logoalt Hacker News

ramchiplast Friday at 1:48 PM1 replyview on HN

The result is encrypted. It's useful to the key holder, not to the party doing the computation.


Replies

JohnFenlast Friday at 2:11 PM

Yes, I understand that part. The part I struggle with is how the very fact that a party without the key can do the computation on it is not an indication that the encryption is leaking information. If the encryption were airtight, then such computation shouldn't be possible.

Given that cryptography experts seem to be asserting otherwise, I assume that there's something important that I'm not understanding here.

show 1 reply