{"id":6178,"date":"2019-07-12T07:58:14","date_gmt":"2019-07-12T07:58:14","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=6178"},"modified":"2023-04-01T01:36:51","modified_gmt":"2023-04-01T01:36:51","slug":"google-unveils-open-source-cryptographic-tool","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/google-unveils-open-source-cryptographic-tool\/","title":{"rendered":"Google unveils Open Source Cryptographic Tool"},"content":{"rendered":"\n<p>Google has made available an open-source cryptographic tool called  Private Join and Compute. The tool uses secure multi-party computation  (MPC) to\u00a0augment the core PSI protocol.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-2878994212\"><div style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"gtech-3140993762\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/78935\" rel=\"noopener\" class=\"notrack\" aria-label=\"auyvc003\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003.webp\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003.webp 1200w, https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003-768x768.webp 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>More than 70 million records were stolen or leaked from poorly configured  databases last year, making privacy a top concern. That\u2019s no doubt one  motivation behind Google\u2019s open-sourcing of <a href=\"https:\/\/security.googleblog.com\/2019\/06\/helping-organizations-do-more-without-collecting-more-data.html\">Private Join and Compute<\/a>, a new secure multi-party computation (MPC) tool designed to help organizations work together with confidential data sets. <\/p>\n\n\n\n<p>Private Join and Compute combines two cryptographic techniques\u00a0 &#8211; private set  intersection and homomorphic encryption. Private set intersection is a  technique that finds common identifiers in two sets of data without  either data owner needing to show the other owner the underlying data.  Google uses an oblivious variant which only marks encrypted identifiers  without learning any of the identifiers.<\/p>\n\n\n\n<p>The second technique is homomorphic encryption. This takes encrypted  data and carries out computation on it without having to decrypt it,  preserving the privacy of the underlying raw data. Throughout the  process, individual identifiers and values remain concealed. For  example, you can count how many identifiers are in the common set or  compute the sum of values associated with marked encrypted identifiers,  without learning anything about individuals.\u00a0 <\/p>\n\n\n\n<p>By using both techniques in conjunction, only the size of the joined \nset and the statistics (e.g. sum) of its associated values is revealed. \nIndividual items are strongly encrypted with random keys throughout and \nare not available in raw form to the other party or anyone else.<\/p>\n\n\n\n<p>The idea is that the library could be used to work on data sets from  independent parties where each party holds their own information about a  set of shared identifiers (e.g. email addresses), some of which are  common, and get &#8220;aggregated insights&#8221; about each others data without  either of them learning any information about individuals in the  datasets.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>&#8220;exploring a number of potential use cases across collaborative  machine learning, user security, and aggregated ads measurement.&#8221;<\/em><\/p><cite> Google says <\/cite><\/blockquote>\n\n\n\n<p>Other suggested uses include mainly fall into the category of finding  answers where the data wouldn&#8217;t be available because of privacy issues,  such as what the long-term health outcomes are of using a new  preventative drug, or whether there&#8217;s a decrease in reported car  accidents when an auto manufacturer adds more advanced safety features  to vehicles. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More Information<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/eprint.iacr.org\/2019\/723\">Academic Paper Explaining Technology<\/a><\/li><li><a href=\"https:\/\/github.com\/Google\/private-join-and-compute\">Open Source Code And Documentation<\/a><\/li><li> <a href=\"https:\/\/security.googleblog.com\/2019\/06\/helping-organizations-do-more-without-collecting-more-data.html\">Private Join and Compute<\/a> <\/li><\/ul>\n<div class=\"gtech-end-cont\" id=\"gtech-1979932867\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-1909880371\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/76065\" rel=\"noopener\" class=\"notrack\" aria-label=\"26002\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2025\/10\/26002.jpg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2025\/10\/26002.jpg 1200w, https:\/\/gtechbooster.com\/media\/2025\/10\/26002-768x768.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Google has made available an open-source cryptographic tool called Private Join and Compute. The tool uses secure multi-party computation (MPC) to\u00a0augment the core PSI protocol. More than 70 million records were stolen or leaked from poorly configured databases last year, making privacy a top concern. That\u2019s no doubt one motivation behind Google\u2019s open-sourcing of Private [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6179,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[216,289,372,620,6],"class_list":["post-6178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-cryptography","tag-encryption","tag-google","tag-open-source","tag-programming"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=6178"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/6179"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=6178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=6178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=6178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}