by jakelazaroff on 6/18/25, 12:59 PM with 74 comments
by plopilop on 6/18/25, 1:56 PM
The first FHE scheme required keys of several TB/PB, bootstrapping (an operation that is pivotal in FHE schemes, when too many multiplications are computed) would take thousands of hours. We are now down to keys of "only" 30 MB, and bootstrapping in less than 0.1 second.
Hopefully progress will continue and FHE will become more practical.
by qualeed on 6/18/25, 1:05 PM
https://en.wikipedia.org/wiki/Conflict-free_replicated_data_...
by teleforce on 6/18/25, 1:32 PM
Ouch!
by NetRunnerSu on 6/18/25, 3:55 PM
by Joker_vD on 6/18/25, 1:18 PM
What? No, the server sends you the changes you've not seen yet, you decrypt and merge them, and so you get the latest version of the document. Right?
The homomorphic encryption is a fascinating topic, but it's almost never an answer if you need anything resembling reasonable performance and/or reasonable bandwidth.
I've seen a paper that ingeniuously uses homomorphic encryption to implement arbitrary algorithmic computations, totally secret, by encoding a (custom-crafted) CPU together with RAM and then running "tick a clock" algorithm on them. And it works, so you can borrow some AWS huge instance and run you super-important calculations there — at 1 Hz. I am not kidding, it's literally 1 virtual CPU instruction per second. Well, if you are okay with such speed and costs, you either have very small data — at which point just run your computation locally, or you're really, really rich — at which point just buy your own goddamn hardware and, again, run it locally.
by hoppp on 6/18/25, 6:39 PM
Instead use openFHE (C++) or lattigo (golang) libraries which are both free to use commercially.
by somezero on 6/18/25, 4:51 PM
by yusina on 6/18/25, 5:32 PM
by meindnoch on 6/18/25, 5:18 PM
by DPDmancul on 6/19/25, 9:32 AM
by mihau on 6/18/25, 4:21 PM
To name a few: Nice style (colors, font, style), "footnotes" visible on the margin, always on table of contents, interactivity and link previews on hover.
Nice. What's your tech stack?
by xvector on 6/19/25, 6:06 AM
> Rather than if or match expressions, we use FheBool’s select method. It returns the first argument if the underlying FheBool value is true, or the second argument if the underlying value is false.
This wasn't super clear to me. I get the computation is performed on encrypted values, but how does ".select" actually work?
Is ".select" just evaluating to "keep_self*self.peer + keep_self*other.peer"?
by GRBurst on 6/19/25, 8:24 AM
by thrance on 6/18/25, 1:38 PM
by DinoNuggies45 on 6/19/25, 2:48 PM
by chrisweekly on 6/19/25, 1:38 AM
"In the context of encryption, 'homomorphic' describes methods that enable computations on encrypted data without needing to decrypt it first.
by scyclow on 6/18/25, 3:17 PM
by 867-5309 on 6/18/25, 2:43 PM
by drob518 on 6/18/25, 6:05 PM
by jdefr89 on 6/19/25, 12:34 AM