{"id":1992,"date":"2019-10-04T05:14:21","date_gmt":"2019-10-04T05:14:21","guid":{"rendered":"http:\/\/kusuaks7\/?p=1597"},"modified":"2024-03-14T11:14:15","modified_gmt":"2024-03-14T11:14:15","slug":"what-is-homomorphic-encryption","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/what-is-homomorphic-encryption\/","title":{"rendered":"What is Homomorphic Encryption?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1992\" class=\"elementor elementor-1992\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-336b8f06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"336b8f06\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42ac21e7\" data-id=\"42ac21e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85e7620 elementor-widget elementor-widget-heading\" data-id=\"85e7620\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3 style=\"color: #aaa;font-style: italic\"><strong>Homomorphic encryption solves a vulnerability inherent in all other approaches to data protection<\/strong><\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b0bd26 elementor-widget elementor-widget-text-editor\" data-id=\"8b0bd26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tImagine if you work in the financial services industry \u2014 or, maybe you already do. Every day, your organization handles a lot of personally identifiable information (PII) and financial data \u2014 information that needs to be encrypted both when it is stored (data at rest) and when it is being transmitted (data in transit). While <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-256-bit-encryption\/\" rel=\"noopener\">modern encryption algorithms are virtually unbreakable<\/a> (because they require so much processing power that it makes the process of breaking it too costly and time-consuming to be feasible), they also make it impossible to process the data without first decrypting it \u2014 and decrypting your data could leave it vulnerable to hackers.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0521521 elementor-widget elementor-widget-text-editor\" data-id=\"0521521\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs such, regardless of whether you\u2019re working with data at rest or data in transit, traditional public key encryption requires that data must be decrypted before it can be analyzed or manipulated. But what if we told you that there is a type of encryption that completely side-steps the need for decrypting the data before you use it \u2014 meaning that data integrity and privacy are protected while you process data in use?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6fd067 elementor-widget elementor-widget-text-editor\" data-id=\"b6fd067\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYeah, you can stop skimming \u2014 we know that caught your attention. There is a way to provide the best and most personalized services to your customers while still preserving their privacy and confidentiality. It\u2019s known as homomorphic encryption (HE). But what exactly is homomorphic encryption and what are some real-world applications for it in data security?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aca0e03 elementor-widget elementor-widget-text-editor\" data-id=\"aca0e03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLet\u2019s hash it out.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac31c96 elementor-widget elementor-widget-heading\" data-id=\"ac31c96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>What is Homomorphic Encryption?<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-936f48c elementor-widget elementor-widget-text-editor\" data-id=\"936f48c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn a nutshell, homomorphic encryption is a method of encryption that allows any data to remain encrypted while it\u2019s being processed and manipulated. It enables you or a third party (such as a cloud provider) to apply functions on encrypted data without needing to reveal the values of the data. A homomorphic cryptosystem is like other forms of public encryption in that it uses a public key to encrypt data and allows only the individual with the matching private key to access its unencrypted data (though there are also examples of symmetric key homomorphic encryption as well). However, what sets it apart from other forms of encryption is that it uses an algebraic system to allow you or others to perform a variety of computations (or operations) on the encrypted data.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d166baa elementor-widget elementor-widget-image\" data-id=\"d166baa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Homomorphic-300x203.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-992bfde elementor-widget elementor-widget-text-editor\" data-id=\"992bfde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn practice, most homomorphic encryption schemes work best with data represented as integers and while using addition and multiplication as the operational functions. This means that the encrypted data can be manipulated and analyzed as though it\u2019s in plaintext format <em>without actually being decrypted<\/em>. <strong>In other words, HE can enable your employees (or a third party) to work with and use the encrypted data without having access to or knowing the contents of the decrypted data. <\/strong>They can compute and process the encrypted data to get an encrypted answer, but only you can decrypt the ciphertext and understand what it means. Homomorphic encryption requires few rounds of interactions and uses arithmetic circuits (which focus on additions and multiplication, allowing you to add and multiply numbers) rather than Boolean circuits like other methods of secure computation (such as two-party computation [2PC] or general multi-party computation [MPC]).