On 2 January 2017 at 05:51, Jason Resch <[email protected]> wrote:


> Fully Homomorphic Encryption ( https://en.wikipedia.org/wiki/
> Homomorphic_encryption ) is a recently discovered concept in the field of
> cryptography (the science of hiding information).
>
> Basic encryption primer, skip if you are familiar with this already:
>
>
> With conventional encryption, some message M is encrypted using some
> secret key K, to yield a ciphertext C. We can view the encryption operation
> as a function that takes two parameters:
>
> *C = Encrypt(M, K)*
>
> The ciphertext appears as complete gibberish to anyone who sees it, and
> absent knowledge of the key K, will be unable to make sense of it. *A
> simple example of an encryption function is to assume M is a number between
> 0 and 999. K could be a randomly chosen number on the same range (0, 999),
> and the encryption function computes the remainder of (M + K) / 1000.*
>
> With knowledge of the key, however, there is a corresponding decryption
> function, that takes the ciphertext and the key and returns the original
> message:
>
> *M = Decrypt(C, K)*
>
> However, absent knowledge of the key, C could represent any possible
> message, in a sense it is only determined when K is provided. *An example
> decryption example, based on the previous encryption example, is to compute
> the remainder of (1000 + C - K) / 1000.*
>
>
>
> Now to Fully Homomorphic Encryption (FHE), FHE enables any sequence of
> multiplications and additions to be performed on a cipher text by an entity
> who *has no knowledge* of the key. For example:
>
> M = 10
> C = Encrypt(M, K)
>
> C_1 = FHE_MUL(C, 2)
> C_2 = FHE_ADD(C_1, 5)
>
> 20 = M*2 = Decrypt(C_1, K)
> 25 = M*2+5 = Decrypt(C_2, K)
>
> The magic here is that FHE_MUL and FHE_ADD are functions that operate on
> encrypted data--data that is meaningless without knowledge of the key. And
> when we decrypt the modified encrypted data we get the result we would
> expect.
>
> The ability to perform multiplication and addition may seem trivial, but
> actually any logic circuit can be made from stringing together additions
> and multiplications in the proper sequence. Therefore, any computable
> function can be implemented and applied to encrypted data.
>
>
> Now on to the philosophy, what if we create a FHE circuit that computes
> the state of a brain at time t2, given the state of the brain at time t1.
> Perhaps it does a molecular simulation of all the particles in a person's
> brain, and runs the physical simulation to advance it some period of time.
> For example:
>
> *BrainState_Time-(n+1) = BrainSim(BrainState_Time-n)*
>
> We then create the proper circuit of logic gates to implement the function
> BrainSim, and convert it to a series of multiply and add operations.
> Applied to any input. Finally, we replace all the adds and multiplies with
> FHE_ADD's and FHE_MUL's.
>
> I can now provide an encrypted brain state to another entity, who can
> compute as many time cycles on the brain state as desired. Let's say I
> provide you my encrypted brain state file, and you compute one year's worth
> of time sequences of the brain state, and return this encrypted result to
> me.
>
> When I decrypt the result, I will have a brain state file representing the
> state of my brain one as it will have evolved over one year's worth of time.
>
>
> Many questions arise from such a thought experiment considering FHE brain
> simulation on encrypted brain state files:
>
>
> 1. Is the consciousness recovered by running the FHE emulation?
> a) If yes, we are faced with the difficulty of how this mind can access
> itself and its own mental states without knowledge of the encryption key.
> b) If no, we are faced wit the difficulty that this mind emulation is a
> philosophical zombie, at least until we decrypt it?
>
> 2. Is the decryption step at the end necessary or irrelevant to recovering
> consciousness?
>
> 3. If we perform the decryption at each step of the way, does that recover
> consciousness along the way?
>
> 4. Does skipping steps along the way without performing the decryption of
> the intermediate steps impact what the simulated mind experiences (if it
> experiences anything ay all)
>
> 5. What if the key is deleted before the FHE computations are performed?
>
> 6. Is FHE emulation the ultimate key to information privacy when we say
> yes to the doctor, or is it the ultimate disaster when we accidentally
> zombiefy ourselves by uploading our encrypted brain states to be processed
> in the cloud?
>
> 7. Would you say yes to the FHE doctor?
>
>
> I am interested in hearing everyone's thoughts on the matter.
>

I can't "decrypt" my own brain, in the sense that I'm not aware of the
neural processes happening in it and even if I were I would not be able to
correlate them to thoughts, so I don't see why encryption with FHE should
make a diffference.


-- 
Stathis Papaioannou

-- 
You received this message because you are subscribed to the Google Groups 
"Everything List" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/everything-list.
For more options, visit https://groups.google.com/d/optout.

Reply via email to