In FHE the hardware running it don't know the secrets. That's the point.
First you encrypt the data. Then you send it to hardware to compute, get result back and decrypt it.
In FHE the hardware running it don't know the secrets. That's the point.
First you encrypt the data. Then you send it to hardware to compute, get result back and decrypt it.
But you leak all type of information and and the retrieve either leak even more data or you'll end up with transferring a god knows amount of data or your encryption is trivially broken or spend days/month/years to unencrypt.
I don't know how you got these ideas but when you crack it, do make sure to write a post about it. Can't wait for that writeup.
LWE estimator isn't a proxy for this?
Math literacy needs to become standard for computer scientists. These takes are so bad
Or reading papers on the subjects, and playing with implementing FHE search.