A system for securing a data set include a computing device that provides access to portions of a data set to different users, and can encrypt the portions by generating encryption keys for each portion using a single mathematical function. The keys are generated by applying a starting point and length to a solution of the mathematical function. The process to generate the decryption keys are provided to the authorized users so that they can view and manipulate only the data set portions they are authorized to access.