With a name like Enigma readers would be right to suspect that MIT was working on something used by a super villain, of course the premise of the project is to make everyday people smarter and safer. Alex “Sandy” Pentland, the Toshiba Professor at MIT, advises the Enigma project which uses the Bitcoin blockchain to securely track encrypted data so that it can be processed without revealing the underlying raw information.
Today at the MIT CDOIQ Symposium Petland spoke with Dave Vellante, co-founder of Wikibon, and Paul Gillin, SiliconANGLE enterprise editor, about the capabilities and the scope of the Enigma project during a visit to theCUBE, operated by SiliconANGLE Media.
Pentland said that people correctly feel paranoid that their data given to companies may be leaked, especially personal or sensitive data. The problem is that a great deal of sensitive data is extremely important to providing better services to people. A noteworthy example is medical or financial data.
“All lot of it has to do with safe sharing,” explained Pentland. “Another aspect of this problem is security. We are getting an increasing amount of attacks on [sensitive data]. Bad for companies. Bad for people. It’s just going to get worse.”
The answer he posed is “data is encrypted all the time everywhere.”
Enigma works by making sure that data can still be processed without ever being shared with anyone who shouldn’t have access to it. A problem arises is that bad actors tend to attempt to short circuit security measures or reveal the underlying sensitive data, and this is possible because at some point that data needs to be processed in order to produce actionable results.
MIT adapted the Bitcoin blockchain technology to build Enigma, which grabs data in its encrypted form, processes it while encrypted, and then shares it only in its encrypted form. The idea is to use the blockchain to form a sort of consensus on who can view what based on the distributed ledger.
For further details on how Enigma works, MIT has published a whitepaper [PDF] outlining the technology and the technical aspects of its implementation:
A peer-to-peer network, enabling different parties to jointly store and run computations on data while keeping the data completely private. Enigma’s computational model is based on a highly optimized version of secure multi-party computation, guaranteed by a verifiable secret-sharing scheme. For storage, we use a modified distributed hashtable for holding secret-shared data. An external blockchain is utilized as the controller of the network, manages access control, identities and serves as a tamper-proof log of events. Security deposits and fees incentivize operation, correctness and fairness of the system. Similar to Bitcoin, Enigma removes the need for a trusted third party, enabling autonomous control of personal data. For the first time, users are able to share their data with cryptographic guarantees regarding their privacy.
A beta version is also launching soon and signups to be part of it are available on the Enigma website.
Vellante described Enigma as a “distributed black box” and not a “walled garden,” nobody has direct control of the entire system, even though everyone can see the entire system. It is through the distributed ledger that trust can be devised between multiple partially-trusted entities (using the Bitcoin blockchain) in order to provide a consensus agreement to who has access to what.
How do you solve the problem of performing calculations on encrypted data?
Since Enigma proposes that all data is encrypted all the time, Gillin asked how the system manages to process data without ever decrypting it.
The ability to perform calculations on encrypted data without revealing it is a holy grail of computational systems, and it is very difficult to do without revealing too much about the underlying raw data–point in fact, knowing enough about it would essentially be decrypting it.
Pentland explained that it uses old techniques that have been around for a long time but have poor scaling capability and has trouble tracking data in a secure manner. He explained that the first part was solved by multi-scaling that is inherent to the technology and the second is fixed by the Bitcoin blockchain which allows for tracking and validating the information without revealing the underlying data.
Further information on the project, the whitepaper, and other details are available over at MIT’s Enigma website.
Photo by SiliconANGLE
Latest posts by Kyt Dotson (see all)
- Bitcoin Weekly 2015 November 25: Coinbase Shift Card brings bitcoin to debit, Bitcoin.com forums AMA series, DDoS attacks on the rise - November 25, 2015
- Black Friday week PC gaming hardware presale deals for the hardcore but frugal #BlackFriday2015 - November 23, 2015
- BitcoinBlackFriday.com prepares deals for the Bitcoin community in 2015 - November 19, 2015