I glanced  at the paper by Craig Gentry
http://crypto.stanford.edu/craig/craig-thesis.pdf and from the little
that I can pick up intuitively it looks like homomorphic encryption
relies on different levels of noise which I think are used in cloaking
the data. So this method wouldn't work on ordinary compressions. I
think this may be related to whatever it was that Ben Goertzel was
saying. However, my original thought was that base-n numerical
representations are compressions and there are great functions that
can be worked on them without decompressing the numbers into unary
form. So the binary representation system is a compression scheme that
has a lot of great functions that go along with it. But there are some
systems of references that refer to objects that might be better
encoded using a different kind of method and my thought now is that
those alternative systems need to have their own functions encoded
that can be used directly on the compressed representations. It may
not be possible to make these fully homomorphic so that any familiar
function from computer programming (up to some level of complexity)
can be run with the compressed data, but that is not what I am getting
at. I originally thought that to make this kind of thing useful
different compression schemes would have to be able to translate and
use data compressed with other compression algorithms without needing
to decompress any of the data. This was too ambitious so I started
thinking that I was overly presumptuous with the title of this thread.
However I now realize that if one compression scheme can be combined
with some functions to operate on the compressed data then two
different compression schemes might be created to be used in common
functions without decompressing the data from either of the two
different schemes. So I am now drifting back to my original thought.
The goal is to eventually create a few different compression schemes
which would be able to communicate and use data from the other scheme
without needing to decompress it first. I am not really good at
designing compression methods so this is too ambitious for me but it
is an idea that should be explored. The idea is not to keep the data
secure (from being decompressed if intercepted) but to make the
algorithms that use the data more efficient.
Jim Bromer


On Sat, Nov 29, 2014 at 8:34 PM, Ben Goertzel <[email protected]> wrote:
> Encryption and compression are different.
>
> Mathematically, it seems there is no way to make compressed versions
> of data equally amenable to transformations as uncompressed versions
> (without  making many of those transformations very expensive, and
> essentially requiring decompression and recompression)....
>
> But if there are specific transformations that interest you, you could
> maybe design a compression algorithm so that *those* specific
> transformations are efficiently do-able on the compressed data...
>
> -- Ben G
>
> On Sun, Nov 30, 2014 at 9:31 AM, Jim Bromer via AGI <[email protected]> wrote:
>> Well maybe compression systems just have to be designed so that
>> transformation functions can be applied without decompressing the
>> data. Perhaps cross-compression transformations are not necessary. I
>> am only saying that because standardization and regularization is what
>> would make the transformation functions on the compressed data more
>> feasible to develop.
>> Jim Bromer
>>
>>
>> On Sat, Nov 29, 2014 at 3:29 PM, Jim Bromer <[email protected]> wrote:
>>> I may be technically wrong and technically right about this. An
>>> encryption will often (if not usually) expand the data, so an
>>> encrypted database would not technically be a compression. However, an
>>> AGI program would typically need to encode some central subject matter
>>> so that it could be used in a variety of ways. So this might be seen
>>> as an expansion of the central subject matter that might be referenced
>>> for some particular purpose but the expanded data might stand as a
>>> compression for all the ways the subject matter could be used. So the
>>> data would not be compressed relative to just the central subject
>>> under consideration but it would be compressed relative to the variety
>>> of ways that subject data might be used. If these methods included
>>> transformational methods which could be used to 'calculate' the
>>> results based on various ways that interrelated data might be used
>>> then the system might be able to run these transformational
>>> 'calculations' without unencrypting or decompressing the data. These
>>> 'calculations' would not typically be comprised of standard
>>> contemporary numerical calculations.
>>>
>>> I keep thinking of virtual networks of cross-generalizations. Each
>>> generalization path might represent a compression along some line from
>>> generalization to particularization. However, if the generalization
>>> node could also be referenced from other levels which were related to
>>> the generalization node, then the system might both be seen as an
>>> expansion of any one node but a compression of the potential of the
>>> entire system.
>>>
>>> Inventing new kinds of mathematical systems along which could be used
>>> across the systems and across different compressions is going to be
>>> difficult. Well, it probably isn't that difficult to create simple
>>> prototypes of such systems but it will probably be difficult to create
>>> effective systems.
>>> Jim Bromer
>>>
>>>
>>> On Sat, Nov 29, 2014 at 12:52 PM, Jim Bromer <[email protected]> wrote:
>>>> A slightly modified statement about Compression Transformation that I
>>>> made in The role of prediction [was What's preventing me...]
>>>> http://www.jimbromer.com/TheNeedForTransformationalCompressions.html
>>>>
>>>> A simple example from MIT is given about using an encrypted database
>>>> to make queries without first decrypting it.
>>>>
>>>> Processing Queries over Encrypted Databases
>>>> can be found on page 13 of
>>>> http://www.eecs.mit.edu/docs/newsletter/connector2014.pdf
>>>>
>>>> Jim Bromer
>>
>>
>> -------------------------------------------
>> AGI
>> Archives: https://www.listbox.com/member/archive/303/=now
>> RSS Feed: https://www.listbox.com/member/archive/rss/303/212726-deec6279
>> Modify Your Subscription: https://www.listbox.com/member/?&;
>> Powered by Listbox: http://www.listbox.com
>
>
>
> --
> Ben Goertzel, PhD
> http://goertzel.org
>
> "The reasonable man adapts himself to the world: the unreasonable one
> persists in trying to adapt the world to himself. Therefore all
> progress depends on the unreasonable man." -- George Bernard Shaw


-------------------------------------------
AGI
Archives: https://www.listbox.com/member/archive/303/=now
RSS Feed: https://www.listbox.com/member/archive/rss/303/21088071-f452e424
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=21088071&id_secret=21088071-58d57657
Powered by Listbox: http://www.listbox.com

Reply via email to