Questions tagged [homomorphic-encryption]
Homomorphic encryption is form of encryption which allows mathematical operations to be carried out on an encrypted message, using only the ciphertext. Cryptography.SE may be more suitable for some questions on this topic.
24
questions
0
votes
3
answers
118
views
Is Homomorphic SQL Query Encryption a good idea - and should I use It?
My web app still needs a lot of work on it in the security department, so I'm considering implementing homomorphic encryption for my SQL database- to help protect from the outcomes of SQLi.
I know the ...
0
votes
1
answer
193
views
Confidential Computing - SQL Server Always Encrypted w/ Secure Enclave - Customer Managed Keys or alternative
I am looking into ways to build a data warehouse that would house confidential data for 1+ clients. The requirement is that our organization can never obtain access to the decrypted data. There would ...
2
votes
1
answer
154
views
Non-interactive multi key encryption and decryption
I need some serious suggestions on my protocol, specifically for decryption.
So the scenario is Organizations A and B encrypt their employees' records with their respective public keys and store them ...
0
votes
0
answers
174
views
PGP public key flagged as malicious to root. Was ran before
Hello I had used this pgp public key on my win10 OS with pgptool to message someone.
Then when i used that same public key in whonix OS console it came back with some type of warning about malicious ...
0
votes
1
answer
281
views
Is it possible to search HTTPS messages using homomorphic encryption?
We're trying to build a packet sniffer that can search and quarantine malware in encrypted transactions without decrypting said transactions.
At present, we're exploring whether homomorphic encryption ...
0
votes
1
answer
156
views
How to safely handle non public data in memory
Alice needs to get non public information from Bob, validate it (let's say check that birth day is between 1900 and now) and forward it to Charlie. There's an end to end encryption between Alice and ...
0
votes
0
answers
101
views
Can homomorphic treatment lead to disclose the context, and so break confidentiality?
Example:
I want company X to perform an analysis on the data I output from a campaign of tensile testing. I send them encrypted data and ask them to fit a function between deformation and constraint (...
2
votes
2
answers
714
views
Are there currently any standards for Homomorphic encryption?
I am curious if there are any released standards for homomorphic encryption, or computing on encrypted data. Perhaps by NIST, ANSI, or ISO. If not, are there any that are under development right now? ...
10
votes
2
answers
3k
views
What is currently the best Searchable Encryption (SE) algorithm that works in practice?
I'm struggling to find good literature on Searchable Encryption. There are of course a few student papers written in LaTeX using Computer Modern that has some nice Greek soups in them, but none with ...
11
votes
2
answers
932
views
Why is e-voting still a problem?
Electronic voting has been considered technical infeasible for a long time. And recently I watched a video from the channel Computerphile on YouTube where they bring up all the problems that come ...
2
votes
1
answer
216
views
Why cant all voters be authorities in homomorphic encryption based voting scemes?
In voting scemes I have seen so far that are based on homomorphic encryption, a group of partially trusted "authorities" share the task of decrypting the result.
The voter has to trust at least one of ...
3
votes
1
answer
973
views
How do Cloud Encryption Gateways and CASB work?
Cloud Encryption Gateways (CEG) and Cloud Access Security Brokers(CASB) are becoming popular to ensure the security and confidentiality of the data leaving to Cloud Service Providers. How do they ...
9
votes
3
answers
3k
views
Difference between fully homomorphic and semi-homomorphic encryption
What is the difference between fully homomorphic and semi-homomorphic encryption?
3
votes
1
answer
189
views
Who defined the term "fully homomorphic encryption"?
Rivest et al. proposed the concept of privacy homomorphisms, but did not distinguish between partial versus fully homomorphic encryption. Gentry seems to take for granted the idea that fully ...
9
votes
1
answer
1k
views
E-voting: receipt-free, verifiable, and anonymous
Background
In response to a system design concept, a question was posed:
How do you achieve electronic voting, anonymity, and verifiability at the same time?
I was informed that most experts in ...