TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

IBM Fully Homomorphic Encryption Toolkit for Linux

152 点作者 0xedb将近 5 年前

4 条评论

dowem将近 5 年前
Hi Hackers! This is Eli (one of the authors of the toolkit). I wanted to make sure you all know you can check out the code. It is freely available on GitHub as linked by the OP. The press this weekend in places like Ars talks about trials, which we did and those were awesome, but the real story right now is the toolkits are out there for anyone to get access to the tech. I love that it was shared here. Several posts on Ycombiantor have come up as a result.<p>I just wanted to say that I think we packaged some cool demos in the toolkit. One is the privacy preserving search we debuted in the MacOS toolkit we put out a few weeks ago, and this one also has a fully encrypted neural network inference over credit card fraud data. If you like encryption, or like the idea of encrypted machine learning check it out! We built all the special dependencies for you, along with an integrated IDE setup to run the examples trivially. The encrypted ML example also uses a brand new, fresh out of the IBM research kitchen, encrypted machine learning library that makes it work.<p>This stuff is not fiction it is real and you can run it today if you want! Our toolkit is based on Docker and comes in Ubuntu, Fedora, and CentOS. You can even pull the docker images from Docker Hub. IF you want to see more of this effort show us some love on GitHub and Docker Hub by smashing that star button! Instructions are in the readme. Most people who know docker can get up to speed and running in less than 10 minutes. <a href="https:&#x2F;&#x2F;github.com&#x2F;IBM&#x2F;fhe-toolkit-linux&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;IBM&#x2F;fhe-toolkit-linux&#x2F;</a>.<p>Monitoring the entirety of the internet for good questions and comments is not one of my superpowers. If anyone has questions get in touch with us on slack directly. The development team is here to help. Questions are great, we are trying to get together an FAQ. Hit us up on Slack here: <a href="https:&#x2F;&#x2F;app.slack.com&#x2F;client&#x2F;T0133ARBGBV#&#x2F;" rel="nofollow">https:&#x2F;&#x2F;app.slack.com&#x2F;client&#x2F;T0133ARBGBV#&#x2F;</a>. We want your feedback, questions, and ideas to help spread the word.<p>P.S. Thanks to user Darkstryder and throw0101a who commented below! You did some nice explanation for KaiserPros question, and shared some nice links for this community!
评论 #24029436 未加载
评论 #24030976 未加载
评论 #24029260 未加载
KaiserPro将近 5 年前
What kind of operations can one actually do on the encrypted data? I&#x27;m struggling to understand what the use cases are<p>(I saw the one about machine learning, but thats broad and vague.)
评论 #24027567 未加载
评论 #24028162 未加载
评论 #24027253 未加载
评论 #24028397 未加载
评论 #24027270 未加载
评论 #24028949 未加载
评论 #24027095 未加载
ColanR将近 5 年前
I don&#x27;t have a great understanding of the algorithms here, but I have a question.<p>If I had some data encrypted with these tools, which I made public for multiple entities to process, is it possible for me to allow them to add data to the encrypted system? i.e., is there a way for multiple entities to add more data to the encrypted data (and do calculations with the encrypted contents) while only one party is able to extract the results of the whole resulting collection of data?
评论 #24031106 未加载
shiado将近 5 年前
My only hope for homomorphic encryption is that it doesn&#x27;t cause a new era of invasive DRM and anti-circumvention methods.
评论 #24029398 未加载