Secure communication of encrypted data between clients and servers.
Ensuring that the server can perform operations on the data without learning about the data itself.
Requirements:
Confidentiality: The data should remain encrypted and indecipherable to the server.
Integrity: Ensuring that the data is not tampered with during transmission.
Authenticity: Verification that the messages are sent by legitimate sources.
Zero-knowledge proof: The server can prove the operation was performed correctly without knowing the actual data.
Secure communication of encrypted data between clients and servers. Ensuring that the server can perform operations on the data without learning about the data itself. Requirements:
Confidentiality: The data should remain encrypted and indecipherable to the server. Integrity: Ensuring that the data is not tampered with during transmission. Authenticity: Verification that the messages are sent by legitimate sources. Zero-knowledge proof: The server can prove the operation was performed correctly without knowing the actual data.