{"id":4810,"date":"2016-09-02T13:16:05","date_gmt":"2016-09-02T11:16:05","guid":{"rendered":"https:\/\/www.ezn.de\/ezn-patent\/homomorphe-verschluesselung\/"},"modified":"2020-11-16T12:52:52","modified_gmt":"2020-11-16T11:52:52","slug":"homomorphe-verschluesselung","status":"publish","type":"ezn-patent","link":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/","title":{"rendered":"Encrypted Computing"},"content":{"rendered":"<p>In modern remote computing, data and programs are encrypted during storage and while in transit only. This is performed by applying approved cryptographic methods.<\/p>\n<p>However, in order to be processed, data and programs have to be decrypted. To achieve this, the remote resource needs to know the secret decryption key to be able to decrypt all required software for the processing step. This means that the remote resource can read all programs and data in the clear. In many situations in distributed infrastructures this is not desirable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In modern remote computing, data and programs are encrypted during storage and while in transit only. This is performed by applying approved cryptographic methods. However, in order to be processed, data and programs have to be decrypted. To achieve this, the remote resource needs to know the secret decryption key to be able to decrypt [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"template":"","meta":{"footnotes":""},"ezn-category":[2395],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encrypted Computing | EZN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypted Computing | EZN\" \/>\n<meta property=\"og:description\" content=\"In modern remote computing, data and programs are encrypted during storage and while in transit only. This is performed by applying approved cryptographic methods. However, in order to be processed, data and programs have to be decrypted. To achieve this, the remote resource needs to know the secret decryption key to be able to decrypt [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/\" \/>\n<meta property=\"og:site_name\" content=\"EZN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ezngmbh\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-16T11:52:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/\",\"url\":\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/\",\"name\":\"Encrypted Computing | EZN\",\"isPartOf\":{\"@id\":\"https:\/\/www.ezn.de\/#website\"},\"datePublished\":\"2016-09-02T11:16:05+00:00\",\"dateModified\":\"2020-11-16T11:52:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ezn.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech-Offer\",\"item\":\"https:\/\/www.ezn.de\/ezn-patent\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Encrypted Computing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ezn.de\/#website\",\"url\":\"https:\/\/www.ezn.de\/\",\"name\":\"EZN\",\"description\":\"WE GET IDEAS MOVING\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ezn.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ezn.de\/#\/schema\/person\/09871074ce7124f2c336b9ae90419d92\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ezn.de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ddb5e9f1324c1f6ead75f6dde04c2611302f92a53bfcf6475d200adfa16a7c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ddb5e9f1324c1f6ead75f6dde04c2611302f92a53bfcf6475d200adfa16a7c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.ezn.de\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encrypted Computing | EZN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/","og_locale":"en_US","og_type":"article","og_title":"Encrypted Computing | EZN","og_description":"In modern remote computing, data and programs are encrypted during storage and while in transit only. This is performed by applying approved cryptographic methods. However, in order to be processed, data and programs have to be decrypted. To achieve this, the remote resource needs to know the secret decryption key to be able to decrypt [&hellip;]","og_url":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/","og_site_name":"EZN","article_publisher":"https:\/\/www.facebook.com\/ezngmbh\/","article_modified_time":"2020-11-16T11:52:52+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/","url":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/","name":"Encrypted Computing | EZN","isPartOf":{"@id":"https:\/\/www.ezn.de\/#website"},"datePublished":"2016-09-02T11:16:05+00:00","dateModified":"2020-11-16T11:52:52+00:00","breadcrumb":{"@id":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ezn.de\/en\/ezn-patent\/homomorphe-verschluesselung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ezn.de\/en\/"},{"@type":"ListItem","position":2,"name":"Tech-Offer","item":"https:\/\/www.ezn.de\/ezn-patent\/"},{"@type":"ListItem","position":3,"name":"Encrypted Computing"}]},{"@type":"WebSite","@id":"https:\/\/www.ezn.de\/#website","url":"https:\/\/www.ezn.de\/","name":"EZN","description":"WE GET IDEAS MOVING","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ezn.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ezn.de\/#\/schema\/person\/09871074ce7124f2c336b9ae90419d92","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ezn.de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ddb5e9f1324c1f6ead75f6dde04c2611302f92a53bfcf6475d200adfa16a7c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ddb5e9f1324c1f6ead75f6dde04c2611302f92a53bfcf6475d200adfa16a7c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.ezn.de\/en\/author\/admin\/"}]}},"ref-nr":"14558","summary":"The invention helps to ensure security and confidentiality of software and data in a remote delegation scenario by simulating the encrypted circuit representation of a computer system. The client sends an encrypted aggregate as a black box to a remote computing resource which performs the computation blindfolded and delivers the results in an encrypted form.","_links":{"self":[{"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/ezn-patent\/4810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/ezn-patent"}],"about":[{"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/types\/ezn-patent"}],"author":[{"embeddable":true,"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/ezn-patent\/4810\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/media?parent=4810"}],"wp:term":[{"taxonomy":"ezn-category","embeddable":true,"href":"https:\/\/www.ezn.de\/en\/wp-json\/wp\/v2\/ezn-category?post=4810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}