Working Group
Fully Homomorphic Encryption
FHE in Cloud: Enhancing Security, Standardization, and Implementation Practices in Cloud Environments
Working Group Summary
Through the use and deployment of cryptographic libraries, specialist software toolchains and dedicated hardware and infrastructure, FHE can be leveraged to provide enhanced levels of protection for data in use. Supporting integration of FHE-enabled workflows with existing data practices will require technical resources and insight based on ongoing experimentation. The objectives of the working group are to investigate, understand and communicate the impact of FHE in a cloud security context, and to establish best working practices and standards in the implementation and use of FHE as an information security tool. What do we discuss? We discuss FHE in the context of cloud computing, with emphasis on practical elements of implementation, standardization and security modelling. The regulatory environment, impact on the control domains for cloud security, and establishment and evaluation of proofs-of-concept, also fall within the scope of the working group.
What is Fully Homomorphic Encryption?
Working Group Leadership

Ryan Gifford
Research Analyst, CSA
Working Group Co-Chairs

Joseph Wilson
Joseph Wilson is co-Chair for the Cloud Security Alliance's (CSA's) Fully Homomorphic Encryption (FHE) Working Group (WG), which was formed to address industrial deployment and adoption of FHE and to help the industry navigate this branch of Privacy Enhancing Technologies. He holds a PhD in Theoretical Physics from the University of Leeds, and an MPhys in Experimental Physics from the University of York. He is currently Head of Strategic In...
Publications in Review | Open Until |
---|---|
Agentic AI Identity and Access Management: A New Approach | Jul 03, 2025 |
Fully Homomorphic Encryption to CCM v4.0.1 Mapping | Jul 10, 2025 |
AICM to ISO 42001 Mapping | Jul 10, 2025 |
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.