Windows Support Tools

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 26 June 2009

IBM Claims Privacy Breakthrough for Cloud, Data

Posted on 00:05 by Unknown
IBM researcher Craig Gentry has proposed a method for manipulating data while leaving it encrypted. That could be big news for cloud computing, for antispam solutions, and for health care providers, according to an IBM (NYSE: IBM) statement -- if it works.

The news comes as regulators are monitoring the handling of personal data. The FTC recently announced the Red Flags rule to force companies to fight fraud more actively. Just yesterday, the now-famous ID thief Frank Abagnale, whose life story inspired the movie "Catch Me If You Can" and who now works for the FBI, said that companies must do better to protect their customers.

It's possible that they can with the breakthrough proposed in a paper by Gentry, a Stanford University Ph.D. candidate. The research was reported last week and published for Association of Computing Machinery members under the title "Fully homomorphic encryption using ideal lattices."

Homomorphic encryption enables encrypted data to be manipulated so that, when decrypted, the result is as if the operation had been performed on the unencrypted data -- an approach that makes it especially suitable for some types of security. Lattice encoding would normally limit the number of operations that could be conducted on the encrypted text, according to PGP Corporation cryptographer Hal Finney, who discussed the approach on a list serv.

But Gentry's approach manages to overcome those shortcomings.

"The resulting scheme is apparently not practical ... but it is still amazing that it is even possible," Finney wrote.

One problem may have to do with the fact that although the data is not decrypted, the software does manipulate a decryption mechanism while working with encrypted data. The ACM abstract notes that Gentry's technique uses "an encryption scheme that can evaluate (slightly augmented versions of) its own decryption circuit; we call a scheme that can evaluate its (augmented) decryption circuit bootstrappable."

Nevertheless, IBM has high hopes for the technology.

"We believe this breakthrough will enable businesses to make more informed decisions, based on more studied analysis, without compromising privacy," Charles Lickel, IBM vice president of software research, said in a statement. "We also think that the lattice approach holds potential for helping to solve additional cryptography challenges in the future."

Additionally, an IBM representative told InternetNews.com that "there are flavors of homomorphic encryption already out there, but they do not offer efficient, affordable ways of analyzing encrypted information from all angles. The fully homomorphic solution we've arrived at offers the possibility of performing nearly unlimited mathematical operations to analyze encrypted information."

PGP's Finney was certainly impressed with Gentry's technique. "I have to go back to Godel's and Turing's work to think of a comparable example," he wrote.

"This is ... one of the most remarkable crypto papers ever. Not only does it solve one of the oldest open problems in cryptography, the construction of a fully homomorphic encryption system, it does so by means of a self-embedding technique reminiscent of Godel's theorem."
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Receiving Error 'ORA-01041: internal error. hostdef extension doesn't exist.' on re-establishing a connection to Oracle.
    You can receive the error message 'Error ORA-01041: internal error. hostdef extension doesn't exist' when attempting to re-esta...
  • Google Sinks Cash into Undersea Cable
    Google has joined the Unity consortium, which will build a $300 million fiber optic cable linking the US and Japan. The 7.68 Tbps, 10,000 ki...
  • Troubleshooting the Microsoft Exchange Transport Service When It Fails to Start on an Exchange 2007 Hub Transport Server with Event ID 1032 or 1036
    Event ID: 1032 Socket Access Denied. Binding: 0.0.0.0:25. Event ID: 1036 Failed to open one or more bindings. The service will be stopped....
  • C Traps and Pitfalls (Addison Wesley, 1989, English)
    C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual beha...
  • SoftMaker Office 2008 Free Full Version Download With Genuine License Key
    SoftMaker Office 2008 is reliable office productivity software that is designed for beginners and professional users. SoftMaker Office Suite...
  • Amazon Takes the Humans Out of Fulfillment With New API
    keeps adding to its Web services. Today, it is opening up an API for its Fulfillment by Amazon service, which allows online merchants to out...
  • AP Microsoft backs Icahn's bid to oust Yahoo board
    SAN FRANCISCO - Microsoft Corp. threw its weight behind investor Carl Icahn's effort to dump Yahoo Inc.'s board, saying Monday that...
  • Suba Vesak Mangallayak Weewa !!!!
    Keep your heart free from hate your mind from worry, Live simply expect little, give much Fill your life with love forget self, think of ot...
  • How to Remove Dosearches.com homepage (Virus Removal Guide)
    Dosearches.com  is a browser hijacker, which is promoted via other free downloads, and once installed it will change your browser homepage t...
  • Alcohol 120% v5 Blu-ray Burner Free Download with Registration Unlock Code
    Alcohol 120% is a CD and DVD burning, copying, backup, recording, duplication, emulation and creation software for Windows. In addition to c...

Categories

  • ISA Firewall
  • ISA Server 2006
  • Quick Tips
  • Reports
  • Tips

Blog Archive

  • ►  2013 (7)
    • ►  October (6)
    • ►  February (1)
  • ►  2012 (10)
    • ►  September (3)
    • ►  August (3)
    • ►  July (3)
    • ►  June (1)
  • ►  2011 (16)
    • ►  August (2)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (12)
    • ►  December (3)
    • ►  October (4)
    • ►  March (1)
    • ►  January (4)
  • ▼  2009 (67)
    • ►  August (2)
    • ►  July (18)
    • ▼  June (23)
      • Components of Network Access Protection (NAP)
      • Exchange Server 2010 Beta available
      • Happy Father’s Day to all of you techie dads out t...
      • Free Windows 7 IT Pro beta class offered
      • Microsoft’s Virtual Lab Exams: Going Inside the Bl...
      • Implementing Roaming User Profiles in Windows Vista
      • Free E-Book on Terminal Services
      • Windows 7 Pre-Order 50% Half-Price Discount Promot...
      • Match Fixing
      • Movavi Video Converter
      • IBM Claims Privacy Breakthrough for Cloud, Data
      • Microsoft Hohm Beta Helps in Energy Conservation
      • Enterprise-strength Linux for mission-critical com...
      • Upgrade your MCP credentials for only 25 USD
      • The Ultimate Windows Support Framework
      • Microsoft Security Essentials 1.0 (Morro MSE Free ...
      • Swine Flue - Influenza A (H1N1) : Precautionary Me...
      • Huawei E583X Wireless Modem
      • Get Free NOD32 License with Valid Username and Pas...
      • ARM Cortex-A9 Potentially Power Up Next Generation...
      • Acer Plans Entry Level Windows Smartphones at $50
      • PRTG Network Monitor
      • Baby BlackBerry For Toddlers
    • ►  April (3)
    • ►  March (6)
    • ►  February (7)
    • ►  January (8)
  • ►  2008 (319)
    • ►  December (30)
    • ►  November (43)
    • ►  October (45)
    • ►  September (12)
    • ►  August (18)
    • ►  July (27)
    • ►  June (15)
    • ►  May (7)
    • ►  April (55)
    • ►  March (65)
    • ►  January (2)
  • ►  2007 (10)
    • ►  December (2)
    • ►  November (8)
Powered by Blogger.

About Me

Unknown
View my complete profile