The author, Brian Hayes, has an excellent blog at http://bit-player.org/ which is well worth following. Lots of posts about simple curiosities followed up much further than most people bother, and beautifully illustrated.
The post pointing to this American Scientist article adds “For crypto buffs, there’s an Easter egg in the first illustration.”
I was trying to solve secure email at a mass scale, and the fundamental problems there were 1) key management and 2) spam.
We had a good solution for key management, but there was no way we felt we could give a way for scammers to appear more legit (hey, it came encrypted) without tools to fight it. The only way we would have had to solve it was either breaking security or through solid identity management, but that doesn't really (and probably cannot) exist across the Internet and is not necessarily what people are looking for in secure email.
That was when I discovered homomorphic encryption. It really would have been the solution to our problems (that, and how do I search my existing messages). Too bad we were 10 years early (or too poor to put the researchers to work for us :).
The other way to prevent spam is to hit 'em in the economics. If you require the sender put $1 in escrow, which the recipient can claim if it's spam (or, generally, not worth their time - but that'd be socially mediated), then you have changed things substantially.
Re-reading my post, it sounds more "oh, it's simple" than I'd intended. I was just saying that there are potential approaches to cutting out spam other than filtering based on message content (which would be difficult-to-impossible in the case of encrypted email even with a good homomorphic encryption algorithm), and depending on exactly what the parent poster was trying to do they may (conceivably) be viable.
There are also proof-of-work solutions (as in, CPU time) along those lines. An analysis of that solution came to the conclusion it won't work as a standalone cure-all, but might be part of a more sophisticated overall scheme. (contact me for pointers if you're interested)
What was the solution to key management? Just wondering what it looks like since the CA system doesn't work, and the GPG approach of key servers is too difficult for the laymen!
As for the spam issue, I am not sure that will ever get solved.
That's a brilliant write-up. I'm still none the wiser what the evaluate function actually looks like, but he makes the rest seem simple enough to play around with.
If you know the algorithm (the evaluate function, if I understood correctly), you can make some assumptions about the data itself, even though you can't inspect the data you're operating on - e.g., exploiting the time it takes to compare password hashes [1].
The post pointing to this American Scientist article adds “For crypto buffs, there’s an Easter egg in the first illustration.”