Frequently Asked Questions
Your questions, answered. Search our FAQs to discover how to maximise the Innovation Lab, or ask an expert for personalised insights. From data security to FHE, blockchain to AI, no query is too big or small. Add your voice and help us grow this shared Innovation Lab for the benefit of all.
General and Support
Is my data secure on this platform?
We prioritise data security and comply with industry-standard practices to protect your information. For more details, review our Privacy Policy. https://optalysys.com/privacy-policy/
I forgot my password. How do I reset it?
Navigate to the Lab login page, and select the Lost your Password. Follow the link to reset your password.
How do I update my contact information?
Click on your name in the top right corner, and select Account Settings. Here you can update your contact information.
Is there a mobile version?
The Innovation Lab is accessible via a web browser on any device.
How do I delete my account?
We’re sorry to see you go. Please send an email to support@optalysys.com
Innovation Lab
I am interested in booking a meeting with an Optalysys expert at an event. How do I get in touch?
Please get in touch by sending us an email at events@optalysys.com.
Does this hub host events or webinars?
Yes! We regularly host online events, webinars, and workshops. Check out the “ Community & Events” section for upcoming opportunities.
Fully Homomorphic Encryption
What is Fully Homomorphic Encryption (FHE)?
Fully Homomorphic Encryption (FHE) is a type of encryption that allows computation on encrypted data without needing to decrypt it first. The results of these computations remain encrypted and can only be decrypted with the correct key. This means that sensitive data can be processed securely, preserving privacy.
Who developed the first Fully Homomorphic Encryption scheme?
Craig Gentry proposed the first FHE scheme in 2009 as part of his Ph.D. thesis. His approach involved a breakthrough method called “bootstrapping,” which allows indefinitely long sequences of encrypted computations to be performed.
What are the main differences between FHE and other privacy-preserving techniques?
FHE is part of a broader range of novel privacy technologies known as Privacy Enhancing Technologies, or PETs. These PETs provide a range of functionality, and it is typical for an application to leverage more than one PET to provide a complete solution for data privacy. FHE specifically provides a cryptographic assurance for the protection of data in use, reducing the complex and incomplete set of defences that are used to protect contemporary data processing systems to a single strong point of defence. Other PETs, such as differential privacy, can supplement FHE by providing (e.g) statistical guarantees of privacy in the outputs of a computation, such as statistical reporting.
What are the legal and regulatory considerations for FHE?
FHE aligns with privacy regulations like General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA) by ensuring data privacy even during processing. Specific guidance on the usage of FHE and other Privacy Enhancing Technologies may vary by jurisdiction.
What are the challenges of using FHE?
The adoption of FHE faces several challenges. First, relative to plaintext processing, the computing overhead of calculations performed in FHE is significantly higher.. Second, working directly with FHE requires specialised knowledge and infrastructure to implement efficient and secure applications. Lastly, FHE technology is a relatively new cryptographic technology with research and standardisation efforts underway to provide users with consistent best practices.
How is data encrypted in FHE?
FHE can be performed under both symmetric-key and public-key implementations to support a range of applications. In all existing FHE schemes that have been subjected to extensive and open cryptanalysis, the cryptographic problem that secures the data is the “Learning with Errors” problem, a post-quantum resistant cryptographic primitive that also secures the next-generation cryptographic algorithms for secure key exchange over the internet that have been standardised by NIST.
How does FHE differ from traditional encryption?
In traditional encryption, data must be decrypted before any computation can occur, exposing it to potential risks. FHE allows computations directly on encrypted data, enabling secure data processing without revealing the data itself. FHE also belongs to a family of cryptographic technologies that are known to be resistant to quantum computing threats.
Are there any limitations on the types of computations FHE can perform?
By design, FHE allows for arbitrary computing over encrypted data. However, some operations and algorithms are harder to implement under FHE than others. Contemporary tools for working with FHE range from complete software solutions that implement specific functionality through to powerful encrypted circuit compilers that enable new applications. These tools significantly expand on the capabilities and functionality of FHE by capturing expert knowledge in FHE optimisation and algorithm execution.
Want to see more like this?
Be first to receive the latest news and content from Optalysys
