Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Google Releases Open Source Tools and Libraries for Fully Homomorphic Encryption

Google this week announced that it has released open source tools and libraries that can be used by developers to implement fully homomorphic encryption (FHE).

Google this week announced that it has released open source tools and libraries that can be used by developers to implement fully homomorphic encryption (FHE).

FHE enables the processing of encrypted data without providing access to the actual data. One year ago, IBM also released an open source FHE toolkit.

Google has released the source code of an FHE transpiler for C++ developers. The tech giant has shared information on installing the transpiler and running it, and it has also made available some demos to serve as examples of possible use cases. Developers have also been provided information on the design of the transpiler, its security, and limitations.

“Google’s transpiler will enable developers to write code for any type of basic computation such as simple string processing or math, and run it on encrypted data,” explained Miguel Guevara, product manager in Google’s privacy team.

Guevara added, “The transpiler will transform that code into a version that can run on encrypted data. This then allows developers to create new programming applications that don’t need unencrypted data. FHE can also be used to train machine learning models on sensitive data in a private manner.”

FHE can be very useful for creating applications that process highly sensitive user information, such as medical information.

“For example, imagine you’re building an application for people with diabetes. This app might collect sensitive information from its users, and you need a way to keep this data private and protected while also sharing it with medical experts to learn valuable insights that could lead to important medical advancements,” Guevara said. “With Google’s transpiler for FHE, you can encrypt the data you collect and share it with medical experts who, in turn, can analyze the data without decrypting it – providing helpful information to the medical community, all while ensuring that no one can access the data’s underlying information.”

Related: Google Open-Sources Cryptographic Protocol

Advertisement. Scroll to continue reading.

Related: Adobe Releases Open Source Anomaly Detection Tool “OSAS”

Related: Google Releases Open Source Tool for Verifying Containers

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...