[Noisebridge-discuss] Distributed computing and storage (with some major caveats)

Shannon Lee shannon at scatter.com
Mon Jun 29 04:19:45 UTC 2009


Speaking of really cool interesting p2p projects:

http://www.masternewmedia.org/news/2005/06/27/p2p_can_cut_banks_out.htm

--S

On Sun, Jun 28, 2009 at 9:09 PM, Ian <ian at slumbrparty.com> wrote:

> example paper about public key retrieval.
>
> http://crypto.stanford.edu/~dabo/papers/encsearch.pdf<http://crypto.stanford.edu/%7Edabo/papers/encsearch.pdf>
>
> jabber: ian at slumbrparty.com
> http://www.twitter.com/verbiee
>
>
>
> On Fri, Jun 26, 2009 at 9:30 PM, David Molnar<dmolnar at gmail.com> wrote:
> >
> >
> > On Fri, Jun 26, 2009 at 5:40 PM, Ian <ian at slumbrparty.com> wrote:
> >>
> >> sorry it took me so long to respond. the most prominent requirement
> >> you touched on was encrypting the data stored and also being able to
> >> search it. this is possible.
> >>
> >> there is a crypto thing called Public Information Retrieval. it lets
> >> you do just that. if you google ""Public Information Retrieval"
> >> encryption", you'll find what you're looking for. you can also do an
> >
> > I haven't heard of "Public Information Retrieval" in this context and
> google
> > didn't turn up anything informative. I have heard of a cryptographic
> > primitive called "Private Information Retrieval." Is that what you meant?
> > There is a page covering recent research on the subject here:
> > http://www.cs.umd.edu/~gasarch/pir/pir.html<http://www.cs.umd.edu/%7Egasarch/pir/pir.html>
> > and code implementing a variant of single server private information
> > retrieval here
> > http://percy.sourceforge.net/
> > Note that private information retrieval is somewhat different from
> searching
> > encrypted data. In private information retrieval, Alice has published a
> list
> > of data items she holds. Bob wants to retrieve one of these data items
> > without revealing which one in particular to Alice. This isn't searching
> in
> > the traditional sense of looking for keywords. For searching on encrypted
> > data there's a parallel strain of work, starting here:
> > http://www.cs.berkeley.edu/~dawnsong/papers/se.pdf<http://www.cs.berkeley.edu/%7Edawnsong/papers/se.pdf>
> > I don't know of any code implementing the techniques in that paper or its
> > follow ups, but this page is a place to watch for such code (or
> contribute
> > your own should you write any)
> > http://acsc.csl.sri.com/
> > -David Molnar
> _______________________________________________
> Noisebridge-discuss mailing list
> Noisebridge-discuss at lists.noisebridge.net
> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>



-- 
Shannon Lee
(503) 539-3700

"Any sufficiently analyzed magic is indistinguishable from science."
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20090628/f27a4c87/attachment-0003.html>


More information about the Noisebridge-discuss mailing list