Blog

December 27, 2017 BY Duality Technologies
HYBRID METHODS FOR ENCRYPTED COMPUTING

In the design of Duality’s Secure Insights as a Service™, we are often faced with a scenario where there are two entities, a model-owning organization that holds a machine learning model and a data owning organization  that holds data that it wants to be classified using the model (a very similar scenario arises in Duality’s …

Read More
November 14, 2017 BY Duality Technologies
HOMOMORPHIC ENCRYPTION STANDARDIZATION

In addition to becoming widely used in practice, homomorphic encryption is also in the process of being standardized.  Duality technologies has been a leader in this effort, but we’ve had many brand-name partners in the effort who all see it in their interest to use standardized homomorphic encryption technologies, like the open-source PALISADE technologies that …

Read More
October 16, 2017 BY Duality Technologies
PROXY RE-ENCRYPTION

A challenge with prior attempts to commercialize and apply homomorphic encryption is that the output of computations on encrypted data is also encrypted, and the output can be decrypted only with the secret key of the data owner.  If the data owner wants to share the results of a computation, the data owner previously had …

Read More
September 18, 2017 BY Duality Technologies
PALISADE

Duality Technologies team members are both users and contributors to the PALISADE open-source lattice-encryption library.  PALISADE is a modular library that supports flexible customization and deployment of encrypted computing technology. PALISADE grew out of several R&D projects funded by the US Department of Defense to develop ground-breaking new encrypted computing technologies.   PALISADE has been used …

Read More
January 23, 2017 BY Duality Technologies
Homomorphic Encryption – Making it Real

Fully Homomorphic Encryption (FHE), commonly also referred to as Homomorphic Encryption, is arguably the first and primary breakthrough in theoretical computer science of the 21st century.  For a long time people would use encryption technologies to protect their data.  But if the data was encrypted, whoever holds the data is not really able to do …

Read More