wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/www.quantamagazine.org\/cryptographers-devise-an-approach-for-total-search-privacy-20231106\/#comments<\/a><\/br> So even with his hope renewed, Wichs assumed that any version of these programs that was secure was still a long way off. Instead, he and his co-authors \u2014 Wei-Kai Lin<\/a>, now at the University of Virginia, and Ethan Mook<\/a>, also at Northeastern \u2014 worked on problems they thought would be easier, which involved cases where multiple servers host the database.<\/p>\n In the methods they studied, the information in the database can be transformed into a mathematical expression, which the servers can evaluate to extract the information. The authors figured it might be possible to make that evaluation process more efficient. They toyed with an idea from 2011, when other researchers had found a way to quickly evaluate such an expression by preprocessing it, creating special, compact tables of values that allow you to skip the normal evaluation steps.<\/p>\n That method didn\u2019t produce any improvements, and the group came close to giving up \u2014 until they wondered whether this tool might actually work in the coveted single-server case. Choose a polynomial carefully enough, they saw, and a single server could preprocess it based on the 2011 result \u2014 yielding the secure, efficient lookup scheme Wichs had pondered for years. Suddenly, they\u2019d solved the harder problem after all.<\/p>\n At first, the authors didn\u2019t believe it. \u201cLet\u2019s figure out what\u2019s wrong with this,\u201d Wichs remembered thinking. \u201cWe kept trying to figure out where it breaks down.\u201d<\/p>\n But the solution held: They had really discovered a secure way to preprocess a single-server database so anyone could pull information in secret. \u201cIt\u2019s really beyond everything we had hoped for,\u201d said Yuval Ishai<\/a>, a cryptographer at the Technion in Israel who was not involved in this work. It\u2019s a result \u201cwe were not even brave enough to ask for,\u201d he said.<\/p>\n After building their secret lookup scheme, the authors turned to the real-world goal of a private internet search, which is more complicated than pulling bits of information from a database, Wichs said. The private lookup scheme on its own does allow for a version of private Google-like searching, but it\u2019s extremely labor-intensive: You run Google\u2019s algorithm yourself and secretly pull data from the internet when necessary. Wichs said a true search, where you send a request and sit back while the server collects the results, is really a target for a broader approach known as homomorphic encryption, which disguises data so that someone else can manipulate it without ever knowing anything about it.<\/p>\n Typical homomorphic encryption strategies would hit the same snag as private information retrieval, plodding through all the internet\u2019s contents for every search. But using their private lookup method as scaffolding, the authors constructed a new scheme which runs computations that are more like the programs we use every day, pulling information covertly without sweeping the whole internet. That would provide an efficiency boost for internet searches and any programs that need quick access to data.<\/p>\n While homomorphic encryption is a useful extension of the private lookup scheme, Ishai said, he sees private information retrieval as the more fundamental problem. The authors\u2019 solution is the \u201cmagical building block,\u201d and their homomorphic encryption strategy is a natural follow-up.<\/p>\n For now, neither scheme is practically useful: Preprocessing currently helps at the extremes, when the database size balloons toward infinity. But actually deploying it means those savings can\u2019t materialize, and the process would eat up too much time and storage space.<\/p>\n Luckily, Vaikuntanathan said, cryptographers have a long history of optimizing results that were initially impractical. If future work can streamline the approach, he believes private lookups from giant databases may be within reach. \u201cWe all thought we were kind of stuck there,\u201d he said. \u201cWhat Daniel\u2019s result gives is hope.\u201d<\/p>\n Quanta\u00a0is conducting a series of surveys to better serve our audience. Take our <\/i>computer science reader survey<\/i><\/a> and you will be entered to win free<\/i>\u00a0Quanta\u00a0merchandise.<\/i><\/p>\n<\/div>\n <\/br><\/br><\/br><\/p>\n
\nCryptographers Solve Decades-Old Privacy Problem<\/br>
\n2023-11-07 21:58:21<\/br><\/p>\n