Home

Identity-based encryption

$ \def\msg{m} \def\ctxt{C} \def\pk{\mathsf{pk}} \def\sk{\mathsf{sk}} \def\kgen{\mathsf{KGen}} \def\enc{\mathsf{Enc}} \def\dec{\mathsf{Dec}} % IBE \def\ibe{\mathsf{IBE}} \def\id{\mathsf{id}} \def\mpk{\mathsf{mpk}} \def\msk{\mathsf{msk}} \def\dk{\mathsf{dk}} \def\derive{\mathsf{Derive}} $ tl;dr: Encrypt to a phone number or an email address, rat...

Read more

Digital signatures

tl;dr: Digital signatures are one of the most important cryptographic primitives today. They are used to establish HTTPS connections with your favorite website, to securely download software updates, to provably send emails to others, to sign legal electronic documents, or to transact on a cryptocurrency like Bitcoin.

Read more

Reflecting on the moral character of cryptographic work

I suspect that many of you see no real connection between social, political, and ethical values and what you work on. You don’t build bombs, experiment on people, or destroy the environment. You don’t spy on populations. You hack math and write papers. This doesn’t sound ethically laden. I want to show you that it is. –Phillip Rogaway...

Read more