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a705410 elementor-widget elementor-widget-heading\" data-id=\"a705410\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Real-World Challenges That Homomorphic Encryption Can Help Solve<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f70a82 elementor-widget elementor-widget-text-editor\" data-id=\"2f70a82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn an ideal world, homomorphic encryption has a multitude of practical, real-world applications \u2014everything from <a href=\"https:\/\/ieeexplore.ieee.org\/document\/7492759\" class=\"broken_link\" rel=\"noopener\">electronic voting systems<\/a> to <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1532046414000884\" class=\"broken_link\" rel=\"noopener\">analyzing medical data<\/a> to <a href=\"https:\/\/eprint.iacr.org\/2016\/801.pdf\" rel=\"noopener\">enabling private queries in search engines<\/a>. Some applications for homomorphic encryption include:\n<ul>\n \t<li><strong>Securing Data Stored in the Cloud.<\/strong> Let\u2019s go back to the idea that you own or work at a financial services company that collects, stores, and uses sensitive personal and financial information. Your organization uses this data to deem whether customers qualify for lending. You want to store this information in the cloud to free up IT resources but don\u2019t fully trust the security of your cloud software-as-a-service (SaaS) provider. (Considering that <a href=\"https:\/\/www.techrepublic.com\/article\/why-your-data-in-the-cloud-isnt-as-secure-as-you-think\/\" class=\"broken_link\" rel=\"noopener\">cloud storage isn\u2019t always as secure as we\u2019d like<\/a>, that isn\u2019t a far-fetched concern.) Using homomorphic encryption, you can secure the data that you store in the cloud while also retaining the ability to calculate and search ciphered information that you can later decrypt without compromising the integrity of the data as a whole. It\u2019s a win-win scenario for your business as well as your customers.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f520f8 elementor-widget elementor-widget-image\" data-id=\"4f520f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Cloud-Encryption-300x231.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-978d112 elementor-widget elementor-widget-text-editor\" data-id=\"978d112\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><strong>Enabling Data Analytics in Regulated Industries<\/strong>. Homomorphic encryption allows data to be encrypted and outsourced to commercial cloud environments for research and data-sharing purposes \u2014 all while protecting user or patient data privacy. It can be used for businesses and organizations across a variety of industries including financial services, retail, information technology, and healthcare to allow people to use data without seeing its unencrypted values. For example, homomorphic encryption allows predictive analytics service providers to safely analyze medical data without putting data privacy at risk.<\/li>\n \t<li><strong>Improving Election Security and Transparency.<\/strong> Researchers are working on how to use homomorphic encryption to make democratic elections more secure and transparent. For example, the Paillier encryption scheme, which uses addition operations, would be best suited for voting-related applications because it allows users to add up various values in an unbiased way while keeping their values private. This technology could not only protect data from manipulation, it could allow it to be independently verified by authorized third parties.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b288498 elementor-widget elementor-widget-image\" data-id=\"b288498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Securing-Elections-300x113.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f35375d elementor-widget elementor-widget-text-editor\" data-id=\"f35375d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Homomorphic encryption helps to protect the integrity of your data by allowing others to manipulate its encrypted form while no one (aside from you as the private key holder) can understand or access its decrypted values.<\/strong> Compare this to the encryption methods used by traditional cloud storage and computation solutions, which cannot run computations on encrypted data. This means that the cloud provider and\/or app would require access to unencrypted data to perform computational functions on it. This practice exposes your organization\u2019s or customers\u2019 sensitive data to potentially insecure cloud operators and hackers who want your data.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1781edf elementor-widget elementor-widget-text-editor\" data-id=\"1781edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNow that\u2019s what we call progress \u2014 but it\u2019s going to take some time before we see the application of homomorphic encryption on a larger scale.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed0d1e1 elementor-widget elementor-widget-heading\" data-id=\"ed0d1e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Types of Homomorphic Encryption<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a7b7ba elementor-widget elementor-widget-text-editor\" data-id=\"2a7b7ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThere are three main types of homomorphic encryption. The primary difference between them boils down to the types and frequency of mathematical operations that can be performed on their ciphertext. The three types of homomorphic encryption include:\n<ul>\n \t<li>Partially Homomorphic Encryption<\/li>\n \t<li>Somewhat Homomorphic Encryption<\/li>\n \t<li>Fully Homomorphic Encryption<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a63097 elementor-widget elementor-widget-image\" data-id=\"2a63097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/Homomorphic-encryption-300x246.