Comment by ramchip

6 months ago

The result is encrypted. It's useful to the key holder, not to the party doing the computation.

Yes, I understand that part. The part I struggle with is how the very fact that a party without the key can do the computation on it is not an indication that the encryption is leaking information. If the encryption were airtight, then such computation shouldn't be possible.

Given that cryptography experts seem to be asserting otherwise, I assume that there's something important that I'm not understanding here.

  • The tl;dr is that breaking FHE would mean solving lattice problems that have been studied for decades to be nontrivial to break[0].

    [0] https://arxiv.org/abs/2208.08125

    • I'm not talking about the possibility of breaking FHE, though.

      What I don't understand is this: if I get encrypted data from someone and, without breaking that encryption, I can perform computations on it that yield a sensible result (even if the result is also encrypted with a key I don't have), then how does that not mean the encryption has been weakened? If the encryption were strong, that should not be possible.

      Actually breaking the encryption is a different thing, and I wasn't questioning that.

      7 replies →