Publications

ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State

MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation

Blog Posts

Secure computation: Homomorphic encryption or hardware enclaves?

Raluca Ada Popa blog 0 Comments

Originally posted on Medium: Written by Raluca Ada Popa on September 16, 2021 How to collaborate with confidential data without sharing it. Secure computation has become increasingly popular for protecting the privacy and integrity of data during computation. The reason is that it provides two tremendous advantages. The first advantage is that it offers “encryption in use” in addition to the already existing “encryption at rest” and “encryption in transit”. The “encryption in use” paradigm is important for security because “encryption at rest” protects that data only when it is in storage and “encryption in transit” protects the data only when it is being communicated over the network, but in both cases the data is exposed during computation, namely, while it…