All it needs for adoption is a compelling use-case.
So, I can't help but wonder if the current furore over vaccine passports (or inevitable international adoption, depending on your viewpoint) has influenced the timing of this announcement...
People have been concerned about security "in the cloud" for a while now. Of course, implementing a function such as this is one thing, being able to prove that your cloud provider actually uses it (rather than pretends to) will be quite another. Do you really know that the CentOS VM you just set up was actually encrypted and is using this system to run, with the key somehow obtained by a method by which the cloud provider has no access?
(And if you're about to say "But it's obviously not going to be for
The idea is that you provide encrypted data, and some description of how to process it, and the math works out such that the computer can process the data -- and generate a sensible, but still encrypted, result without knowing what the inputs or outputs really mean. The ciphertext is generally a lot bigger than the plaintext in order to create mathematical structure that makes the operations on encrypted data sensible, and the operations are far less efficient than the equivalent operation on unencrypted d
Example Use-Case (Score:2)
All it needs for adoption is a compelling use-case.
So, I can't help but wonder if the current furore over vaccine passports (or inevitable international adoption, depending on your viewpoint) has influenced the timing of this announcement...
Re: (Score:2)
People have been concerned about security "in the cloud" for a while now. Of course, implementing a function such as this is one thing, being able to prove that your cloud provider actually uses it (rather than pretends to) will be quite another. Do you really know that the CentOS VM you just set up was actually encrypted and is using this system to run, with the key somehow obtained by a method by which the cloud provider has no access?
(And if you're about to say "But it's obviously not going to be for
Re: (Score:5, Informative)
Uh, the whole point is that you supply encrypted data. If they dont use FHE, you won't get anything useful back. They never get the key.
Re: (Score:1)
So how does the CPU process the data it if it doesn't have a key?
Re: (Score:5, Interesting)
The idea is that you provide encrypted data, and some description of how to process it, and the math works out such that the computer can process the data -- and generate a sensible, but still encrypted, result without knowing what the inputs or outputs really mean. The ciphertext is generally a lot bigger than the plaintext in order to create mathematical structure that makes the operations on encrypted data sensible, and the operations are far less efficient than the equivalent operation on unencrypted d
Re:Example Use-Case (Score:2)