Current encryption methods are far from perfect—a fact highlighted by the numerous data security breaches that have occurred over the past few years. Technological limitations in the "trusted server" model for encryption and psychological barriers hinder the robust protection of data. A trio of computer science researchers has set out to simplify encryption systems. Their research, which began in 2005, has led to a novel encryption system that they term "functional encryption" greatly simplifies the problem of key complexity.
In a functional encryption system, keys are personalized and only one is needed for a person to gain access to all the data that should be available to them. In addition to simplifying the key process, this idea allows users—with proper access rights—to search encrypted volumes for specific information.
The problems with trusted servers
According to Prof. Amit Sahai, there are issues with the current model of storing encrypted data on a "trusted server." In this scheme, data is uploaded to a server and that server is given the task of determining who has access to it. These servers represent a technological problem because they are a tempting target for malcontents who are eager to get their hands on the data.
As the data needed to be stored grows in size, organizations often add more servers to handle it and add redundant backup servers in case one fails. As the number of servers increases, the number of targets for hackers increases as well. Beyond the physical problems, psychological issues exist—how many users simply run everything as an administrator or superuser? Working in this mode can nullify any encryption or security protocols that may be in place.
I spoke with Prof. Sahai about his work, and he likened current encryption systems to a simple lock and key approach. Data is kept locked away on a server, and everyone who needs access is given a copy of the same key. He and his colleagues sought to make encryption both more robust and simpler than current schemes. The idea behind their work is that a personal key is more than just a key: it holds a person's information and policies that will mathematically determine what locks they should be allowed to open. It is this new type of decryption key that is—pardon the pun—the key idea behind this work