[Lesson 4, Lecture 5] Homomorphic Encryption for Input Privacy #168
Answered
by
ZSoumia
majauhar
asked this question in
Course: Our Privacy Opportunity
-
Hi @iamtrask! In the lecture, you told us that we use public-key cryptography for homomorphic encryption. But, since the processing of data only happens after encryption by the input source, can't we use symmetric key cryptography instead? |
Beta Was this translation helpful? Give feedback.
Answered by
ZSoumia
Jan 26, 2021
Replies: 1 comment 1 reply
-
Hi @majauhar ! It can work with Private key , in fact in HE any symmetric key HE can be transformed to a public key HE ( Rothblum theorem |
Beta Was this translation helpful? Give feedback.
1 reply
Answer selected by
majauhar
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi @majauhar ! It can work with Private key , in fact in HE any symmetric key HE can be transformed to a public key HE ( Rothblum theorem