1. Confidential Computing or Cryptographic Computing?
- Author
-
Popa, Raluca Ada
- Subjects
- *
DATA protection , *DATA security , *COMPUTING platforms , *CRYPTOGRAPHY , *COMPUTER network architectures , *INFORMATION technology security - Abstract
Increasingly stringent privacy laws, such as GDPR and CCPA, and rising cyber threats have driven demand for "encryption in use," which secures data during processing, preventing breaches common in computation phases. This approach enables secure collaboration on aggregated data without revealing individual datasets, with applications in healthcare, finance, and beyond. Two key methods—cryptographic computation and hardware-based confidential computing—offer trade-offs in security and efficiency. While cryptography works well for simple tasks, hardware enclaves handle complex workloads like advanced ML training more effectively. Emerging hybrid solutions aim to combine their strengths for broader use cases.
- Published
- 2024
- Full Text
- View/download PDF