Answer the question
In order to leave comments, you need to log in
Ability to process encrypted data without a key?
In the process of thinking about the future of cloud computing, an interesting question arose. Is there a fundamental possibility of executing an encrypted code that transforms encrypted data without an encryption key? Can you give links to publications on the subject? Thank you.
Answer the question
In order to leave comments, you need to log in
If it is possible to work with encrypted data in some rational way, i.e. not just copy, but do some transformations. This means that within the framework of these transformations there is the possibility of some knowledge about these data, which fundamentally contradicts cryptography.
RT @ EFF :
A new type of crypto allows computations on data you can't read. So how does this homomorphic encryption work? https://eff.org/r.a7m5
twitter.com
Encrypted code cannot be executed. You can execute obfuscated code. Or, theoretically, you can have hardware (processor) with an encryption key inside so that instructions are decrypted in hardware.
With encrypted data, some operations can sometimes be performed, but very limited, and the encryption method must be tailored for a specific operation. It is very difficult.
Here again, you can think about intra-hardware decryption.
Flew infa about the fork of MySQL, which keeps the fields encrypted, but at the same time can build indexes on them. I didn't know what black magic was. I think the info can be found on the pedi wiki among the near-muscular topics.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question