instructions on deploying and querying AI models, ensuring you have all the information needed to use our services effectively.

Prerequisites

This documentation assumes a basic understanding of client/server architecture and fully-homomorphic encryption () terminology.

FHE
FHE client/server usage flow of Encrypt, Evaluate, Decrypt
Page cover image