NEWS: 公告在東京證券交易所JASDAQ標準市場新上市


SPC (Secure and Private Compute) (2021年) :Kisaco 創新雷達

Kisaco Innovation Radar on Secure and Private Compute 2021

出版商 Kisaco Research Limited 商品編碼 1007522
出版日期 內容資訊 英文 36 Pages
商品交期: 最快1-2個工作天內
SPC (Secure and Private Compute) (2021年) :Kisaco 創新雷達 Kisaco Innovation Radar on Secure and Private Compute 2021
出版日期: 2021年02月02日內容資訊: 英文 36 Pages

隨著突破性技術首次為企業提供SPC(Secure and Private Compute),網絡安全形勢正在發生根本性的變化。您可以通過在數據整個生命週期內加密數據、將其歸數據所有者所有並在不離開數據所有者的情況下使用加密密鑰來提供最大的安全性和隱私。

本報告介紹了 SPC(安全和私有計算)技術和市場狀況,並介紹了一些在該領域處於領先地位的新主要公司。它還提供關鍵組織、標準化工作、業務用例和尖端供應商的簡介。


  • Kisaco Research 的觀點
  • 動機
  • 主要調查結果
  • SPC 技術和市場狀況
  • SPC 簡介
  • 與命名約定相關
  • 不同於過去的現在的新可能性
  • SPC 業務用例
  • SPC的主要技術
  • 基於格的加密
  • 全同態加密 (FHE)
  • 輕微部分同態加密(SHE、PHE)
  • TEE 飛地
  • 量子證明 SPC
  • SPC 加密方案比較
  • SPC 硬件加速
  • GPU、FPGA、特定領域架構加速
  • 供應商分析
  • Cornami
  • Cybernetica
  • Decentriq
  • Duality Technologies
  • Inpher
  • Zama
  • 附錄
  • SPC產業集團
  • 機密計算聯盟
  • 同態加密的標準化
  • MPC 聯盟
  • 感謝語
  • 作者
  • Kisaco Research 的分析網絡
  • 版權聲明/免責聲明


The cybersecurity landscape is undergoing radical transformation through breakthrough technologies that for the first time offer secure and private compute (SPC) to enterprises. We wish to encrypt data across the three phases that track its complete lifecycle: at rest, in flight, and during compute. With encryption of data throughout its lifecycle and with the encryption keys held by and never leaving the data owner, it is possible to offer maximum security and privacy. The challenge has been creating viable encryption in compute schemes - this is what SPC technologies tackle. The usual, current practice in any computation on encrypted data is that first you need to decrypt it, perform the required computation, and then encrypt the results. The challenge and 'holy grail' has been to compute with encrypted data and do so within reasonable time and cost.

SPC has emerged in recent years with a number of competing technologies which each have their strengths and weaknesses. This report explains the technology and market landscape and profiles some of the new leading players pioneering this field. We cover technologies such as homomorphic encryption (HE) and its various modes, including fully homomorphic encryption (FHE), as well as enclaves in trusted execution environments (TEE) and applications in secure multi-party computation (MPC). We also name the key organizations that are driving this community, describe the efforts in standardization, and identify business use cases that enterprises should be aware and learn about today. The report further provides profiles on vendors at the cutting edge of SPC: Cornami, Cybernetica, Decentriq, Duality, Inpher, and Zama.

What you will learn:

  • How is secure and private compute (SPC) different from other forms of data encryption and what will its impact be on businesses and how we use the internet and cloud.
  • What are the key technologies enabling SPC, including an introduction to FHE, TEE and MPC.
  • The strengths and weaknesses of the key enabling technologies.
  • What is on the roadmap in SPC and what will be the impact of hardware accelerators.
  • Which are the key SPC vendor associations and what is their activities.
  • We provide in-depth profiles on each participating vendor, who are pioneers in SPC.

Table of Contents

  • Kisaco Research View
  • Motivation
  • Key findings
  • SPC technology and market landscape
  • Introduction to SPC
  • Naming conventions and associations
  • What is new and possible today that is different from the past
  • The business use case for SPC
  • The key technologies in SPC
  • Lattice-based cryptography
  • Fully Homomorphic Encryption (FHE)
  • Somewhat and Partial Homomorphic Encryption (SHE, PHE)
  • Enclaves in TEE
  • Quantum proofing SPC
  • Comparing the SPC cryptographic schemes
  • Hardware acceleration for SPC
  • The DARPA DPRIVE initiative
  • Acceleration with GPUs, FPGAs, and domain specific architectures
  • Vendor analysis
  • Cornami
  • Cybernetica
  • Decentriq
  • Duality Technologies
  • Inpher
  • Zama
  • Appendix
  • The SPC industry associations
  • Confidential Computing Consortium
  • Homomorphic Encryption Standardization
  • MPC Alliance
  • Acknowledgements
  • Author
  • Kisaco Research Analysis Network
  • Copyright notice and disclaimer


  • Figure 1: Securing the data lifecycle: the problem without encrypting compute.
  • Figure 2: Lattice-based cryptography.
  • Figure 3: HE operations of addition and multiplication on data items.
  • Figure 4: FHE breakthrough: bootstrapping.
  • Figure 5: TEE.
  • Figure 6: Comparing HE, TEE, and secure sharing MPC
  • Figure 7: FHE compute time using LAWS
  • Figure 8: The vendors profiled in this report and key technologies they offer.
  • Figure 9: Comparing a simple 1D convolution operation on a CPU, GPU, and Cornami chip.
  • Figure 10: The Cornami software stack.
  • Figure 11: Configuring the hardware to the "shape of the software".
  • Figure 12: Sharemind: building services with end-to-end data protection.
  • Figure 13: Comparing the two versions of Sharemind.
  • Figure 14: The Decentriq platform: high-level workflow and components for the MPC example.
  • Figure 15: Duality products and application areas.
  • Figure 16: Inpher entry in the IDASH Privacy and Security Workshop 2020.
  • Figure 17: Inpher XOR solution.
  • Figure 18: The Zama software stack for FHE.
  • Figure 19: Venn diagram of various technologies used to protect data in use.
  • Figure 20: MPC concerns two or more parties wishing to share information confidentially