{"id":4220,"date":"2010-07-14T04:33:37","date_gmt":"2010-07-14T11:33:37","guid":{"rendered":"http:\/\/palblog.fxpal.com\/?p=4220"},"modified":"2010-07-14T10:59:51","modified_gmt":"2010-07-14T17:59:51","slug":"computing-with-secrets","status":"publish","type":"post","link":"https:\/\/blog.fxpal.net\/?p=4220","title":{"rendered":"Computing with Secrets"},"content":{"rendered":"<p>Tom Simonite of <a title=\"Technology Review\" href=\"http:\/\/www.technologyreview.com\/\" target=\"_blank\">Technology Review<\/a> interviewed me about the breakthrough in fully homomorphic encryption that I blogged about <a title=\"How to compute without knowing anything\" href=\"http:\/\/palblog.fxpal.com\/?p=2858\" target=\"_blank\">here<\/a>. I very much enjoyed talking with him, and was pleased to see that he wrote a good article on the subject<strong>: <a title=\"Computing with Secrets\" href=\"http:\/\/www.technologyreview.com\/computing\/25537\/\" target=\"_blank\">Computing with Secrets, but Keeping them Safe: A cryptographic method could see cloud services work with sensitive data without ever decrypting it<\/a><\/strong>. He quotes me a couple of times on the <a title=\"Computing with Secrets, page 2\" href=\"http:\/\/www.technologyreview.com\/computing\/25537\/page2\/\" target=\"_blank\">second page<\/a> of the article and generously gives me the last word.<\/p>\n<p>I&#8217;ve been surprised at how little has been written about this breakthrough, little enough that <a title=\"How to compute without knowing anything\" href=\"http:\/\/palblog.fxpal.com\/?p=2858\" target=\"_blank\">my blog post<\/a> continues to be among the top 20 hits for a number of related queries. The field is definitely hot, with DARPA recently announcing two related solicitations, <a title=\"DARPA-RA-10-80\" href=\"http:\/\/www.grants.gov\/search\/search.do?mode=VIEW&amp;oppId=55651\" target=\"_blank\">DARPA-RA-10-80<\/a> and <a title=\"DARPA-BAA-10-81\" href=\"https:\/\/www.fbo.gov\/index?s=opportunity&amp;mode=form&amp;id=bdc9731e7db14358c390a22d6b0d5b45&amp;tab=core&amp;_cview=0\" target=\"_blank\">DARPA-BAA-10-81<\/a>, on PROgramming Computation on EncryptEd Data (PROCEED). The first solicits research proposals for development of new mathematical foundations for efficient computation on encrypted data via fully homomorphic encryption. The second solicitation is broader, with the goal of developing practical methods for computation on encrypted data without decrypting the data and modern programming languages to describe these computations.<\/p>\n<div id=\"_mcePaste\" style=\"overflow: hidden; position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px;\">\n<h1 style=\"font-size: 260%;\"><strong><strong>Computing with Secrets, but Keeping them Safe<\/strong><\/strong><\/h1>\n<h1 style=\"font-size: 260%;\"><strong><strong>Computing with Secrets, but Keeping them Safe<\/strong><\/strong><\/h1>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tom Simonite of Technology Review interviewed me about the breakthrough in fully homomorphic encryption that I blogged about here. I very much enjoyed talking with him, and was pleased to see that he wrote a good article on the subject: Computing with Secrets, but Keeping them Safe: A cryptographic method could see cloud services work [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[147,109,170],"tags":[174,121,148],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=\/wp\/v2\/posts\/4220"}],"collection":[{"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4220"}],"version-history":[{"count":12,"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=\/wp\/v2\/posts\/4220\/revisions"}],"predecessor-version":[{"id":4232,"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=\/wp\/v2\/posts\/4220\/revisions\/4232"}],"wp:attachment":[{"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.fxpal.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}