Security

Comments Off on New Principles for Privacy-Preserving Queries for Distributed Data

New Principles for Privacy-Preserving Queries for Distributed Data

Here are the three (3) principles for privacy-preserving computation based on the Enigma P2P distributed multi-party computation model: (a) Bring the Query to the Data: The current model is for the querier to fetch copies of all the data-sets from the distributed nodes, then import the data-sets into the big data processing infra and then Read More

Comments Off on Atmel to support EPID from Intel

Atmel to support EPID from Intel

One important news item this week from the IoT space is the support by Atmel of Intel’s EPID technology. Enhanced Privacy ID (EPID) grew from the work of Ernie Brickell and Jiangtao Li based on previous work on Direct Anonymous Attestations (DAA).  DAA is very relevant because it is built-in into the TPM1.2 chip (of which there are several hundred million Read More

Comments Off on Technical Trust

Technical Trust

  So the topic of “trust” always generates a million emails on various lists.  Rather than rolling-up my own definition, I thought I’d borrow a good definition from the Trusted Computing Group community (courtesy of Graeme Proudler of HP Labs, UK). It is safe to trust something when: It can be unambiguously identified. It operates Read More