DH

D.N.G. Herbiet

1 records found

An analysis of Structured Encryption compared to other secure computation technologies

A review of Structured Encryption schemes compared to Oblivious RAM, Multi-party Computation, Homomorphic Encryption and Trusted Execution Environments in the context of computing on encrypted data

With the ever-growing cloud capacity in our society, being able to harness that immense computational power while keeping our data private has become a strong point of interest. This can be achieved with Structured Encryption, which allows a data structure to be encrypted and sto ...