All it needs for adoption is a compelling use-case.
So, I can't help but wonder if the current furore over vaccine passports (or inevitable international adoption, depending on your viewpoint) has influenced the timing of this announcement...
People have been concerned about security "in the cloud" for a while now. Of course, implementing a function such as this is one thing, being able to prove that your cloud provider actually uses it (rather than pretends to) will be quite another. Do you really know that the CentOS VM you just set up was actually encrypted and is using this system to run, with the key somehow obtained by a method by which the cloud provider has no access?
(And if you're about to say "But it's obviously not going to be for
it doesn't need a key. it's just math. you can read the analysis and see the proofs for the limited operations you can perform on the encrypted data. from those primitive operations you can build up an arithmetic system.
Example Use-Case (Score:2)
All it needs for adoption is a compelling use-case.
So, I can't help but wonder if the current furore over vaccine passports (or inevitable international adoption, depending on your viewpoint) has influenced the timing of this announcement...
Re: (Score:2)
People have been concerned about security "in the cloud" for a while now. Of course, implementing a function such as this is one thing, being able to prove that your cloud provider actually uses it (rather than pretends to) will be quite another. Do you really know that the CentOS VM you just set up was actually encrypted and is using this system to run, with the key somehow obtained by a method by which the cloud provider has no access?
(And if you're about to say "But it's obviously not going to be for
Re: (Score:5, Informative)
Uh, the whole point is that you supply encrypted data. If they dont use FHE, you won't get anything useful back. They never get the key.
Re: (Score:1)
So how does the CPU process the data it if it doesn't have a key?
Re: Example Use-Case (Score:2)
it doesn't need a key. it's just math. you can read the analysis and see the proofs for the limited operations you can perform on the encrypted data. from those primitive operations you can build up an arithmetic system.