Could Fully Homomorphic Encryption Revolutionize Security?
Consider a scenario where there is a computationally inefficient (read, a slow) computer and security analysts need to parse through terabytes of data and extract useful insight. The security analyst will SSH (Secure Shell) into a cloud-based service that their organization will need to rent to perform the computationally tenuous calculations. There is a slight problem, i.e., the data is sensitive and the organization would want to make sure that the cloud-based server does not learn anything about it. How could enterprises perform calculations on data without revealing anything about the input or the outputs?
To find out more about subscribing:
- Expectations and Considerations for the Identity of Things
- Biometric Payments
- Mobile Ticketing: The Diversification Opportunity
- Why Mobile Ticketing Needs to be More than A Virtualization Tool
- Did Apple Miss the Bus - The Display-Integrated Fingerprint Sensor Gives the Industry a Much-Needed Push