Homomorphic Encryption
for Data Privacy
Homomorphic encryption can be thought of as a set of algorithms that enable computation on encrypted data. On this page we explore the technology in depth.
Homomorphic encryption can be thought of as a set of algorithms that enable computation on encrypted data. On this page we explore the technology in depth.
If you work in an industry like banking or healthcare where private data is handled and in which data computation offers the ability to spot trends or opportunities, understanding the landscape of options for sensitive data processing is critical.
One such method is homomorphic encryption. This practice is included in the category known as privacy-enhancing technology, or PET, and has been referred to as the “holy grail” of data security because it allows users to perform calculations on data without the need to decrypt it first.
Since decryption isn’t necessary, sensitive data should theoretically remain safe from data breaches during computation. But how, exactly, does homomorphic encryption function, and should you consider using it at your organization?
How Homomorphic Encryption Works
When you hear homomorphic encryption described as the “gold standard” of privacy-enabled computing, it’s likely the reference applies to only one type, but this technology comes in three main varieties. Before we jump into what those are, it’s important to understand homomorphism. This is a mathematical term that refers to an architecture that preserves the structure between two similar algebraic systems.
In general, without getting too deep into the math, homomorphism allows us confidence about the validity of the computations being performed on the ciphertext, albeit to different degrees depending on which type of homomorphic encryption is being used. The user running the homomorphic encryption has a public key — a key anyone can use. However, only an individual with the matching private decryption key can see the unencrypted data once computations have been made on the data.
A good way to think about homomorphic encryption is as a container full of blocks. You can put your hands in the container and manipulate the blocks, but you can’t take the blocks out. Only the person with a private key can access what’s inside.
Types of Homomorphic Encryption
What makes different kinds of homomorphic encryption schemes unique from one another is the kind of “circuits” they can evaluate. A circuit is a type of directed acyclic graph — a sort of mathematical diagram that does not create a closed loop. For our purposes, there are two properties of circuits we care about: depth and size.
The first concept, depth, refers to the longest distance between the output and every input. The second, size, refers to the number of gates — or inputs — the circuit has. The more circuits that an encryption type can evaluate and the more depth and size those circuits can have, the more secure the encryption generally is.
Now, let’s cover the three main types of homomorphic encryption available today:
Real-World Implications and Limitations
Homomorphic encryption has been around for more than 50 years now, but unfortunately, remains impractical. It was first envisioned in the late 1970s and then developed by Craig Gentry. Understandably, there was a lot of excitement about this technology’s potential uses.
The implications of a computational security method that doesn’t require decryption are far-ranging. Homomorphic encryption holds promise for everything from improving secure banking operations to keeping cloud-based data safe. In the public sector, it holds promise in areas where raw data must be processed while remaining protected from potential malicious actors, as is the case with voting machine data. In the public sector, it could help enable analytics on data collected in heavily regulated industries, like banking and healthcare.
However, it’s important to not get caught up in the potential of homomorphic encryption, because there are various factors that continue serve as obstacles to practical implementation:
A Better Alternative: Privacy Enhancing Computation
Blind Compute, TripleBlind’s proprietary computational privacy and security system, provides one-way, irreversible encryption that allows for completely safe processing of encrypted data. This makes TripleBlind’s breakthrough technology compliant with the world’s most stringent regulatory bodies and regulations. That’s just where the advantages begin:
This software-only API can solve for a broad range of use cases by improving on well-understood principles like federated learning and multi-party computing, to unlock the commercialization of data while preserving privacy and enforcing regulatory compliance — in other words, facilitating responsible innovation.
Ready for a demo of the most complete and scalable solution for privacy-enhancing computation, Blind Compute? Reach out today to see first-hand how TripleBlind can help you revolutionize how your organization handles data security.
TripleBlind’s innovations build on well understood principles of data protection. Our innovations radically improve the practical use of privacy preserving technologies, by adding true scalability and faster processing, with support for all data and algorithm types. We support all cloud platforms and unlock the intellectual property value of data, while preserving privacy and enforcing compliance with HIPAA and GDPR.
We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy