Cryptography on Aptos
tl;dr: (Almost?) all of the cryptography deployed on Aptos. For users, for developers and for general security.
Draft: DeKART: ZK range proofs from univariate polynomials
tl;dr: We fix up our previous non-ZK, univariate DeKART scheme and also speed up its verifier by trading off prover time.
This is joint work with Dan Boneh, Trisha Datta, Kamilla Nazirkhanova and Rex Fernando.
Identity-based encryption
$
\def\msg{m}
\def\ctxt{C}
\def\pk{\mathsf{pk}}
\def\sk{\mathsf{sk}}
\def\kgen{\mathsf{KGen}}
\def\enc{\mathsf{Enc}}
\def\dec{\mathsf{Dec}}
% IBE
\def\ibe{\mathsf{IBE}}
\def\id{\mathsf{id}}
\def\mpk{\mathsf{mpk}}
\def\msk{\mathsf{msk}}
\def\dk{\mathsf{dk}}
\def\derive{\mathsf{Derive}}
$
tl;dr: Encrypt to a phone number or an email address, rat...
Fast Reed-Solomon Interactive Oracle Proofs of Proximity (FRI)
tl;dr: For now, this page gathers some resources on FRI[^BBHR18FRI].
Digital signatures
tl;dr: Digital signatures are one of the most important cryptographic primitives today.
They are used to establish HTTPS connections with your favorite website, to securely download software updates, to provably send emails to others, to sign legal electronic documents, or to transact on a cryptocurrency like Bitcoin.
Reflecting on the moral character of cryptographic work
I suspect that many of you see no real connection between social, political, and ethical values and what you work on.
You don’t build bombs, experiment on people, or destroy the environment. You don’t spy on populations.
You hack math and write papers.
This doesn’t sound ethically laden. I want to show you that it is.
–Phillip Rogaway...
Confidential assets on Aptos
tl;dr: Confidential assets are in town! But first, a moment of silence for veiled coins.
73 post articles, 10 pages.