Blog

Category: Homomorphic Encryption

Real Queryable Encryption

Does Real Queryable Encryption mean there is a Fake Queryable Encryption?

TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say…

Laptop icon with shield and padlock

Privacy Enhanced Computation Technologies Advantages and Disadvantages

Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies.

Red and blue padlock icons with binary text

Advantages and Disadvantages of Homomorphic Encryption 2023

Four years after our first blog on homomorphic encryption, we revisit the technology to see what’s changed to make it viable for enterprises. The short answer: not much.

HomomorphicEncryption

The Advantages and Disadvantages of Homomorphic Encryption

Note: There is an updated version of this blog post here: Advantages and Disadvantages of Homomorphic Encryption 2023 Homomorphic encryption continues to entice cryptographers and…