[prev in list] [next in list] [prev in thread] [next in thread] 

List:       cryptography
Subject:    Re: [Cryptography] Factorable encryption
From:       Jerry Leichter <leichter () lrw ! com>
Date:       2022-08-11 10:19:29
Message-ID: 52E64850-1ABF-4A28-821C-387161026272 () lrw ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


> The recent discussion of "data in use" and how to protect it led me to some \
> speculations.  I'd be curious if anyone has seen anything like it before, and \
> whether any practical algorithms are known. 
> The idea is to split a computation similarly to the way one splits a secret into \
> shares.... Isn't this just secure multiparty computation protocols (MPC)? See SPDZ \
> as one example. 
Good point.  Dining cryptographers and such.  Same idea viewed from a different \
angle:  As the participants wanting to do a computation without revealing their own \
information, as opposed to a third party sharing limited information with the \
participants to get a computation done.

I wasn't previously aware of SPDZ and related work - need to have a look at it. \
                Thanks!
                                                        -- Jerry


[Attachment #5 (unknown)]

<html><head><meta http-equiv="Content-Type" content="text/html; \
charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: \
space; line-break: after-white-space;" class=""><br class=""><div><blockquote \
type="cite" class=""><div class=""><div dir="auto" class=""><div class=""><div \
class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 \
.8ex;border-left:1px #ccc solid;padding-left:1ex">The recent discussion of "data in \
use" and how to protect it led me to some speculations.&nbsp; I'd be curious if \
anyone has seen anything like it before, and whether any practical algorithms are \
known.<br class=""> <br class="">
The idea is to split a computation similarly to the way one splits a secret into \
shares....</blockquote></div></div><div dir="auto" class="">Isn't this just secure \
multiparty computation protocols (MPC)? See SPDZ as one \
example.&nbsp;</div></div></div></blockquote>Good point. &nbsp;Dining cryptographers \
and such. &nbsp;Same idea viewed from a different angle: &nbsp;As the participants \
wanting to do a computation without revealing their own information, as opposed to a \
third party sharing limited information with the participants to get a computation \
done.</div><br class=""><div class="">I wasn't previously aware of SPDZ and related \
work - need to have a look at it. Thanks!</div><div class=""><div class="">&nbsp; \
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; \
&nbsp; &nbsp; &nbsp; -- Jerry</div></div><div class=""><br \
class=""></div></body></html>



_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
https://www.metzdowd.com/mailman/listinfo/cryptography


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic