by 9ac345a5509a on 8/5/13, 1:08 PM with 24 comments
by ReidZB on 8/5/13, 3:26 PM
As of right now, the current-day state-of-the-art fully-homomorphic schemes impose roughly a billion-factor overhead on operations, but this is quickly decreasing (in the past 4 years, we've already knocked off three orders of magnitude). But I am personally convinced that an efficient scheme would likely revolutionize privacy in computing. Exciting stuff, especially with recent events.
Unfortunately, I don't expect an efficient scheme to be widely-used for at least 15-25 years. For one, even if a super-efficient FHE scheme was published tomorrow, it'd probably take at least 6-10 years of powerful, sustained cryptanalysis for the community to trust it. Add the time to discover such a scheme (if even possible...) and you have quite a while. But still, the potential is amazing.
by davidw on 8/5/13, 3:01 PM
There's a bunch of data on a server, including, say, encrypted names. Users accessing the server have a key to decrypt those names, but they also need to be able to search for and sort names. Decrypting all the names and searching/sorting would be one option, but with enough names, it becomes very, very slow. Another option is having a big index that you decrypt for searching/sorting. This is kind of unwieldy as well, even if it's faster than decrypting everything piece by piece.
Perhaps the right homomorphic encryption techniques could also be used, although you'd have to account for substring searching in the case of names: finding "David" searching for "Dav".
by joshuak on 8/5/13, 3:59 PM
I actually did this once at a company I worked for. Both the management and the employees ended up unhappy.
(the typical, and more secure, version of this includes public key encryption between each participant)
by nkoren on 8/5/13, 9:22 PM
Uncaught TypeError: Cannot read property 'length' of undefined BigInt.js:1
expand BigInt.js:1
powMod BigInt.js:1
decryptRecAns paillier.js:70
getConsensus distribute.js:94
by eterm on 8/5/13, 2:10 PM
Are negative numbers not yet supported?
editted to add: Or indeed decimal numbers.
Natural numbers only then?
Still seems cool even if how it works is a mystery to me.
by ewillbefull on 8/5/13, 1:31 PM
Is it possible to use homomorphic encryption to create a network of "dump pipes" for exchanging data?
Tor is slow because data has to hop from peer to peer until it hits its destination. What if the "nodes" between you and the recipient ran on a single machine? Clients would simply send a homomorphically encrypted program to a central server which merely executed it. The programs and the data exchanged could be completely transparent, you could even give law enforcement access, and assuming:
1. the homomorphic encryption is secure
2. your data passes through enough trustworthy peers
3. there are enough nodes involved for plausible deniability
...it would not be possible to identify the path data takes as it is routed around.
Or am I missing something?
by geal on 8/5/13, 2:36 PM
For anonymization systems, care must be taken: being able to manipulate encrypted data could very well create information leaks.
There have been some interesting theoretical uses of the Pallier cryptosystem in private information retrieval systems, though.
by general_failure on 8/6/13, 12:46 AM