Jump to content
the_red

Salut, RST

Recommended Posts

Posted

"The real challenge and the great mystery in the field was: Can you actually take a piece of software and encrypt it but still have it be runnable, executable and fully functional," Sahai said. "It's a question that a lot of companies have been interested in for a long time."

Mai multe : Computer scientists develop 'mathematical jigsaw puzzles' to encrypt software

Practic la ce ajuta asta :

Alice vrea sa faca adunarea 5 + 4, trece 5 prin functia f, rezultand f(5) = 21; trece si 4 prin acceasi functie f si are f(4) = 41;

Alice apoi ii trimite 21 si 41 lui Bob si ii spune sa le adune. Bob le aduna, rezultand 62, iar rezultatul il trimite inapoi lui Alice.

Apoi alice aplica functia inversa f^(-1) (62) = 9, care este rezultatul asteptat.

Practic Bob nu stie nimic despre functia f, doar Alice stie, tot ce face Bob e sa aplice adunarea. Functia f se numeste "Fully homomorphic function".

Alt exemplu real life ar fi urmatorul : Alice are doua documente pdf confidentiale pe care vrea sa le alipeasca. Nu are software-ul necesar pentru asta si nici nu are timp sa faca rost de unul. Bob in schimb are un serviciu web care permite uploadarea pdf-urilor in cloud. Encriptia se face local, in browser, prin javascript spre exemplu, apoi serverul lui bob alipeste cele doua pdf-uri primite, in mod criptat, trimite rezultatul (tot criptat) lui Alice, care mai apoi decripteaza pdf-ul si il stocheaza pe computer.

De asta m-am apucat.

Edit : @H3xoR nu destui.

  • Upvote 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...