TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Homomorphic encryption

106 pointsby azujusalmost 6 years ago

13 comments

KenoFischeralmost 6 years ago
There is a decent size effort to build a system that runs (a restricted, but hopefully useful subset of) Julia programs fully homomorphically (as well as supporting various sort of secure multiparty computation protocols). At JuliaCon two years ago, the Galois folks talked about their initial prototype of this work: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=_KLlMg6jKQg" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=_KLlMg6jKQg</a> (fun to watch even if you don&#x27;t care about julia to see FHE &quot;in action&quot;). This effort was recently funded with the goal of extending the prototype into a full robust system, so I&#x27;m hoping for some good news here over the next couple of years.
tuxxyalmost 6 years ago
If anyone is interested in playing with Fully Homomorphic Encryption, we (NuCypher YC S16) built NuFHE (<a href="https:&#x2F;&#x2F;github.com&#x2F;nucypher&#x2F;nufhe&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;nucypher&#x2F;nufhe&#x2F;</a>). It&#x27;s written in Python and has excellent documentation, so you can try building some circuits and playing around with it. It requires a GPU to run, but it&#x27;s also the fastest implementation of FHE in the world (that I know of).<p>Let me know what you think! :)
评论 #20595856 未加载
Ivalmost 6 years ago
Seriously one of the most important area of mathematics for democracies in an online world.<p>Homomorphic encryption promises a hidden and verifiable online voting system that does not rely on trusting third party.
评论 #20594520 未加载
评论 #20595120 未加载
评论 #20594455 未加载
评论 #20596094 未加载
评论 #20594607 未加载
wish5031almost 6 years ago
If this interests you, a related concept with similar applications as HE is functional encryption: <a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Functional_encryption" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Functional_encryption</a>
评论 #20597377 未加载
doctorpanglossalmost 6 years ago
The technology for all this progress was a huge discovery in 2009. But what if it is a dead end, that nothing originating from that discovery will ever be practical?<p>Like wouldn&#x27;t it be preposterous if someone said, &quot;Here Craig Gentry, take $1 billion to run enough computers for the current FHE schemes. What is the snazziest demo you can run?&quot;
评论 #20595115 未加载
评论 #20594446 未加载
评论 #20594458 未加载
评论 #20594535 未加载
kttaalmost 6 years ago
A very casual (layman&#x27;s?) introduction intro to Homomorphic Encryption - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13450015" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13450015</a>
bikeshavingalmost 6 years ago
Why do people always talk about arbitrary computation in relation to homomorphic encryption? What I really want is a homomorphic encryption system which allows me to arbitrarily slice and concatenate strings without knowing their contents. This would be immensely useful for implementing end-to-end encrypted collaborative editing of documents. Is homomorphic encryption there yet?
评论 #20595691 未加载
评论 #20595637 未加载
评论 #20595794 未加载
buzzdenveralmost 6 years ago
For a layman like me it sounds really cool, almost like magic. Consider a trivial operation like finding a maximum value in a list. How is that supposed to work on encrypted values while simultaneously providing strong encryption? So something like adding N to everything in the list is not an acceptable encryption.
评论 #20596419 未加载
评论 #20595370 未加载
评论 #20595931 未加载
rchalmost 6 years ago
I&#x27;ve run into a few people working on this over the last five years or so, but they&#x27;ve been a bit cagey about discussing their use cases and customers.<p>Any public applications outside of blockchain?
评论 #20595030 未加载
评论 #20594432 未加载
评论 #20594501 未加载
评论 #20594404 未加载
crdrostalmost 6 years ago
To address the inevitable “what is this useful for” questions, my go-to example is cryptographic voting mechanisms.<p>The idea is that you segment a large integer into a couple of different bins by its bitwise representation. So you have a 60-bit integer and you segment it into four 15-bit bins. You use one of those to randomize what the encrypted versions are going to be, and you use the other three for different vote tallies of three candidates for some office.<p>You can then hand people three numbers each corresponding to a different candidate, and ask them to commit to one as their vote. Public authorities can then aggregate votes which they cannot actually see, and we don&#x27;t decrypt until we get to some large enough context where your vote has been anonymized among ten thousand others, and you can check that the random seeds have been properly added, or other such things.<p>This also allows you to create a big online database where anybody can see their vote was counted, but nobody can figure out who someone else voted for.<p>There is a slight difficulty in that you cannot see directly what your numbers are actually voting for, so that the machines you are using to vote with need to be able to decrypt a ballot for you and then immediately destroy it, to verify that it was what you thought it was, so that you can trust that your three numbers do not all happen to vote for the same person because if someone tried that on any scale that could affect an election, even if they only poison 1% of ballots in a 500 person district, if everyone burns one to test the system then the fraud gets discovered at least once with 99.3% certainty. But the point is that all of these other issues can be handled “out-of-band” once you protect the important stuff.
评论 #20594565 未加载
评论 #20594816 未加载
评论 #20594724 未加载
dustfingeralmost 6 years ago
Could a fully homomorphic cpu architecture with fully encrypted cache be immune to Spectre and similar side channel attacks? Could this be tested on an FPGA?
评论 #20595562 未加载
Nightshaxxalmost 6 years ago
My school is working on this right now. Seriously awesome.
ameliusalmost 6 years ago
Are these schemes theoretically resistant against quantum computing?
评论 #20595304 未加载