logoalt Hacker News

u1hcw9nxtoday at 2:30 PM1 replyview on HN

In FHE the hardware running it don't know the secrets. That's the point.

First you encrypt the data. Then you send it to hardware to compute, get result back and decrypt it.


Replies

Foobar8568today at 4:06 PM

But you leak all type of information and and the retrieve either leak even more data or you'll end up with transferring a god knows amount of data or your encryption is trivially broken or spend days/month/years to unencrypt.

show 1 reply