Blog

January 8, 2018 By Duality Technologies
Meltdown, Spectre and Protection from Kernel Vulnerabilities

Whenever a running program needs to do anything useful – such as write to a file or open a network connection – it has to temporarily hand control of the processor to the kernel to carry out the job. This mode switching between programs and the kernel are potentially time consuming. In order to be …

Read More
January 3, 2018 By Duality Technologies
December 27, 2017 By Duality Technologies
HYBRID METHODS FOR ENCRYPTED COMPUTING

In the design of Duality’s Secure Insights as a Service™, we are often faced with a scenario where there are two entities, a model-owning organization that holds a machine learning model and a data owning organization  that holds data that it wants to be classified using the model (a very similar scenario arises in Duality’s …

Read More
November 14, 2017 By Duality Technologies
HOMOMORPHIC ENCRYPTION STANDARDIZATION

In addition to becoming widely used in practice, homomorphic encryption is also in the process of being standardized.  Duality technologies has been a leader in this effort, but we’ve had many brand-name partners in the effort who all see it in their interest to use standardized homomorphic encryption technologies, like the open-source PALISADE technologies that …

Read More
October 16, 2017 By Duality Technologies
PROXY RE-ENCRYPTION

A challenge with prior attempts to commercialize and apply homomorphic encryption is that the output of computations on encrypted data is also encrypted, and the output can be decrypted only with the secret key of the data owner.  If the data owner wants to share the results of a computation, the data owner previously had …

Read More