{"id":18751,"date":"2021-06-24T00:08:43","date_gmt":"2021-06-24T00:08:43","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18751"},"modified":"2021-06-24T00:14:10","modified_gmt":"2021-06-24T00:14:10","slug":"homomorphic-encryption-makes-real-world-gains","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/","title":{"rendered":"Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft"},"content":{"rendered":"<p>The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption<\/a> of that data in recent years.<\/p>\n<p>Cybersecurity vendors have stepped up, developing strong and efficient ways to encrypt data both while it\u2019s at rest and when it\u2019s in transit. However, there is a glaring weakness. When the data is being processed, analyzed or used by applications in another way, it needs to be unencrypted, making it more vulnerable to attack.<\/p>\n<p>To counter this, some major IT vendors are pushing forward with a decades-old encryption idea that was first talked about in the late 1970s but not successfully demonstrated for the first time until 2009. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.<\/p>\n<h2>Putting a Focus on FHE<\/h2>\n<p>FHE enables data to remain encrypted even as it is processed and analyzed, whether that\u2019s in the cloud or in third-party environments. The data is protected against cybercriminals as well as others who are not supposed to see it. Once the mathematical operations, such as calculations, are run on the encrypted data, the results are decrypted and corrected.<\/p>\n<p>In recent months, the list of interested vendors has included IBM, which in December announced its Security Homomorphic Encryption Services, a managed offering hosted on the IBM Cloud. Big Blue has been active in the development for years \u2013 it was an IBM researcher who ran the 2009 demonstration \u2013 and earlier last year conducted successful FHE field trials. The company also released an FHE toolkit for Apple\u2019s MacOS and iOS operating systems, with Android and Linux being added later.<\/p>\n<p>\u201cFully homomorphic encryption holds tremendous potential for the future of privacy and cloud computing, but businesses must begin learning about and experimenting with FHE before they can take full advantage of what it has to offer,\u201d IBM Security CTO Sridhar Muppidi said in a <a href=\"https:\/\/trends\/room.ibm.com\/2020-12-17-IBM-Helps-Prepare-Clients-for-Next-Generation-Encryption-Technology\" target=\"_blank\" rel=\"noopener\">statement<\/a> at the time.<\/p>\n<p>Microsoft\u2019s SEAL (Simple Encrypted Arithmetic Library) is another such effort, an open-source software library created by researchers at the company that uses multiple forms of homomorphic encryption. It\u2019s available on GitHub.<\/p>\n<h2>DARPA Gets In on the Effort<\/h2>\n<p>Intel, which has been adding security features to its silicon for years and has been working on FHE techniques, was picked earlier this year by the federal Defense Advanced Research Projects Agency (DARPA) to work with Microsoft to create an ASIC chip for homomorphic encryption. DARPA will use the accelerator in DARPA\u2019s Data Protection in Virtual Environments (<a href=\"https:\/\/www.darpa.mil\/trends\/-events\/2021-03-08\" target=\"_blank\" rel=\"noopener\">DRPIVE<\/a>) program to create the hardware needed to reduce the compute power and time that currently is required to run FHE operations. Intel will lead one of four research teams; the other three will be headed by software makers Duality Technologies \u2013 which uses homomorphic encryption in its Duality SecurePlus platform \u2013 and Galois and a Silicon Valley-based nonprofit scientific research institute, SRI International.<\/p>\n<p>Earlier this month, Google released a collection of <a href=\"https:\/\/github.com\/google\/fully-homomorphic-encryption\" target=\"_blank\" rel=\"noopener\">open-source libraries<\/a> that can be used to implement FHE in modern workloads and made them available on GitHub.<\/p>\n<p>\u201cAs cloud computing services continue to see widespread adoption, it becomes increasingly important for service providers to guarantee the security and privacy of the data of their customers,\u201d Google researchers wrote in a <a href=\"https:\/\/github.com\/google\/fully-homomorphic-encryption\/blob\/main\/transpiler\/docs\/whitepaper.pdf\" target=\"_blank\" rel=\"noopener\">paper<\/a> released on GitHub.<\/p>\n<p><strong>Further reading<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">Best Encryption Software &amp; Tools<\/a><\/p>\n<h2>Homomorphic Encryption a Long Time Coming<\/h2>\n<p>The FHE demo in 2009 proved the technology could work, but it was too slow and consumed too much compute power to be put to use and it was too expensive and required expertise in cryptography. However, such challenges are being addressed.<\/p>\n<p>\u201cFortunately, over the last few years, FHE has become less computationally intensive, due to significant progress in hardware acceleration, efficient optimizations, and low-level implementations,\u201d the Google researchers wrote.<\/p>\n<p>Still, they added, for adoption of FHE to be widespread, tools are needed to enable software developers without cryptographic expertise to integrate homomorphic encryption into their applications. Dirk Schrader, global vice president of security research at New Net Technologies, agreed. He said a hurdle will be the application of FHE \u201cwhere the analytics of large data sets will be used for benchmarking individuals, as seen in all those fitness applications or health monitors. Consumerization has the intrinsic tendency to include the question of cost of operation and maintenance, and applying high-end cryptography requires solid knowledge and development skills.\u201d<\/p>\n<h2>Digital Health Projects to Benefit<\/h2>\n<p>Despite the remaining hurdles, Google, IBM, Microsoft and others are pushing to make it easier for developers to leverage the technology. Bringing FHE to the point where it could be used by vendors and developers would be helpful to organizations in a range of industries, Schrader, whose company makes cybersecurity and compliance software, told <em>eSecurity Planet<\/em>.<\/p>\n<p>FHE \u201ccan solve some of the pressing issues arising out of the conflict to analyze large sums of data points generated by many individuals,\u201d he said. \u201cMany countries are considering some kind of digital health initiatives, where the promise to find better cures is countered by the fear [of losing] privacy. [Homomorphic encryption] offers an interesting approach here by allowing the analysis of encrypted data for purposes that are not related to an individual data set.