Blog

January 8, 2018 By Kurt Rohloff
Encrypted Computing as a Protection from Kernel Vulnerabilities

Whenever a running program needs to do anything useful – such as write to a file or open a network connection – it has to temporarily hand control of the processor to the kernel to carry out the job. This mode switching between programs and the kernel are potentially time consuming. In order to be …

Read More
January 3, 2018 By Kurt Rohloff
December 27, 2017 By Kurt Rohloff
HYBRID METHODS FOR ENCRYPTED COMPUTING

In the design of Duality SecurePlus™ Insights, we are often faced with a scenario where there are two entities, a model-owning organization that holds a machine learning model and a data owning organization  that holds data that it wants to be classified using the model (a very similar scenario arises in the Duality SecurePlus Collaboration Platform as …

Read More
November 14, 2017 By Kurt Rohloff
HOMOMORPHIC ENCRYPTION STANDARDIZATION

In addition to becoming widely used in practice, homomorphic encryption is also in the process of being standardized.  Duality Technologies has been a leader in this effort, but we’ve had many brand-name partners in the effort who all see it in their interest to use standardized homomorphic encryption technologies, like the open-source PALISADE technologies that …

Read More
October 16, 2017 By Kurt Rohloff
PROXY RE-ENCRYPTION FOR ENCRYPTED COMPUTING

A challenge with prior attempts to commercialize and apply homomorphic encryption is that the output of computations on encrypted data is also encrypted, and the output can be decrypted only with the secret key of the data owner.  If the data owner wants to share the results of a computation, the data owner previously had …

Read More