Channels ▼

Jonathan Erickson

Dr. Dobb's Bloggers

Functional Encryption: Making It Hard for Intruders, Easy for Programmers

April 20, 2008

What's the biggest problem in data security these days? Would you believe it's the widespread use of "trusted servers" to store and secure data, at least according to Amit Sahai, Brent Waters, and Jonathan Katz.

"The 'trusted server' model is a simple model," explains Sahai, an associate professor of computer science at the UCLA. "It's easy to implement. It's easy to put into practice. Information is placed in the server at face value and the server itself is simply given the task of deciding who to give the data to. Because of the simplicity in programming, these servers have become ubiquitous and are prime targets -- everyone wants to attack them."

Moreover replicating data on a wide scale has added to the problem. "To create robustness and availability, data is stored on several trusted servers as backups," adds Waters, a computer scientist at SRI. "If one server goes down, another can be accessed. There is a trade-off between data availability and security. The more replicated servers there are, the more targets there are for hackers."

"Imagine current encryption technology as a lock and key -- the data is locked, and to allow different people access, many copies of the key need to be made," Sahai goes on to say. "One record might need to be accessed by 10,000 people, so you make 10,000 copies of that key. With millions of documents and thousands of keys per document, you can imagine how very, very complicated it gets. It becomes much too complicated to manage. So even though we've had very strong encryption technology now for decades, it's just not used, or it is used incorrectly."

Which is the reason why Sahai, Waters, and Katz developed the idea of "functional encryption" to simplify the encryption of data in servers and allow access to the data in an intuitive way, with the goal of making it much harder for intruders to gain access to sensitive information, but easier for programmers to secure it.

In their paper Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, the research team explain that functional encryption lets programmers simply plug in their criteria for the information. The system then produces an encrypted record that only people matching the criteria can decrypt. The complex system of managing many keys is simplified, and servers hold encrypted data that the servers themselves can't read.

In addition, functional encyption allows for keys to be personalized -- only one key is needed to unlock all the information that is available to that person. "This is the key innovation in our system," explains Sahai. "We have this mathematical method for randomization of personalizing keys so that your key doesn't just depend on what attributes you have, like what your name is. Further, there is some mathematical hardening that is personalized to you, so that you can't combine it with anyone else's keys to do anything meaningful."

"Our goal is to rethink what encryption is," Waters said. "Over the years, people have taken on a somewhat rigid view of what encryption is. What we're hoping to do is show that we can build simpler and more powerful systems by changing the way we think. Eventually, we hope to get rid of complex infrastructures and do things in a simpler manner that is also more secure and cost-effective."

 

Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.
 


Video