MIT Connection Science

Comments Off on Open Algorithms (OPAL): Key Concepts

Open Algorithms (OPAL): Key Concepts

The following are the key concepts and principles underlying the open algorithms paradigm: Moving the algorithm to the data: Instead of pulling raw data into a centralized location for processing, it is the algorithms that should be sent to the data repositories and be processed there. Raw data must never leave its repository: Raw data Read More

Comments Off on Core Identity Issuers (Part II)

Core Identity Issuers (Part II)

Continuing from the previous post (Part I of the Core Identity series), the goal of a Core Identity Issuer (CoreID Issuer) is to collate sufficient data – aggregate data and non-PII data — from members of a given Circle of Trust in order to create a Core Identity and Core Identifier for a given user (see Read More

Comments Off on Query Smart Contracts: Bringing the Algorithm to the Data

Query Smart Contracts: Bringing the Algorithm to the Data

One paradigm shift being championed by the MIT OPAL/Enigma community is that of using (sharing) algorithms that have been analyzed by experts and have been vetted to be “safe” from the perspective of privacy-preservation. The term “Open Algorithm” (OPAL) here implies that the vetted queries (“algorithms”) are made open by publishing them, allowing other experts to review Read More

Comments Off on What and why: MIT Enigma

What and why: MIT Enigma

I often get asked to provide a brief explanation about MIT Enigma — notably what it is, and why it is important particularly in the current age of P2P networking and blockchain technology.  So here’s a brief summary. The MIT Enigma system is part of a broader initiative at MIT Connections Science called the Open Algorithms for Read More

Comments Off on New Principles for Privacy-Preserving Queries for Distributed Data

New Principles for Privacy-Preserving Queries for Distributed Data

Here are the three (3) principles for privacy-preserving computation based on the Enigma P2P distributed multi-party computation model: (a) Bring the Query to the Data: The current model is for the querier to fetch copies of all the data-sets from the distributed nodes, then import the data-sets into the big data processing infra and then Read More