Smaller and faster-to-verify DeKART ZK range proofs
tl;dr: Trading off prover time for smaller and faster verification in our previous DeKART scheme.
Identity-based encryption
$
\def\msg{m}
\def\ctxt{C}
\def\pk{\mathsf{pk}}
\def\sk{\mathsf{sk}}
\def\kgen{\mathsf{KGen}}
\def\enc{\mathsf{Enc}}
\def\dec{\mathsf{Dec}}
% IBE
\def\ibe{\mathsf{IBE}}
\def\id{\mathsf{id}}
\def\mpk{\mathsf{mpk}}
\def\msk{\mathsf{msk}}
\def\dk{\mathsf{dk}}
\def\derive{\mathsf{Derive}}
$
tl;dr: Encrypt to a phone number or an email address, rat...
Fast Reed-Solomon Interactive Oracle Proofs of Proximity (FRI)
tl;dr: For now, this page gathers some resources on FRI[^BBHR18FRI].
Digital signatures
tl;dr: Digital signatures are one of the most important cryptographic primitives today.
They are used to establish HTTPS connections with your favorite website, to securely download software updates, to provably send emails to others, to sign legal electronic documents, or to transact on a cryptocurrency like Bitcoin.
Reflecting on the moral character of cryptographic work
I suspect that many of you see no real connection between social, political, and ethical values and what you work on.
You don’t build bombs, experiment on people, or destroy the environment. You don’t spy on populations.
You hack math and write papers.
This doesn’t sound ethically laden. I want to show you that it is.
–Phillip Rogaway...
Confidential assets on Aptos
tl;dr: Confidential assets are in town! But first, a moment of silence for veiled coins.
Montgomery's trick for batched field inversions
tl;dr: For now, just including my tweet, which I keep having to look up to show to people.
72 post articles, 9 pages.