Skip to main content

Questions tagged [homomorphic-encryption]

Homomorphic encryption is form of encryption which allows mathematical operations to be carried out on an encrypted message, using only the ciphertext. Cryptography.SE may be more suitable for some questions on this topic.

0 votes
3 answers
118 views

Is Homomorphic SQL Query Encryption a good idea - and should I use It?

My web app still needs a lot of work on it in the security department, so I'm considering implementing homomorphic encryption for my SQL database- to help protect from the outcomes of SQLi. I know the ...
security_paranoid's user avatar
0 votes
1 answer
193 views

Confidential Computing - SQL Server Always Encrypted w/ Secure Enclave - Customer Managed Keys or alternative

I am looking into ways to build a data warehouse that would house confidential data for 1+ clients. The requirement is that our organization can never obtain access to the decrypted data. There would ...
jackie's user avatar
  • 101
2 votes
1 answer
154 views

Non-interactive multi key encryption and decryption

I need some serious suggestions on my protocol, specifically for decryption. So the scenario is Organizations A and B encrypt their employees' records with their respective public keys and store them ...
Laila Tul Badar's user avatar
0 votes
0 answers
174 views

PGP public key flagged as malicious to root. Was ran before

Hello I had used this pgp public key on my win10 OS with pgptool to message someone. Then when i used that same public key in whonix OS console it came back with some type of warning about malicious ...
jowblow's user avatar
0 votes
1 answer
281 views

Is it possible to search HTTPS messages using homomorphic encryption?

We're trying to build a packet sniffer that can search and quarantine malware in encrypted transactions without decrypting said transactions. At present, we're exploring whether homomorphic encryption ...
Bill Quesy's user avatar
0 votes
1 answer
156 views

How to safely handle non public data in memory

Alice needs to get non public information from Bob, validate it (let's say check that birth day is between 1900 and now) and forward it to Charlie. There's an end to end encryption between Alice and ...
onetimeguest's user avatar
0 votes
0 answers
101 views

Can homomorphic treatment lead to disclose the context, and so break confidentiality?

Example: I want company X to perform an analysis on the data I output from a campaign of tensile testing. I send them encrypted data and ask them to fit a function between deformation and constraint (...
Cailloumax's user avatar
2 votes
2 answers
714 views

Are there currently any standards for Homomorphic encryption?

I am curious if there are any released standards for homomorphic encryption, or computing on encrypted data. Perhaps by NIST, ANSI, or ISO. If not, are there any that are under development right now? ...
jburcham's user avatar
  • 158
10 votes
2 answers
3k views

What is currently the best Searchable Encryption (SE) algorithm that works in practice?

I'm struggling to find good literature on Searchable Encryption. There are of course a few student papers written in LaTeX using Computer Modern that has some nice Greek soups in them, but none with ...
HelloWorld's user avatar
11 votes
2 answers
932 views

Why is e-voting still a problem?

Electronic voting has been considered technical infeasible for a long time. And recently I watched a video from the channel Computerphile on YouTube where they bring up all the problems that come ...
flxh's user avatar
  • 229
2 votes
1 answer
216 views

Why cant all voters be authorities in homomorphic encryption based voting scemes?

In voting scemes I have seen so far that are based on homomorphic encryption, a group of partially trusted "authorities" share the task of decrypting the result. The voter has to trust at least one of ...
Dieter Cyonce's user avatar
3 votes
1 answer
973 views

How do Cloud Encryption Gateways and CASB work?

Cloud Encryption Gateways (CEG) and Cloud Access Security Brokers(CASB) are becoming popular to ensure the security and confidentiality of the data leaving to Cloud Service Providers. How do they ...
sashank's user avatar
  • 511
9 votes
3 answers
3k views

Difference between fully homomorphic and semi-homomorphic encryption

What is the difference between fully homomorphic and semi-homomorphic encryption?
Willl's user avatar
  • 99
3 votes
1 answer
189 views

Who defined the term "fully homomorphic encryption"?

Rivest et al. proposed the concept of privacy homomorphisms, but did not distinguish between partial versus fully homomorphic encryption. Gentry seems to take for granted the idea that fully ...
user2752467's user avatar
9 votes
1 answer
1k views

E-voting: receipt-free, verifiable, and anonymous

Background In response to a system design concept, a question was posed: How do you achieve electronic voting, anonymity, and verifiability at the same time? I was informed that most experts in ...
Dave Jarvis's user avatar

15 30 50 per page