Skip to comments.Daunting Mathematical Puzzle Solved, Enables Unlimited Analysis of Encrypted Data
Posted on 12/28/2013 10:40:30 AM PST by null and void
ARMONK, NY IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.
The patented breakthrough, called "fully homomorphic encryption," could enable deep and unrestricted analysis of encrypted information intentionally scrambled data without surrendering confidentiality. IBM's solution has the potential to advance cloud computing privacy and security by enabling vendors to perform computations on client data, such as analyzing sales patterns, without exposing or revealing the original data.
IBM's homomorphic encryption technique solves a daunting mathematical puzzle that confounded scientists since the invention of public-key encryption over 30 years ago.
Invented by IBM cryptography Researcher Craig Gentry, fully homomorphic encryption uses a mathematical object known as an "ideal lattice" that allows people to interact with encrypted data in ways previously considered impossible. The breakthrough facilitates analysis of confidential encrypted data without allowing the user to see the private data, yet it will reveal the same detailed results as if the original data was completely visible.
IBM received U.S. Patent #8,565,435: Efficient implementation of fully homomorphic encryption for the invention, which is expected to help cloud computing clients to make more informed business decisions, without compromising privacy and security.
"Our patented invention has the potential to pave the way for more secure cloud computing services without having to decrypt or reveal original data," said Craig Gentry, IBM Researcher and co-inventor on the patent. "Fully homomorphic encryption will enable companies to confidently share data and more easily and quickly overcome challenges or take advantage of emerging opportunities."
Following the initial revelation of the homomorphic encryption breakthrough in 2009 Gentry and co-inventor Shai Halevi began testing, refining and pursuing a working implementation of the invention. In 2011, the scientists reported a number of optimizations that advanced their goal of implementing of the scheme. The researchers continue to investigate homomorphic encryption and test its practical applicability.
IBM invests more than $6 billion annually in R&D and consistently explores new approaches to cloud computing that will deliver a competitive advantage to the company and its clients.
For 20 consecutive years, IBM has topped the list of U.S. patent recipients. The company's invention and patent leadership is illustrated at http://ibm.co/11k6fRn.
IBM has a tradition of making major cryptography breakthroughs, such as the design of the Data Encryption Standard (DES); Hash Message Authentication Code (HMAC); the first lattice-based encryption with a rigorous proof-of-security; and numerous other solutions that have helped advance data security.
More information about how IBM inventors are propelling cloud computing innovations is available at http://ibm.co/174A8tS.
The chinese had already stolen this encryption regime before the story was set in type.
In layman’s terms, the patent allows you to keep your data private while using it without having to fully trust the guy who is storing your data.
Ahahhaha well said.
homomorphisms are simply looser isomorphisms as far as their cohort of objects in their particular category are concerned.
Maybe “ideal” has to do with rings of these beasties and what these homomorphisms change into nothingness, or at least the zero of the ring. Oops, the math is beginning to get political.
"Loosen" things up and we go from isomorphisms to homomorphisms in a heartbeat. And it does not stop there.
A homomorphism is a map that preserves selected structure between two algebraic structures, with the structure to be preserved being given by the naming of the homomorphism. Particular definitions of homomorphism include the following:
A semigroup homomorphism is a map that preserves an associative binary operation.
A monoid homomorphism is a semigroup homomorphism that maps the identity element to the identity of the codomain.
A group homomorphism is a homomorphism that preserves the group structure. It may equivalently be defined as a semigroup homomorphism between groups.
A ring homomorphism is a homomorphism that preserves the ring structure. Whether the multiplicative identity is to be preserved depends upon the definition of ring in use.
A linear map is a homomorphism that preserves the vector space structure, namely the abelian group structure and scalar multiplication. The scalar type must further be specified to specify the homomorphism, e.g. every R-linear map is a Z-linear map, but not vice versa.
An algebra homomorphism is a homomorphism that preserves the algebra structure.
A functor is a homomorphism between two categories.
Is it clear, now?
I am uncomfortable with “A functor is a homomorphism between two categories.”. Homomorphism preserves some structure, and while categories have object with structure, I’m unclear what they have themselves. (I shouldn’t anthropomorphize, but some categories cute.)
Anyway, one of the developers (Steenrod) called “abstract nonsense”.
brb, grabbing some popcorn.
So, is it a hate crime to tell a homomorph to get functor?
Maybe similar methods can be used to derive threat patterns without getting too nosey into the affairs of the citizens.
I was thinking maybe it could be used on radio bursts
from other galaxies, it might not tell us their content
but would possibly indicate intelligence...
Only if you call a homomorphism a mother functor.
Benburch is interested...
They pulled this invention out of their ass.
Homomorphisms. Homological algebra. Homology groups. Homotheties.
must be another gay agenda
They are saying the government is going to continue to butt f#ck citizens, but, they are going to wear condoms.
> called “fully homomorphic encryption,”
Obviously, another insidious part of the homomorphic agenda!
Thanks null and void.
Target confirms PIN data was stolen in breach
The question that I find most mysterious is, What is math?
And how do atheists account for it?