Close Menu
Ztoog
    What's Hot
    Crypto

    Coinbase Ranks As Second Largest ETH Staking Entity As Lido’s Dominance Raises Concerns

    The Future

    Enhance Your Website’s Traffic with Strategic Bot Traffic

    Technology

    Best Solar Generators of 2024

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

      India-Pak conflict: Pak appoints ISI chief, appointment comes in backdrop of the Pahalgam attack

    • Technology

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

      The more Google kills Fitbit, the more I want a Fitbit Sense 3

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

      Fortnite said to return to the US iOS App Store next week following court verdict

    • Science

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

      ‘Dark photon’ theory of light aims to tear up a century of physics

    • AI

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

      The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    • Crypto

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

      Speak at Ztoog Disrupt 2025: Applications now open

    Ztoog
    Home » Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches
    Science

    Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches

    Facebook Twitter Pinterest WhatsApp
    Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    The unique model of this story appeared in Quanta Magazine.

    We all know to watch out in regards to the particulars we share on-line, however the info we search can be revealing. Search for driving instructions, and our location turns into far simpler to guess. Check for a password in a trove of compromised information, and we danger leaking it ourselves.

    These conditions gas a key query in cryptography: How are you able to pull info from a public database with out revealing something about what you’ve accessed? It’s the equal of testing a e book from the library with out the librarian figuring out which one.

    Concocting a method that solves this downside—referred to as personal info retrieval—is “a very useful building block in a number of privacy-preserving applications,” stated David Wu, a cryptographer on the University of Texas, Austin. Since the Nineties, researchers have chipped away on the query, enhancing methods for privately accessing databases. One main aim, nonetheless not possible with giant databases, is the equal of a personal Google search, the place you’ll be able to sift by a heap of information anonymously with out doing any heavy computational lifting.

    Now, three researchers have crafted a long-sought model of personal info retrieval and prolonged it to construct a extra common privateness technique. The work, which acquired a Best Paper Award in June 2023 on the annual Symposium on Theory of Computing, topples a serious theoretical barrier on the way in which to a really personal search.

    “[This is] something in cryptography that I guess we all wanted but didn’t quite believe that it exists,” stated Vinod Vaikuntanathan, a cryptographer on the Massachusetts Institute of Technology who was not concerned within the paper. “It is a landmark result.”

    The downside of personal database entry took form within the Nineties. At first, researchers assumed that the one answer was to scan your entire database throughout each search, which might be like having a librarian scour each shelf earlier than returning along with your e book. After all, if the search skipped any part, the librarian would know that your e book shouldn’t be in that a part of the library.

    That strategy works properly sufficient at smaller scales, however because the database grows, the time required to scan it grows at the least proportionally. As you learn from greater databases—and the web is a fairly large one—the method turns into prohibitively inefficient.

    In the early 2000s, researchers began to suspect they might dodge the full-scan barrier by “preprocessing” the database. Roughly, this may imply encoding the entire database as a particular construction, so the server may reply a question by studying only a small portion of that construction. Careful sufficient preprocessing may, in idea, imply {that a} single server internet hosting info solely goes by the method as soon as, by itself, permitting all future customers to seize info privately with none extra effort.

    For Daniel Wichs, a cryptographer at Northeastern University and a coauthor of the brand new paper, that appeared too good to be true. Around 2011, he began making an attempt to show that this type of scheme was not possible. “I was convinced that there’s no way that this could be done,” he stated.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Science

    Failed Soviet probe will soon crash to Earth – and we don’t know where

    Science

    Trump administration cuts off all future federal funding to Harvard

    Science

    Does kissing spread gluten? New research offers a clue.

    Science

    Why Balcony Solar Panels Haven’t Taken Off in the US

    Science

    ‘Dark photon’ theory of light aims to tear up a century of physics

    Science

    Signs of alien life on exoplanet K2-18b may just be statistical noise

    Science

    New study: There are lots of icy super-Earths

    Science

    Watch an owl try to eat a turtle whole

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Science

    How we could discover quantum gravity without rebuilding space-time

    Shutterstock/Sola Solandra MODERN physics has two tales to inform about our universe. The first says…

    Gadgets

    Jony Ive and OpenAI’s Altman reportedly collaborating on mysterious AI device

    Enlarge / Ex-Apple designer Jony Ive (left) and OpenAI CEO Sam Altman (proper).Getty Images Ex-Apple…

    AI

    This AI Paper from Meta AI Explores Advanced Refinement Strategies: Unveiling the Power of Stepwise Outcome-based and Process-based Reward Models

    The exploration into refining the reasoning of massive language fashions (LLMs) marks a big stride…

    AI

    Meet Modular Diffusion: A Python Library for Designing and Training Diffusion Models with PyTorch

    We are all the time looking out for cool AI initiatives for marktechpost and this…

    Mobile

    Gmail gets AI-powered “Summarize” feature on iOS and Android, Gemini side panel on the web

    Image credit score — PhoneArenaGoogle is enhancing its Gmail app for Android and iOS gadgets…

    Our Picks
    Gadgets

    Samsung Galaxy S24 Series Set To Launch In January 2024

    Science

    The Ring Nebula glows green in a stunning new JWST image

    Science

    Does String Theory Actually Describe the World? AI May Be Able to Tell

    Categories
    • AI (1,482)
    • Crypto (1,744)
    • Gadgets (1,796)
    • Mobile (1,839)
    • Science (1,853)
    • Technology (1,789)
    • The Future (1,635)
    Most Popular
    The Future

    Apple won’t wait until next year for some iOS 18 Siri improvements

    AI

    When an antibiotic fails: MIT scientists are using AI to target “sleeper” bacteria | Ztoog

    Gadgets

    Android TV has access to your entire account—but Google is changing that

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.