Introduction to Fully Homomorphic Encryptionby@Vitalik
2,381 reads
2,381 reads

Introduction to Fully Homomorphic Encryption

by Vitalik Buterin17mMarch 24th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Fully homomorphic encryption allows a third party to perform computations on encrypted data, and get an encrypted result that they can hand back to whoever has the decryption key for the original data. It can also be used to implement privacy-preserving light clients and more generally scalability solutions to privacy preserving protocols that today require each user to personally scan the entire blockchain for incoming transactions. Fully homomorphic encryption allows unlimited additions and multiplications. Additions and multiplications let you replicate any binary circuit gates .

Company Mentioned

Mention Thumbnail
featured image - Introduction to Fully Homomorphic Encryption
Vitalik Buterin HackerNoon profile picture
Vitalik Buterin

Vitalik Buterin

@Vitalik

Share Your Thoughts

About Author

Vitalik Buterin HackerNoon profile picture
Vitalik Buterin@Vitalik

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!