Processing encrypted data without decryption or encryption
Confidential data can be processed by a third party without decryption thus maintaining security. Impervious to examination by a hostile adversary.
Processor s configured in this manner will be bespoke configurable for each encryption. The arithmetic tables particular to the encryption are be loaded into fast static memory on the processor in order to service a client who uses a particular private encryption. The client does not reveal the encryption by posting the tables. A processor of this kind can also be run in emulation, as a piece of software, and the same desirable properties accrue. Working in this way, it appears to be a suitably secure means for executing private processes in a cloud computing context. It is envisaged that an encrypted program and encrypted data and the encrypted arithmetic tables are process by the cloud, and encrypted results are returned.
美国

