Comment by j2kun
2 years ago
This is basically what people do with problems like Private Information Retrieval and Private Set Intersection. They use some lightly applied FHE as a subroutine, but otherwise hand-develop a cryptographic protocol for the specific program at hand.
As it turns out, these applications are much more widely used than FHE.
No comments yet
Contribute on Hacker News ↗