All it needs for adoption is a compelling use-case.
So, I can't help but wonder if the current furore over vaccine passports (or inevitable international adoption, depending on your viewpoint) has influenced the timing of this announcement...
People have been concerned about security "in the cloud" for a while now. Of course, implementing a function such as this is one thing, being able to prove that your cloud provider actually uses it (rather than pretends to) will be quite another. Do you really know that the CentOS VM you just set up was actually encrypted and is using this system to run, with the key somehow obtained by a method by which the cloud provider has no access?
(And if you're about to say "But it's obviously not going to be for
...from some Python that implements what appear to be "logic gates"? I have no idea what that code is supposed to do. It's not commented, and there's no explanation for what it does a note that says, well, literally this:
This is an implementation of a symmetric SWHE from section 3.2 of "Computing Arbitrary Functions of Encrypted Data" by Craig Gentry. It contains a small modification (namely, the addition of a modulus parameter to allow a greater-than-2-element plaintext s
Okay, stop thinking of computing at such a high level. You have to work at gate level. The line with the c = is the only part that would happen on a cloud server. Read the linked paper.
. The line with the c = is the only part that would happen on a cloud server. Read the linked paper.
Perhaps you posted the wrong link?
For $100/hr, I'll tutor you.
Yeah, maybe one day if I can't get answers and need the information I'll pay someone, but it's not going to be someone who acts like a douchebag because someone else doesn't understand something they've claimed is possible.
Thus far your attempt to say "Nuh-uh, you're wrong" has been to link to a Python script that says nothing useful whatsoev
That code implements the simplest possible homomorphic encryption and operations you can perform. It's based on a paper that's exceedingly easy to understand and is linked in the summary. It's a far better explanation than you'll find anywhere else.
I'm serious. I'm not trying to shit you. It really works. I know, because.. who the hell do you think learned and wrote it?
I should be extra clear: that code is a working example of an explanatory paper on the subject that only supplies pseudocode.
But that paper is THE introduction to the subject.
I have yet to see any problem, however complicated, which, when
you looked at it in the right way, did not become still more complicated.
-- Poul Anderson
Example Use-Case (Score:2)
All it needs for adoption is a compelling use-case.
So, I can't help but wonder if the current furore over vaccine passports (or inevitable international adoption, depending on your viewpoint) has influenced the timing of this announcement...
Re: (Score:2)
People have been concerned about security "in the cloud" for a while now. Of course, implementing a function such as this is one thing, being able to prove that your cloud provider actually uses it (rather than pretends to) will be quite another. Do you really know that the CentOS VM you just set up was actually encrypted and is using this system to run, with the key somehow obtained by a method by which the cloud provider has no access?
(And if you're about to say "But it's obviously not going to be for
Re: (Score:5, Informative)
Uh, the whole point is that you supply encrypted data. If they dont use FHE, you won't get anything useful back. They never get the key.
Re: (Score:1)
So how does the CPU process the data it if it doesn't have a key?
Re: (Score:4, Informative)
https://ijsbeer.org:81/a-symme... [ijsbeer.org]
Code for you. Go learn something.
Re: (Score:2)
Re: (Score:2)
Okay, stop thinking of computing at such a high level. You have to work at gate level. The line with the c = is the only part that would happen on a cloud server. Read the linked paper.
For $100/hr, I'll tutor you.
Re: (Score:3)
Perhaps you posted the wrong link?
Yeah, maybe one day if I can't get answers and need the information I'll pay someone, but it's not going to be someone who acts like a douchebag because someone else doesn't understand something they've claimed is possible.
Thus far your attempt to say "Nuh-uh, you're wrong" has been to link to a Python script that says nothing useful whatsoev
Re:Example Use-Case (Score:2)
That code implements the simplest possible homomorphic encryption and operations you can perform. It's based on a paper that's exceedingly easy to understand and is linked in the summary. It's a far better explanation than you'll find anywhere else.
I'm serious. I'm not trying to shit you. It really works. I know, because.. who the hell do you think learned and wrote it?
Re: (Score:2)
I should be extra clear: that code is a working example of an explanatory paper on the subject that only supplies pseudocode.
But that paper is THE introduction to the subject.