\u201d<\/p>\n<p>Other possible uses include autonomous public transportation analyzing users\u2019 locations to predict the load in a highly populated urban area, he said, adding that big data \u201cis based on the promise to distill previously undiscovered opportunities from large amounts of data and has, so far with good reason, earned criticism from data privacy advocates.\u201d<\/p>\n<h2>A Small but Growing Market<\/h2>\n<p>The FHE market is small but expected to grow in the coming years, with market research firm The Insight Partners <a href=\"https:\/\/www.theinsightpartners.com\/mobile\/fortinet-reports-surge-in-mobile-malware\/homomorphic-encryption-market\" target=\"_blank\" rel=\"noopener\">predicting<\/a> it will increase from $120.12 million in 2019 to $246.29 million by 2027, an average of 9.7 percent a year. Most of the use will be in North America and Europe, though the Asia-Pacific region stands to see the fastest growth. IBM noted that Gartner forecasts that while currently fewer than 1 percent of companies have the budget for projects that include FHE, that number will be more than 20 percent by 2025.<\/p>\n<p>All this is happening as businesses increasingly adopt hybrid cloud and multi-cloud strategies. In its annual State of the Cloud report, IT management software maker Flexera found that 92 percent of enterprises have embraced a multi-cloud environment and 80 percent have hybrid clouds. Meanwhile, the number of government regulations and standards, such as the European Union\u2019s <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-comply-with-gdpr\/\">General Data Protection Regulation (GDPR)<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/ccpa-compliance\/\">California\u2019s Consumer Privacy Act (CCPA)<\/a>, are putting growing pressure on enterprises to ensure that the data they collect, store, analyze and act on, is protected from bad actors and prying eyes. Being able to leverage FHE would give them another tool to use to do just that.<\/p>\n<p><strong>Further reading<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/disk-vs-file-encryption-which-is-best-for-you\/\">Disk vs File Encryption: Which Is Best for You?<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ca003b37a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ca003b37a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ca003b37a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ca003b37a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ca003b37a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ca003b37a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ca003b37a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data in recent years. Cybersecurity vendors have stepped up, developing strong and efficient ways to encrypt data both while it\u2019s at [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18752,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[23],"tags":[842,627],"b2b_audience":[33],"b2b_industry":[57],"b2b_product":[383],"class_list":["post-18751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","tag-data-encryption","tag-data-privacy","b2b_audience-awareness-and-consideration","b2b_industry-healthcare","b2b_product-encryption-data-loss-prevention"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Homomorphic Encryption Nears Reality, Pushed by IBM, Google<\/title>\n<meta name=\"description\" content=\"Fully homomorphic encryption (FHE) offers a promising new data privacy and cyber defense: the ability to protect data in use.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Homomorphic Encryption Nears Reality, Pushed by IBM, Google\" \/>\n<meta property=\"og:description\" content=\"Fully homomorphic encryption (FHE) offers a promising new data privacy and cyber defense: the ability to protect data in use.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T00:08:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-24T00:14:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1001\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft\",\"datePublished\":\"2021-06-24T00:08:43+00:00\",\"dateModified\":\"2021-06-24T00:14:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\"},\"wordCount\":1148,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg\",\"keywords\":[\"data encryption\",\"Data privacy\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\",\"name\":\"Homomorphic Encryption Nears Reality, Pushed by IBM, Google\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg\",\"datePublished\":\"2021-06-24T00:08:43+00:00\",\"dateModified\":\"2021-06-24T00:14:10+00:00\",\"description\":\"Fully homomorphic encryption (FHE) offers a promising new data privacy and cyber defense: the ability to protect data in use.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg\",\"width\":1001,\"height\":667,\"caption\":\"cloud security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Homomorphic Encryption Nears Reality, Pushed by IBM, Google","description":"Fully homomorphic encryption (FHE) offers a promising new data privacy and cyber defense: the ability to protect data in use.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/","og_locale":"en_US","og_type":"article","og_title":"Homomorphic Encryption Nears Reality, Pushed by IBM, Google","og_description":"Fully homomorphic encryption (FHE) offers a promising new data privacy and cyber defense: the ability to protect data in use.","og_url":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/","og_site_name":"eSecurity Planet","article_published_time":"2021-06-24T00:08:43+00:00","article_modified_time":"2021-06-24T00:14:10+00:00","og_image":[{"width":1001,"height":667,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft","datePublished":"2021-06-24T00:08:43+00:00","dateModified":"2021-06-24T00:14:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/"},"wordCount":1148,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg","keywords":["data encryption","Data privacy"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/","url":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/","name":"Homomorphic Encryption Nears Reality, Pushed by IBM, Google","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg","datePublished":"2021-06-24T00:08:43+00:00","dateModified":"2021-06-24T00:14:10+00:00","description":"Fully homomorphic encryption (FHE) offers a promising new data privacy and cyber defense: the ability to protect data in use.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/06\/Security-01-1088x725-1-e1669906375931.jpg","width":1001,"height":667,"caption":"cloud security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18751"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18751"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18751\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18752"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18751"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18751"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18751"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}