Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Slipknot’s Clown Addresses Status of Next Album

    January 17, 2026

    Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno

    January 17, 2026

    Democrats Won’t Allow Trump To Rig The Midterm As They Take A Big Step Toward Redistricting In Virginia

    January 17, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches
    Technology

    Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches

    By AdminJanuary 22, 2024
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches


    The original version of this story appeared in Quanta Magazine.

    We all know to be careful about the details we share online, but the information we seek can also be revealing. Search for driving directions, and our location becomes far easier to guess. Check for a password in a trove of compromised data, and we risk leaking it ourselves.

    These situations fuel a key question in cryptography: How can you pull information from a public database without revealing anything about what you’ve accessed? It’s the equivalent of checking out a book from the library without the librarian knowing which one.

    Concocting a strategy that solves this problem—known as private information retrieval—is “a very useful building block in a number of privacy-preserving applications,” said David Wu, a cryptographer at the University of Texas, Austin. Since the 1990s, researchers have chipped away at the question, improving strategies for privately accessing databases. One major goal, still impossible with large databases, is the equivalent of a private Google search, where you can sift through a heap of data anonymously without doing any heavy computational lifting.

    Now, three researchers have crafted a long-sought version of private information retrieval and extended it to build a more general privacy strategy. The work, which received a Best Paper Award in June 2023 at the annual Symposium on Theory of Computing, topples a major theoretical barrier on the way to a truly private search.

    “[This is] something in cryptography that I guess we all wanted but didn’t quite believe that it exists,” said Vinod Vaikuntanathan, a cryptographer at the Massachusetts Institute of Technology who was not involved in the paper. “It is a landmark result.”

    The problem of private database access took shape in the 1990s. At first, researchers assumed that the only solution was to scan the entire database during every search, which would be like having a librarian scour every shelf before returning with your book. After all, if the search skipped any section, the librarian would know that your book is not in that part of the library.

    That approach works well enough at smaller scales, but as the database grows, the time required to scan it grows at least proportionally. As you read from bigger databases—and the internet is a pretty big one—the process becomes prohibitively inefficient.

    In the early 2000s, researchers started to suspect they could dodge the full-scan barrier by “preprocessing” the database. Roughly, this would mean encoding the whole database as a special structure, so the server could answer a query by reading just a small portion of that structure. Careful enough preprocessing could, in theory, mean that a single server hosting information only goes through the process once, by itself, allowing all future users to grab information privately without any more effort.

    For Daniel Wichs, a cryptographer at Northeastern University and a coauthor of the new paper, that seemed too good to be true. Around 2011, he started trying to prove that this kind of scheme was impossible. “I was convinced that there’s no way that this could be done,” he said.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleNew approach to robotic mastectomy can preserve full breast and nipple sensation
    Next Article Jan. 6 Committee deleted encrypted files before GOP takeover, Haley’s pitch to voters and more top headlines

    RELATED POSTS

    AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

    January 17, 2026

    Ads Are Coming to ChatGPT. Here’s How They’ll Work

    January 16, 2026

    Silicon Valley’s messiest breakup is definitely headed to court

    January 16, 2026

    Why ICE Can Kill With Impunity

    January 15, 2026

    Mira Murati’s startup, Thinking Machines Lab, is losing two of its co-founders to OpenAI

    January 15, 2026

    AI’s Hacking Skills Are Approaching an ‘Inflection Point’

    January 14, 2026
    latest posts

    Slipknot’s Clown Addresses Status of Next Album

    It’s been a little while since Slipknot released their last original album and percussionist and…

    Elon Musk’s Boring Co. is studying a tunnel project to Tesla Gigafactory near Reno

    January 17, 2026

    Democrats Won’t Allow Trump To Rig The Midterm As They Take A Big Step Toward Redistricting In Virginia

    January 17, 2026

    Minnesota judge bars federal officers from tear gas on peaceful protesters

    January 17, 2026

    AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

    January 17, 2026

    RFK, Jr., shifts focus to questioning whether cell phones are safe. Here’s what the science says

    January 17, 2026

    Next ‘Paranormal Activity’ Movie Lands Summer 2027 Date

    January 17, 2026
    Categories
    • Books (1,006)
    • Business (5,911)
    • Events (29)
    • Film (5,847)
    • Lifestyle (3,957)
    • Music (5,948)
    • Politics (5,912)
    • Science (5,262)
    • Technology (5,841)
    • Television (5,525)
    • Uncategorized (6)
    • US News (5,899)
    popular posts

    Sting Thrills With Set of Police & Solo Hits in Port Chester

    Sting brought his “Sting 3.0” tour to the historic Capitol Theatre in Port Chester, New…

    9 Burning Questions for ‘The Umbrella Academy’ Season 4

    July 3, 2022

    Minecraft Player Recreates Star Wars Opening Crawl In Bedrock Edition

    July 18, 2022

    Jaws of the Lion DLC Hatchet Character Guide

    May 25, 2022
    Archives
    Browse By Category
    • Books (1,006)
    • Business (5,911)
    • Events (29)
    • Film (5,847)
    • Lifestyle (3,957)
    • Music (5,948)
    • Politics (5,912)
    • Science (5,262)
    • Technology (5,841)
    • Television (5,525)
    • Uncategorized (6)
    • US News (5,899)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    RFK, Jr., shifts focus to questioning whether cell phones are safe. Here’s what the science says

    January 17, 2026

    Next ‘Paranormal Activity’ Movie Lands Summer 2027 Date

    January 17, 2026

    ‘90 Day Fiance’ Big Ed Brown & Rose Vega Reconcile?

    January 17, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT