computer security

Prof. Shafi Goldwasser, who is at both the Weizmann Institute and MIT, will receive the 2012 A.M. Turing Award, together with Prof. Silvio Micali of MIT. Goldwasser is only the third woman to receive the Award since its inception in 1966, and she is the third faculty member of the Weizmann Institute to receive what is considered to be the “Nobel Prize in computing.” Goldwasser and Micali’s work in the 1980s laid the foundations of modern cryptography – the science that, among other things, keeps your electronic transactions secure. The basis of their work is a series of riffs on the…
Is it possible to perform operations on encrypted data, while keeping it secure from all prying eyes (or circuits), even if that data is stored remotely, in the "cloud?" Will our end result still be encrypted, and when we decode it with our private decryption key, will our result be correct? To put it another way, could we allow sensitive data - say private medical information - to be monitored on-line and feel completely secure in the knowledge that no one can access it without our express permission? Can we use a cloud service to store our encrypted data and perform a search on that data…
.... Not to pick on Norm's physical appearance or anything, but those of use who find his continued existence in Minnesota politics both enigmatic and unconscionable (for us, for allowing it) are starting to see him like that. Anyway, somebody who is too busy to blog sent me this interesting item: Wikileaks comes back at Coleman on donor database exposure. The long and the short of it: Norm Coleman's campaign donor database, including such interesting items as name and credit card number, became internet-visible a couple of months back. Since that time, this error was exposed, and Norm…