Secure computation: Homomorphic encryption or hardware enclaves

Secure computation: Homomorphic encryption or hardware enclaves?

Secure computation has become increasingly popular for protecting the privacy and integrity of data during computation. It offers two tremendous advantages: “encryption in use” in addition to the already existing “encryption at rest” and “encryption in transit”, and enabling different parties to collaborate and gain insights from their aggregate data, without sharing their data with …

Secure computation: Homomorphic encryption or hardware enclaves? Read More »