Towards Homomorphic Capsules for the Agentic Web
An update from the protocol ecosystem
Towards Homomorphic Capsules for the Agentic Web
As .llmfeed.json
feeds gain adoption as signed, trusted capsules for agent interaction, a natural question arises:
π Could we also enable manipulation of encrypted data β while maintaining the integrity, trust, and context of the feed?
Why it matters
A .llmfeed.json
feed is already a capsule:
β
It encapsulates a payload
β
It defines a context
β
It carries signatures and optionally certifications
β
It guarantees integrity across agent pipelines
In many domains (healthcare, finance, public services), we need more:
π The ability to process the capsule β without exposing raw data β while maintaining:
β
End-to-end integrity
β
Auditability
β
Agent-friendly structure
The role of Homomorphic Encryption
Homomorphic encryption (HE) offers exactly this potential:
π It allows computations to be performed directly on encrypted data β producing encrypted results, without ever decrypting intermediate states.
A natural match with .llmfeed.json
If feeds become the lingua franca of the Agentic Web, adding homomorphic fields would enable:
- Privacy-preserving agent pipelines
- Auditable multi-agent workflows
- Composable agent chains for sensitive domains
- Safe cross-domain processing without compromising trust
A draft extension
We have begun exploring a hypothetical extension:
"homomorphic_encryption": {
"applied_to": ["data"],
"algorithm": "BFV",
"public_parameters": "https://example.com/params.json",
"notes": "Data is homomorphically encrypted to allow LLM-safe processing without exposing raw data."
}
Certification and trust layers
A natural evolution of this vision is a multi-layer trust model:
1οΈβ£ LLMCA Certification (capsule and context)
LLMCA can certify that:
β
The .llmfeed.json
feed:
β respects the LLMFeed standard
β correctly structures the signed capsule
β has valid trust fields
β exposes a verifiable agent-friendly context
2οΈβ£ FHE-specific Certification (payload encryption)
A specialized authority (e.g. Zama or equivalent) could certify that:
β The homomorphically encrypted payload:
- Follows approved FHE algorithms
- Uses safe parameters
- Is processable across trusted agent pipelines
- Complies with domain-specific privacy constraints
Combined value
This dual certification model would enable:
β
A .llmfeed.json
feed that is:
- agent-ready
- cryptographically trusted
- safe for privacy-preserving pipelines
- traceable and auditable
In many sectors (healthcare, finance, public services), this represents a game-changing architecture:
β For the first time, agents could legally and safely process encrypted data β inside a trusted capsule β across organizational and jurisdictional boundaries.
Practical agentic pipelines β examples
To illustrate the potential of homomorphic capsules, here are some practical agent pipeline scenarios:
π₯ Healthcare Data Processing
Actors:
- Hospital A emits a
.llmfeed.json
of patient statistics (non-identifiable), with homomorphic encryption applied todata
. - Feed is signed and LLMCA certified.
- Payload encryption is certified by a FHE health data authority.
Pipeline:
1οΈβ£ Hospital A β emits feed_type: export
with homomorphic_encryption
on data
.
2οΈβ£ Research Agent β receives feed β performs encrypted aggregation (average, sum) β without decrypting.
3οΈβ£ Transmits same feed (with updated trust
block) to Ministry of Health agent.
4οΈβ£ Ministry agent performs further homomorphic analysis β produces public statistical report β without ever seeing raw data.
π³ Financial Risk Scoring
Actors:
- Bank X emits a
credential
orpricing
feed with FHE-protected financial indicators. - Feed is signed + certified.
- Third-party agents perform scoring on encrypted fields.
Pipeline:
1οΈβ£ Bank X β emits credential
feed.
2οΈβ£ Regulatory Agent β performs compliance checks on encrypted indicators.
3οΈβ£ Trusted Scoring Agent β computes FHE-based risk score.
4οΈβ£ Result is re-integrated in the agent workflow β without raw financial data exposure.
ποΈ Public Administration β Cross-Agency Process
Actors:
- Agency A (e.g., tax) β emits an
mcp
feed with encrypted citizen profile. - Agency B (e.g., housing) β processes feed without decrypting sensitive fields.
- Agency C (e.g., healthcare) β adds insights β without breaking the chain of trust.
Pipeline:
1οΈβ£ Agency A β emits homomorphic feed.
2οΈβ£ Agencies B and C process in parallel β add metadata β forward to central decision agent.
3οΈβ£ Final action performed β all traceable β no raw citizen data exposed.
A call to explore
If there is interest in the community β researchers, implementers, agent platform builders β we are ready to:
β
Prototype the extension
β
Evolve the standard to support HE as first-class citizen
β
Partner with homomorphic encryption leaders (Zama, we would love to talk!)
β
Enable the "holy grail" of agent pipelines:
β encrypted, manipulable payloads inside a verifiable, signed, agent-friendly capsule
Next steps
We invite:
- Researchers in HE
- Agent framework builders
- Privacy advocates
- Regulated industry experts
β¦ to help us explore this path.
LLMCA / WellKnownMCP is an open forum β this is the kind of extension that can define the future of trusted agentic infrastructures.
Letβs build it β together.