Research Catalog

Ramifications of DARPA's Programming Computation on Encrypted Data Program / Martin C. Libicki, Olesya Tkacheva, Chaoling Feng, Brett Hemenway.

Title
  1. Ramifications of DARPA's Programming Computation on Encrypted Data Program / Martin C. Libicki, Olesya Tkacheva, Chaoling Feng, Brett Hemenway.
Published by
  1. Santa Monica : RAND, [2014]
  2. ©2014
Author
  1. Libicki, Martin C.,

Items in the library and off-site

Filter by

Displaying 1 item

StatusFormatAccessCall numberItem location
Status
Request for on-site useRequest scan
How do I pick up this item and when will it be ready?
FormatTextAccessRequest in advanceCall numberU163 .L542 2014Item locationOff-site

Details

Additional authors
  1. Feng, Chaoling,
  2. Feng, Chaoling.
  3. Hemenway, Brett, 1981-
  4. Hemenway, Brett.
  5. National Defense Research Institute (U.S.)
  6. National Defense Research Institute (U.S.), issuing body.
  7. Tkacheva, Olesya,
  8. Tkacheva, Olesya.
  9. United States. Defense Advanced Research Projects Agency, sponsoring body.
  10. United States. Defense Advanced Research Projects Agency.
Description
  1. xx, 85 pages : illustrations; 23 cm
Summary
  1. Programming Computation on Encrypted Data (PROCEED) is a Defense Advanced Research Projects Agency program whose primary purpose is to improve the efficiency of algorithms that allow people to carry out computations on encrypted data{u2014}without having to decrypt the data itself. RAND was asked to evaluate whether PROCEED{u2014}which expands the knowledge base of the global cryptographic community{u2014}is likely to provide more benefits to the United States than it does to its global rivals. The research team{u2019}s assessment focused on the degree to which PROCEED technologies may be adopted, under what circumstances, and for what purpose. The team then used the analytic framework generated to understand technological uptake decisions as a way of ascertaining how such factors would work in Russia and China vis-à-vis the United States (and, by extension, countries similar to the United States). Analysis of online searches for information about data encryption, information security, and data protection in Russia and China concluded that, given government approval of PROCEED technologies, their diffusion will be more rapid in China than in Russia. Whether PROCEED technologies will be adopted in the face of the processing penalties that will be associated with using them is difficult to determine at this time. If PROCEED is adopted, it is likely to be adopted more rapidly in the United States (and similar developed countries) than it is in Russia and China, in large part because PROCEED is compatible with the U.S. political culture, and in smaller part because it better accords to the U.S. business environment.
Alternative title
  1. Ramifications of DARPA's PROCEED
Subject
  1. Computer security > Evaluation
  2. Cyberspace > Security measures
  3. Data encryption (Computer science) > Evaluation
  4. Electronic data processing > Security measures
  5. National security > Evaluation
  6. National security > Technological innovations > United States
  7. Privacy, Right of > United States
Contents
  1. Introduction -- The decision to use PROCEED technologies -- Trust and environments in Russia and China -- Where will PROCEED be taken up?
Owning institution
  1. Harvard Library
Note
  1. "National Defense Research Institute."
  2. "Prepared for the Office of the Secretary of Defense/DARPA."
  3. "RR-567-OSD"--Page 4 of cover.
Bibliography (note)
  1. Includes bibliographical references (pages 77-85).
Processing action (note)
  1. committed to retain