ChaptersCircleEventsBlog
Align cybersecurity controls with evolving regulations and make a real impact in the industry. Join CSA's Regulatory Analysis and Compliance Engineering Working Group!

Working Group

Fully Homomorphic Encryption

FHE in Cloud: Enhancing Security, Standardization, and Implementation Practices in Cloud Environments
Fully Homomorphic Encryption

Working Group Summary

Through the use and deployment of cryptographic libraries, specialist software toolchains and dedicated hardware and infrastructure, FHE can be leveraged to provide enhanced levels of protection for data in use. Supporting integration of FHE-enabled workflows with existing data practices will require technical resources and insight based on ongoing experimentation. The objectives of the working group are to investigate, understand and communicate the impact  of FHE in a cloud security context, and to establish best working practices and standards in the implementation and use of FHE as an information security tool.  What do we discuss? We discuss FHE in the context of cloud computing, with emphasis on practical elements of implementation, standardization and security modelling. The regulatory environment, impact on the control domains for cloud security, and establishment and evaluation of proofs-of-concept, also fall within the scope of the working group.

What is Fully Homomorphic Encryption?

Fully Homomorphic Encryption (FHE) is a cryptographic technology that enables computing over encrypted data. In traditional computing and cryptography, data can be protected by encryption when in storage or in transit over networks, but this protection must be stripped away before processing. This leaves data-in-use vulnerable to malicious attacks, accidental leakage, or unwarranted data sharing. FHE closes this vulnerability by providing a cryptographic system in which computing operations can be performed directly on the data without removing the protective encryption. 

Any computing operation can be performed under FHE, including more complex functionality such as machine learning and other data analytic processes. FHE also supports a range of different security models that allow for forms of secure multi-party computation and collaboration in which the inputs to the process remain totally private.

What is the importance of Fully Homomorphic Encryption?

FHE offers significant improvements to the way in which access and analysis of sensitive data is handled in fields such as finance, healthcare, and government, where cryptographic assurances of protection throughout the data life-cycle are highly desirable. Access to sensitive information for processing purposes is critical to the modern world, yet satisfactory protection of this asset under existing models of information security is technically complex and difficult to achieve. By encrypting data throughout all stages of management and use, a wide range of challenges to information security including both internal and external threats can be better managed. 

In summary, FHE is a new and extremely powerful technology that extends mathematically assessable cryptographic security from storage and transit to the processing stage of data usage. As the support provided by advances in the core technology and infrastructure improves, FHE is likely to become a ubiquitous tool in data security, in much the same way as conventional cryptography has become universal.

Working Group Leadership

Ryan Gifford
Ryan Gifford

Ryan Gifford

Research Analyst, CSA

Working Group Co-Chairs

Joseph Wilson
Joseph Wilson

Joseph Wilson

Joseph Wilson is co-Chair for the Cloud Security Alliance's (CSA's) Fully Homomorphic Encryption (FHE) Working Group (WG), which was formed to address industrial deployment and adoption of FHE and to help the industry navigate this branch of Privacy Enhancing Technologies. He holds a PhD in Theoretical Physics from the University of Leeds, and an MPhys in Experimental Physics from the University of York. He is currently Head of Strategic In...

Read more

Publications in ReviewOpen Until
Agentic AI Identity and Access Management: A New ApproachJul 03, 2025
Fully Homomorphic Encryption to CCM v4.0.1 MappingJul 10, 2025
AICM to ISO 42001 MappingJul 10, 2025
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Agentic AI Identity and Access Management: A New Approach

Open Until: 07/03/2025

Traditional Identity and Access Management (IAM) systems, primarily designed for human users or static machine identities v...

Fully Homomorphic Encryption to CCM v4.0.1 Mapping

Open Until: 07/10/2025

We are seeking input from industry and legal professionals with experience in cloud security and policy, and comment from F...

AICM to ISO 42001 Mapping

Open Until: 07/10/2025

The Cloud Security Alliance (CSA) invites public peer review of its draft mapping between the AI Controls Matrix (A...