
But there are drawbacks beneath the surface that can make SMPC implementation more complex.įirst off, SMPC introduces additional architectural components and new methods for computation. Running operations on encrypted data, without decrypting the underlying values, is clearly taking the market by storm.

On the surface, SMPC can seem like a silver bullet solution. Instead, they must guess from billions of combinations to unlock the key.Īs a result, SMPC achieves the same homomorphic-like functionality that people clearly desire, but without the performance penalties, data leakage and need for application rewrites that homomorphic encryption brings.ĭownload the Gartner Cool Vendor Report on Privacy Preserving Analytics Another example of SMPC in practice is key splitting or secret sharing, where an encryption key is split into shares so that no attacker has all of the components to reassemble the key in full. Utilizing this approach, SMPC can be implemented to enforce a security model where the encrypted data and encryption keys are never comingled while computation on the encrypted data is occurring. As a result, data remains encrypted in memory, in process and at rest. SMPC provides a mechanism to enable computation on encrypted data, without decrypting the underlying values themselves. Unlike homomorphic encryption, secure multiparty computation (SMPC) can use an AES cryptographic algorithm, which is considered an industry standard encryption mode, and which has strong properties around privacy and confidentiality. What is Secure Multiparty Computation? What are its Advantages? In this post, we’ll look at Secure Multiparty Computation (SMPC) as an approach to enable homomorphic properties and its advantages and drawbacks.
AUTOCRYPT HOMOMORPCHIC SERIES
Central to this entire blog series is the need to implement best security practices without slowing down the speed of business. In my last blog post, I reviewed the key advantages and disadvantages of homomorphic encryption. Today we continue our Homomorphic Encryption Explored series with a look at how the technology compares to Multiparty Computation. But is this technology ready for widespread deployment in enterprise environments? Our CEO and Co-founder Ameesh Divatia contributed his thoughts on the topic in a recent Dark Reading article. Homomorphic encryption continues to entice cryptographers and academics.
