GeistHaus
log in · sign up

A list of real-world uses of differential privacy - Ted is writing things

desfontain.es

A list of practical deployments of differential privacy, along with their privacy parameters.

1 page links to this URL
Fully Homomorphic Encryption in Production Systems

In this living document, I will list all production systems I’m aware of that use fully homomorphic encryption (FHE). For background on FHE, see my overview of the field. If you have any information about production FHE systems not in this list, or corrections to information in this list, please send me an email with sufficient detail allow the claim to be publicly verified. For all production deployments, I will distinguish between cases where the deployed system does “fully” homomorphic encryption (with bootstrapping), aka FHE, and “somewhat” homomorphic encryption, aka SHE (avoiding bootstrapping).

0 inbound links article en posts cryptographyfhehomomorphic encryptionmathematicsprogramming