Announcing a Return to our Roots: The All-New Bitcoin Magazine

MIT Media Lab Project Enigma Enables Blockchain-Based Encrypted Data Storage


         MIT Media Lab Project Enigma Enables Blockchain-Based Encrypted Data Storage

Over the last few months, renowned global organizations and financial establishments have proposed designs, or at least have attempted to implement Bitcoin’s blockchain technology, to encrypt sensitive data or to settle transactions without the association of third-party institutions such as banks.

Continuing the global trend, the MIT Media Lab and two Bitcoin entrepreneurs have developed a prototype of an encryption system called Enigma. Enigma is a Bitcoin blockchain-based encryption system that enables untrusted and anonymous computers to share sensitive information with a third party without putting the data at risk of hacking attacks and breaches.

The system will be able to prevent shared information from being surveilled by government entities or law enforcement, as it can only be decrypted by the holder of the decryption keys.

“You can see it as a black box,” explained Guy Zyskind, one of the developers of Enigma and an MIT Media Lab graduate researcher. “You send whatever data you want, and it runs in the black box and only returns the result. The actual data is never revealed, neither to the outside nor to the computers running the computations inside.”

In a way, Enigma’s techniques and properties resemble a few features of Bitcoin’s decentralized network infrastructure. Enigma encrypts data by disassociating it into several components, and by randomly segregating it to hundreds of computers in the Enigma network, also known as nodes. Then, each node runs calculations on its assigned block of data, until a user merges the results to decrypt a block.

The mathematical algorithms are designed by the developers of Enigma, and the nodes execute calculations only on the blocks of data that it is assigned to.

The ownership of data, or chunks of information, is then stored as metadata in the Bitcoin blockchain, which prevents the ledger of ownership from being forged or altered.

“I can take my age, this one piece of data, and split it into pieces, and give it to 10 people,” says Zyskind. “If you ask each one of those persons, they have only a random chunk. Only by combining enough of those pieces can they decrypt the original data.”

What Enigma’s Encryption System Can Bring

If Enigma’s encryption system works out flawlessly like the developers promise, it would create a whole different ecosystem where private databases can be hosted without threats from third-party entities, such as governments or law enforcement trying to surveil the information.

While cloud databases and platforms such as Dropbox and even Facebook areobligated or often forced to pass on sensitive data at governments’ will, the same cannot be done for Enigma’s cloud services, because the data simply cannot be revealed without the decryption keys which only its owners hold and control.

Enigma would also allow users to safely share all kinds of information with companies without any risks of releasing sensitive data. “No one wants to give their data to some company when you don’t know what they‘ll do with it,” explained Oz Nathan, Enigma’s co-creator. “But if you have guaranteed privacy, data analysis can be a lot more powerful. People will actually be willing to share more.”Photo Security/Photopin


Op Ed: SEC’s Latest Declaration Creates Legal Minefield for Digital Assets

This broad, authoritative declaration is not unexpected, as, to date, the SEC has stated that all digital assets — regardless of whether they function as alt coins or utility tokens — are securities at least initially and, thus, subject to its jurisdiction.

Huhnsik Chung and Nicholas Secara

Op Ed: Cryptocurrency’s Unrealized Opportunities for U.S. Tax Professionals

Tax accountants and firms that specialize in cryptocurrency will emerge to capture and service this market. The first movers will be the ones who stand to capture the oversized profits.

David Kemmerer

Op Ed: Anatomy of the Tether Attack: Are Stablecoins Vulnerable?

Last month's attack on Tether contains a cautionary tale: Only those coins that can survive such attacks have the slightest chance of becoming the “holy grail" of stablecoins.

Henry He

Op Ed: 10 Takeaways From Recent French Guidance on Blockchain and the GDPR

The CNIL wisely points out, “Blockchain is not always the best technology for all processing of data; it may be the source of difficulties for the controller with respect to its GDPR obligations.”

Laura Jehl