acm-header
Sign In

Communications of the ACM

ACM TechNews

New Fujitsu Labs Tech Can Do Batch Searches of Encrypted Data


View as: Print Mobile App Share:
Artist's representation of encryption.

A new technology for secretly searching encrypted data utilizes homomorphic encryption, which permits operations to be performed on the data without the need to decrypt it.

Credit: Security-FAQs.com

Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted. The technology, based on public-key encryption, utilizes homomorphic encryption, which allows for operations to be performed on encrypted data without having to decrypt it.

Fujitsu researchers say the search method can look through 16,000 characters per second using any search term without the need for pre-registering keywords. "Those who perform searches only need a public key, which is made public beforehand and is something anyone can obtain," says Fujitsu research manager Jun Kogure. "As results of searches are also encrypted, only those who have the secret key can see the search results."

The researchers note their approach is revolutionary because it forgoes the registration of searchable keywords. "Our technology is not based on tag-searching," Kogure says. "We use homomorphic encryption to perform full-text searches."

Searching through encrypted academic scores from several schools for analytical purposes could be another application, according to the researchers.

From IDG News Service
View Full Article

 

Abstracts Copyright © 2014 Information Inc., Bethesda, Maryland, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account