• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Tuesday, September 9, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Brown researchers explore possibilities for an ultra-secure gun registry

Bioengineer by Bioengineer
March 15, 2021
in Science News
Reading Time: 4 mins read
0
IMAGE
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

IMAGE

Credit: Nick Dentamaro/Brown University

PROVIDENCE, R.I. [Brown University] — Proposals to create a national gun registry have long been met with fierce opposition from gun rights advocates. While proponents say a registry would help in tracking guns used in crimes, opponents worry that it would compromise privacy and could be used by the federal government to confiscate firearms. Now, a team of Brown University computer scientists has devised a way of implementing a registry that may allay some of those concerns.

They propose a database that uses advanced encryption to protect privacy. The encryption scheme allows the database to be searched without being decrypted, which means people querying the database see only the records they’re looking for and nothing else. Meanwhile, the system places control of data in the hands of county-level officials rather than the federal government, meaning county officials have control over which queries are answered, and can even pull the county’s data offline entirely if they’re not comfortable with how it’s being used.

The proposed system is the work of Seny Kamara, a professor of computer science at Brown, along with co-authors Tarik Moataz, Andrew Park and Lucy Qin. Moataz is a visiting scientist at Brown. Park is a Brown master’s student, and Qin is a Ph.D. student in Kamara’s lab. They developed the system after Ron Wyden, a U.S. Senator from Oregon, contacted them looking for ideas on how such a database might be constructed.

“The senator’s office had this idea for a database where counties are incentivized to participate, but they could pull out at any time,” Kamara said. “At the same time, there are obvious privacy concerns. This idea of being able to query and process data without decrypting it is something I have worked on for the last 20 years, so that’s why the senator reached out to us. This research was about showing whether it was possible to design something like this.”

The study, which was accepted to the IEEE Symposium on Security and Privacy and will be presented in May, concludes that such a system is not only possible, but quite practical.

The proposed registry would contain the make, model and serial number of all legally owned guns in each participating county, along with a registration number identifying gun owners. The information in each county database would be fully encrypted, and only a designated county official would hold the key to decrypting their own local data.

Each county’s encrypted data would be searchable by authorized users elsewhere (authorized users would include law enforcement, county officials or gun sellers). For example, a law enforcement officer might query the system with the serial number of a gun found at a crime scene. Without ever decrypting the data, the system would locate the county database containing that serial number. The officer would then be able to decrypt the relevant record, as long as the country official controlling the data has enabled it to do so.

The search algorithm provides a high level of security because the data is never decrypted during the search process.

“All of the servers that are storing the data and all of the computers that are doing these operations, they’re just processing encrypted data and they never actually see anything,” Kamara said. “That provides really strong privacy throughout the process because none of the data can ever be seen without the decryption key.”

Kamara and his colleagues envision the decryption key as a physical device — like a thumb drive — that can be placed in a local computer to authorize transactions.

“If at some point a county decides they don’t want to be part of the system anymore, the official just pulls that hardware token out of the laptop and that’s it — nothing works,” he said. “The data is encrypted and the key is unavailable, so nothing can happen. For the senator’s office, that ability for counties to walk away and basically pull their data offline was really important.”

For their study, the researchers created a mock-up of the database with synthetic data and showed that searches were computationally practical, with results returned in a minute or less. The analysis also found that the costs associated with the system would be relatively small. Each county database could be stored for less than $1,000 per year, and the global directory would cost less than $500 per year.

Kamara says that the work so far is a proof-of-concept that would require some additional refinement to be implemented. But as it is, he says, the work shows the value of bringing technical expertise to bear on policy issues.

“I think people imagine this registry and think everything would be public and there would be all kinds of problems associated with that,” he said. “But with advanced cryptography, that’s not necessarily true. So I think this is an example of how you can have technology folks and policymakers working in concert, and it changes the conversation. It’s been a really great collaboration.”

###

Media Contact
Kevin Stacey
[email protected]

Original Source

https://www.brown.edu/news/2021-03-11/gunreg

Tags: Computer ScienceInternetScience/Health and the LawSystem Security/HackersTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

University of Minnesota Medical School Secures $3.3 Million NIH Grant for Groundbreaking 5-Year Study on Infants Born with CMV

University of Minnesota Medical School Secures $3.3 Million NIH Grant for Groundbreaking 5-Year Study on Infants Born with CMV

September 9, 2025
Gemini South Uncovers Elusive Cloud-Forming Chemical on Ancient Brown Dwarf

Gemini South Uncovers Elusive Cloud-Forming Chemical on Ancient Brown Dwarf

September 9, 2025

Breakthrough Research Unveils Promising Route to Enhanced Durability in Flexible Electronics

September 9, 2025

NCCN Policy Summit Examines the Potential of Artificial Intelligence to Revolutionize Cancer Care Safely and Equitably

September 9, 2025
Please login to join discussion

POPULAR NEWS

  • blank

    Breakthrough in Computer Hardware Advances Solves Complex Optimization Challenges

    151 shares
    Share 60 Tweet 38
  • New Drug Formulation Transforms Intravenous Treatments into Rapid Injections

    116 shares
    Share 46 Tweet 29
  • First Confirmed Human Mpox Clade Ib Case China

    56 shares
    Share 22 Tweet 14
  • Physicists Develop Visible Time Crystal for the First Time

    50 shares
    Share 20 Tweet 13

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

University of Minnesota Medical School Secures $3.3 Million NIH Grant for Groundbreaking 5-Year Study on Infants Born with CMV

Gemini South Uncovers Elusive Cloud-Forming Chemical on Ancient Brown Dwarf

Breakthrough Research Unveils Promising Route to Enhanced Durability in Flexible Electronics

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.