S
S
Semyon Prikhodko2012-12-05 23:15:21
Encryption
Semyon Prikhodko, 2012-12-05 23:15:21

Ability to process encrypted data without a key?

In the process of thinking about the future of cloud computing, an interesting question arose. Is there a fundamental possibility of executing an encrypted code that transforms encrypted data without an encryption key? Can you give links to publications on the subject? Thank you.

Answer the question

In order to leave comments, you need to log in

4 answer(s)
I
ixSci, 2012-12-06
@ixSci

If it is possible to work with encrypted data in some rational way, i.e. not just copy, but do some transformations. This means that within the framework of these transformations there is the possibility of some knowledge about these data, which fundamentally contradicts cryptography.

O
OCTAGRAM, 2012-12-06
@OCTAGRAM

RT @ EFF :
A new type of crypto allows computations on data you can't read. So how does this homomorphic encryption work? https://eff.org/r.a7m5
twitter.com

B
Biga, 2012-12-06
@Biga

Encrypted code cannot be executed. You can execute obfuscated code. Or, theoretically, you can have hardware (processor) with an encryption key inside so that instructions are decrypted in hardware.
With encrypted data, some operations can sometimes be performed, but very limited, and the encryption method must be tailored for a specific operation. It is very difficult.
Here again, you can think about intra-hardware decryption.

L
LuciferOverLondon, 2012-12-09
@LuciferOverLondon

Flew infa about the fork of MySQL, which keeps the fields encrypted, but at the same time can build indexes on them. I didn't know what black magic was. I think the info can be found on the pedi wiki among the near-muscular topics.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question