Tim Hornyak reports:
If snooping by the U.S. National Security Agency isn’t enough to make you worry about your privacy, Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted.
The technology makes use of homomorphic encryption, which allows for operations to be performed on encrypted data without having to decrypt it.
Read more on Computerworld.
I probably shouldn’t have tried reading this without sufficient caffeine, and I need to do more reading on this approach to understand it. For example, could government use the fact that a search did result in “hits” or encrypted results as justification or reasonable suspicion to get a court to order someone to provide their secret key so it could be decrypted? What are the legal implications of this technology?