Since the dawn of the computer age, researchers have wrestled with two persistent challenges: how to store ever-increasing reams of data and how to protect that information from unintended access. Now ...