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b33528e elementor-widget elementor-widget-text-editor\" data-id=\"b33528e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPartially homomorphic encryption (PHE) helps sensitive data remain confidential by only allowing select mathematical functions to be performed on encrypted values. This means that one operation can be performed an unlimited number of times on the ciphertext. Partially homomorphic encryption (with regard to multiplicative operations) is the foundation for RSA encryption, which is commonly used in establishing secure connections through SSL\/TLS. Some examples of PHE include ElGamal encryption (a multiplication scheme) and Paillier encryption (an addition scheme).\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-585f9c9 elementor-widget elementor-widget-text-editor\" data-id=\"585f9c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA somewhat homomorphic encryption (SHE) scheme is one that supports limited operations (for example, either addition or multiplication) up to a certain complexity, but these operations can only be performed a set number of times. This is the precursor to fully homomorphic encryption, which we\u2019ll discuss more in depth momentarily.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b19570 elementor-widget elementor-widget-heading\" data-id=\"4b19570\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>What is Fully Homomorphic Encryption?<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10743e0 elementor-widget elementor-widget-text-editor\" data-id=\"10743e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFully homomorphic encryption (FHE), while still in the development stage, has a lot of potential for making functionality consistent with privacy by helping to keep information secure and yet still accessible. Born from a somewhat homomorphic encryption scheme, this holy grail of cryptography is capable of using any efficiently computable functions (such as addition and multiplication, not just one or the other) any number of times and makes secure multi-party computation more efficient. Unlike other forms of homomorphic encryption, it can handle arbitrary computations on your ciphertexts.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c468c53 elementor-widget elementor-widget-text-editor\" data-id=\"c468c53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe goal behind fully homomorphic encryption is to allow anyone to use encrypted data to perform useful operations without access to the encryption key. In particular, this concept has applications for improving cloud computing security. If you want to store encrypted, sensitive data in the cloud but don\u2019t trust your cloud provider or want to run the risk of a hacker breaking in your cloud account\/app, it provides you with a way to pull, search, and manipulate your data without having to allow the cloud provider or Google access to the data on the files you want to access.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-350235c elementor-widget elementor-widget-text-editor\" data-id=\"350235c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCraig Gentry, an American computer scientist and Research Fellow at Algorand Foundation, <a href=\"https:\/\/www.youtube.com\/watch?v=pXb39wj5ShI\" rel=\"noopener\">describes his version of homomorphic encryption \u2014 fully homomorphic encryption<\/a> \u2014 in terms of a glovebox analogy:\n<blockquote><em>\u201cSo, basically, anybody can come and they can stick their hands inside the gloves and manipulate what\u2019s inside the locked box. They can\u2019t pull it out, but they can manipulate it; they can process it. They can take raw materials and produce a necklace or something inside the box. And, you know, they finish and [the person with the private key] has to come with the secret key and open it up, and only they can extract the finished product out of there.\u201d<\/em><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ada93ab elementor-widget elementor-widget-heading\" data-id=\"ada93ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>So Why Aren\u2019t We Using Fully Homomorphic Encryption? Well, It\u2019s Still Pretty Slow\u2026<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03edb33 elementor-widget elementor-widget-text-editor\" data-id=\"03edb33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe catch of using this form of encryption is that its versatility comes at the expense of speed. Unfortunately, in its current state, homomorphic encryption is impractically slow. In the encryption race, it\u2019s running in last place. This is, in part, because homomorphic encryption has a larger computational overhead than plaintext operations.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f10416 elementor-widget elementor-widget-text-editor\" data-id=\"1f10416\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nWith the goal of making homomorphic encryption widespread, IBM <a href=\"https:\/\/www.theregister.co.uk\/2018\/03\/08\/ibm_faster_homomorphic_encryption\/\" rel=\"noopener\">released its first version of its HElib C++ library<\/a> in 2016 \u2014 but it reportedly \u201cran \u2018100 trillion times\u2019 slower than plaintext operations.\u201d Since that time, IBM has continued working to combat this issue and have now come up with a version that is 75 times faster\u2026 but even that is still incredibly slow in comparison to working with unencrypted data. Researchers, like Gentry, are working to find ways to speed up the process for data in use\/data in process applications. One data security company, ENVEIL, proclaims to <a href=\"https:\/\/www.globenewswire.com\/news-release\/2019\/02\/06\/1711466\/0\/en\/Enveil-Partners-with-Thales-to-Expand-Protections-for-Sensitive-Data.html\" rel=\"noopener\">use homomorphic encryption<\/a> as part of their framework for protecting data in use. Another company, a startup named Duality, is <a href=\"https:\/\/www.fastcompany.com\/90314942\/duality-homomorphic-encryption\" class=\"broken_link\" rel=\"noopener\">working to create business products<\/a> that will allow companies to share raw data with third parties without them having access to it. We\u2019ve never used either of their services, so we can\u2019t speak to the success or functionality of their services.