top | item 5667384

IBM open sources new approach to crypto

69 points| aynlaplant | 13 years ago |theregister.co.uk

20 comments

order
[+] jimktrains2|13 years ago|reply
> The encrypted file – if The Register understands the paper correctly – embeds actions that are permitted on that file (for example, the ability to read and write to parts or all of the file. The Evaluate function is able to use the combination of the public key and permitted actions (described as circuits) to operate on the file without decrypting it.

I'm pretty sure that this has nothing to do with permissions. Homomorphic encryption maintains certain properties of the plaintext (through some isomorphism) to allow pre-defined operations (operations that the isomorphism are designed for).

Also, why theregister? Why not link to the actual article (http://eprint.iacr.org/2011/277) or the github project (https://github.com/shaih/HElib) They're much, much more informative.

[+] CervezaPorFavor|13 years ago|reply
The Register article is much easier to read as a news piece, especially for people unfamiliar with encryption algorithms.

Besides, the article includes links to more technical materials, including the project page should the reader want to find out more.

[+] lgeek|13 years ago|reply
>> The encrypted file – if The Register understands the paper correctly – embeds actions that are permitted on that file (for example, the ability to read and write to parts or all of the file. The Evaluate function is able to use the combination of the public key and permitted actions (described as circuits) to operate on the file without decrypting it.

> I'm pretty sure that this has nothing to do with permissions. Homomorphic encryption maintains certain properties of the plaintext (through some isomorphism) to allow pre-defined operations (operations that the isomorphism are designed for).

I've read 'permitted' as 'operations that can be performed on the ciphertext when using this encryption scheme'. While it might be ambiguous, I don't think they're incorrect in saying that.

[+] jamoes|13 years ago|reply
Regardless of whether they were right, I really appreciate that they added the "... – if The Register understands the paper correctly – ..." clause.

So many technical articles just get the facts wrong and pass them off as correct. I appreciate the honesty in this case.

[+] smiddereens|13 years ago|reply
If it's on The Register then they almost certainly don't understand the source material.
[+] omati|13 years ago|reply
Is there some simple description of the operations supported and the space and time complexity of them, as well as their effects on "hidden" parameters of the ciphertexts anywhere?

All the available documentation seems to focus on the underlying implementation and mathematical proofs without clearly stating the user-visible performance behavior.

For example, if I have N encrypted signed B-bit integers (treated as modulo 2^B), and add them all with homomorphic encryption, how much time does that take and how large is the resulting cyphertext?

What if I have two N-dimensional vectors called v and w of B-bit integers (treated as modulo 2^B), and want to compute the value v^T . M . w where M is an NxN matrix?

What if they are floating point instead? Is that supported? Are integers modulo M supported for any M?

Is the sign(x) operation available or just addition and multiplication?

[+] cantos|13 years ago|reply
Regarding the last question, if you have an encryption method that can encrypt 0 and 1 and has (efficient) algorithms for multiplying and adding the plaintexts corresponding to encrypted messages then you can efficiently compute any boolean circuit.

So any fast algorithm that can be computed without encryption can be computed efficiently by a homomorphic encryption scheme (in time that is some low degree polynomial of the time needed for the unencrypted algorithm).

[+] DoubleMalt|13 years ago|reply
How about patents? I remember having read that IBM holds patents for homomorphic encryption. Does the open sourcing also include a royalty free license to IBMs patents?

EDIT: Just saw GPL2 or later, so choosing GPL3 would mean patent license included, right?

[+] kyrias|13 years ago|reply
If they release it under GPL3 then you'd be able to use it even if it's infriging on IBM's patents, if they release it under GPL2 then no.
[+] _stephan|13 years ago|reply
Does anyone know whether one can host open source crypto code on GitHub without risking violations of the US Export Administration Regulations? One issue could for example be that GitHub doesn't block access from countries under US embargo, AFAIK.
[+] TomMasz|13 years ago|reply
Yes you can. BIS effectively decontrolled open source encryption software a few years ago, essentially admitting that attempts to control the export of something that was already available world-wide was a waste of time.