Eysha Shirrine Powers, IBM, STSM, Chief Architect, IBM Z Cryptographic Portfolio
With traditional encryption, sensitive data is encrypted, stored or transmitted, then decrypted for use. The data remains protected while it is encrypted but loses that protection when it's in use. What if you could encrypt data and yet still use the data while it is encrypted? Welcome to fully homomorphic encryption!
With traditional encryption, sensitive data is encrypted, stored or transmitted, then decrypted for use. The data remains protected while it is encrypted but loses that protection when it's in use. What if you could encrypt data and yet still use the data while it is encrypted? Welcome to fully homomorphic encryption!
- Category
- Management
Be the first to comment