TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A High-Level Technical Overview of Homomorphic Encryption

220 pointsby ggeorgovassilisabout 1 year ago

12 comments

noam_kabout 1 year ago
Amazing summary, Jeremy!<p>One nitpick is regarding the double-CRT: you are referring to the RNS encoding, when the original paper[0] uses the term to talk about how polynomials are stored for fast computation. It&#x27;s a nice philosophical view of decomposing the polynomial Φm(X) into products X − ζi the same way that the integer modulus Q is decomposed into primes. So it&#x27;s more like one CRT on the coefficients, and another implemented as a DFT.<p>[0] <a href="https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2012&#x2F;099" rel="nofollow">https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2012&#x2F;099</a>
评论 #40287447 未加载
kragenabout 1 year ago
for those wondering about the and&#x2F;xor thing, well, of course a nand b is just 1 xor (a and b), but you can do enormously better than that!<p>it turns out there&#x27;s a very pretty formulation of boolean combinational logic (i can&#x27;t bring myself to say &#x27;circuits&#x27;) called zhegalkin polynomials, in which arbitrary boolean functions are just polynomials in gf(2). i wrote a simple implementation of them in <a href="http:&#x2F;&#x2F;canonical.org&#x2F;~kragen&#x2F;sw&#x2F;dev3&#x2F;zhegalkin.py" rel="nofollow">http:&#x2F;&#x2F;canonical.org&#x2F;~kragen&#x2F;sw&#x2F;dev3&#x2F;zhegalkin.py</a>.
gigatexalabout 1 year ago
Again my math ignorance screws me, I wish I had more acumen here to grasp it all but this did catch my eye: “ In one example FHE scheme with lightweight keys, a ciphertext encrypting a single integer is on the order of 25 KB, and the special keys are about 0.5 GB.”
photonthugabout 1 year ago
I’ve been trying to puzzle out the market for this kind of technology.<p>Making truly private data actually useful while retaining the privacy would of course be incredible and the use cases are obvious. But the people that have big data generally are not interested in privacy at all.<p>Academic interest in fhe is understandable since it’s fascinating, but why does industry care? Is this just hedging their bets for if&#x2F;when the future brings stronger data regulation?
评论 #40276494 未加载
评论 #40281400 未加载
评论 #40277744 未加载
评论 #40283720 未加载
评论 #40277254 未加载
dataexpabout 1 year ago
I wonder is there is some restricted kind of homomorphic encryption so that the encryption is tailored to be used for certain kind of programs. For example if the program is to compute the average of a list of numbers then some simple encryption could be done just to compute the average and nothing more. Is there some related concept to this idea of the encryption restricted to a concrete computation?
评论 #40274104 未加载
评论 #40274221 未加载
评论 #40279165 未加载
评论 #40274039 未加载
alexey-salminabout 1 year ago
&gt; For example, it is not be possible to write an FHE program that uses fewer instructions than the program’s worst-case input. Doing so would reveal information that the input is not the worst-case, which contradicts the security of the cryptography. Instead, an FHE program must eagerly compute all branches of if-statements, and then use a select statement to decide which result should be used.<p>What exactly is &quot;select statement&quot;? Curious to know how to select a value without giving away what this value equals to (even in encrypting form). Otherwise I assume it would give away as much as seeing which branch was taken.
评论 #40279282 未加载
评论 #40279267 未加载
dosranabout 1 year ago
I&#x27;ve been following Jeremy&#x27;s blog for some years now and although I don&#x27;t always understand everything, I appreciate it for being a relatively accessible look into the research that&#x27;s going on.<p>&gt; you can implement ciphertext-ciphertext multiplication: x.y = ((x^2 + y^2) - (x^2 - y^2))&#x2F;4<p>However this one part confused me - the RHS seems to simplify to y^2 &#x2F; 2. Is there a mistake here or is this specific to the polynomial fields being worked in? (Or am I being dumb?)
评论 #40273827 未加载
hundredwattabout 1 year ago
&gt; Much of the FHE industry is focused right now on the subset of applications where legal hurdles make the two available options “slow, but compliant” and “fast, but incurs prison time.”<p>Anyone have any examples of these applications?
H8crilAabout 1 year ago
How does multiplication work in LWE? Let&#x27;s say in the non-trippy variant, the &quot;leveled homomorphic encryption&quot;.
jijjiabout 1 year ago
what are potential benefits and use cases of writing a program using FHE if the program is literally a million times slower than a similar program without FHE?
评论 #40278763 未加载
评论 #40279200 未加载
oulipoabout 1 year ago
Very nice! Check also the amazing work by <a href="https:&#x2F;&#x2F;www.zama.ai&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zama.ai&#x2F;</a>
vouaobrasilabout 1 year ago
I believe that homomorphic encryption is one of those technologies that is too dangerous to develop. It is one step to a path where any person on earth will eventually have access to enormous amounts of computation. Is that a good thing? Well, it means one can do high-powered AI research on chemical and biological weapons or advanced malware by using high-powered compute clusters that they may not otherwise have access to. Moreoever, it will be impossible to detect since the computations themselves are encrypted.
评论 #40273657 未加载
评论 #40279186 未加载