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f26e72 elementor-widget elementor-widget-text-editor\" data-id=\"1f26e72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo help software engineers with the process of utilizing a practical form of homomorphic encryption, Microsoft\u2019s Cryptography Research group came up with <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/project\/microsoft-seal\/\" rel=\"noopener\">Microsoft Simple Encrypted Arithmetic Library (Microsoft SEAL)<\/a>, an open-source homomorphic encryption library. This technology platform, written in C++, allows software engineers to create data storage and computation services for organizations that offer end-to-end encryption while never requiring them to share their key. The goal, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/blog\/the-microsoft-simple-encrypted-arithmetic-library-goes-open-source\/\" rel=\"noopener\">Microsoft says<\/a>, is to \u201cput our library in the hands of every developer, so we can work together for more secure, private, and trustworthy computing.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cbcc79 elementor-widget elementor-widget-text-editor\" data-id=\"8cbcc79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHopefully, between the work of these groups and researchers like Gentry, we\u2019ll be able to see a faster version of fully homomorphic encryption on the horizon that we can apply to a variety of real-world applications across different industries.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a817f7 elementor-widget elementor-widget-heading\" data-id=\"2a817f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>The Origins of Homomorphic Cryptosystems<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c956f6d elementor-widget elementor-widget-text-editor\" data-id=\"c956f6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe origins of homomorphic encryption dates back to 1978 \u2014 shortly after Rivest, Shamir and Adleman presented RSA encryption \u2014 which is a long time in the world of technology. Rivest, Adleman, and Dertouzos came up with the concept of <a href=\"http:\/\/luca-giuzzi.unibs.it\/corsi\/Support\/papers-cryptography\/RAD78.pdf\" rel=\"noopener\">privacy homomorphisms<\/a>. Their concept of encryption was shot down by Brickell and Yacobi nearly 10 years later. Other researchers have \u201chad a go\u201d at the topic \u2014 such as Feigenbaum and Merritt \u2014 but, really, no major progress was made until Gentry, a graduate student at Stanford University, decided to try his hand at creating an algebraically homomorphic encryption system as his <a href=\"https:\/\/crypto.stanford.edu\/craig\/craig-thesis.pdf\" rel=\"noopener\">graduate thesis<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9cdbf0f elementor-widget elementor-widget-image\" data-id=\"9cdbf0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.thesslstore.com\/blog\/wp-content\/uploads\/2019\/06\/History-of-Homomorphic-Encryption-300x267.png\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10b5877 elementor-widget elementor-widget-text-editor\" data-id=\"10b5877\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGentry, who is an esteemed MacArthur Foundation fellow and worked as Research scientist in the Cryptography Research Group at the IBM Thomas J. Watson Research Center, established the first fully homomorphic encryption scheme in 2009. His research was followed by others\u2019 variations of homomorphic encryption schemes in the years to come.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8ba05 elementor-widget elementor-widget-heading\" data-id=\"5d8ba05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Final Thoughts<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb1d094 elementor-widget elementor-widget-text-editor\" data-id=\"eb1d094\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe concept of homomorphic encryption \u2014 fully homomorphic encryption in particular \u2014 is one with a lot of promise for real-world applications across a variety of industries. However, the trick is finding a way to decrease the computational overhead and speed up the process for use on a larger scale. Regardless of the progress that is slowly being made in the area of homomorphic encryption, it\u2019s vital that you also not neglect your data in storage and data in transit protections as well in the meantime.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Homomorphic encryption solves a vulnerability inherent in all other approaches to data protection Imagine if you work in the financial services industry \u2014 or, maybe you already do. Every day, your organization handles a lot of personally identifiable information (PII) and financial data \u2014 information that needs to be encrypted both when it is stored<\/p>\n","protected":false},"author":602,"featured_media":4148,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3308],"class_list":["post-1992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3308,"user_id":602,"is_guest":0,"slug":"casey-crane","display_name":"Casey Crane","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_62b93d4d-9128-4c88-bf3a-1ca52c8ea99f-150x150.jpg","user_url":"https:\/\/www.thesslstore.com\/","last_name":"Crane","first_name":"Casey","job_title":"","description":"Casey Crane is Cybersecurity Journalist and SEO Content Manager at The SSL Store\u2122. She is a regular contributor to Hashed Out and Infosec Insights with experience in journalism and writing, including crime analysis and IT security."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/602"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1992"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1992\/revisions"}],"predecessor-version":[{"id":36441,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1992\/revisions\/36441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/4148"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1992"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}