{"id":283421,"date":"2016-02-18T13:36:45","date_gmt":"2016-02-18T21:36:45","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/?post_type=msr-research-item&#038;p=283421"},"modified":"2017-01-23T10:27:42","modified_gmt":"2017-01-23T18:27:42","slug":"guide-to-applications-of-homomorphic-encryption","status":"publish","type":"msr-video","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/video\/guide-to-applications-of-homomorphic-encryption\/","title":{"rendered":"Guide to Applications of Homomorphic Encryption"},"content":{"rendered":"<p>Homomorphic encryption is an encryption function which permits encrypted data to be computed without decryption. It is considered as a solution for protecting privacy information in present situations such as cloud computing and machine communication. In this talk, I explain the basic arithmetics under homomorphic encryption: equality and comparison. Then I show how to apply to real world problems: private database query processing and homomorphic computation of (approximate) edit distance for genomic analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Homomorphic encryption is an encryption function which permits encrypted data to be computed without decryption. It is considered as a solution for protecting privacy information in present situations such as cloud computing and machine communication. In this talk, I explain the basic arithmetics under homomorphic encryption: equality and comparison. Then I show how to apply [&hellip;]<\/p>\n","protected":false},"featured_media":275721,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[13561,13546,13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-283421","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-algorithms","msr-research-area-computational-sciences-mathematics","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/PeE4C7Opcsw","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/283421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":1,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/283421\/revisions"}],"predecessor-version":[{"id":283427,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/283421\/revisions\/283427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media\/275721"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=283421"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=283421"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=283421"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=283421"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=283421"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=283421"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=283421"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=283421"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=283421"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=283421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}