🌲 DeKART: ZK range proofs from univariate polynomials
tl;dr: We present DeKART: a batched ZK range proof for a KZG-committed vector, inspired from Borgeaud’s unbatched protocol1.
This is joint work with Dan Boneh, Trisha Datta, Kamilla Nazirkhanova and Rex Fernando.
Note that this blog fixes up a previous non-ZK variant and allows for a trading off proving speed for faster verification.
...
🌲 Identity-based encryption
$
\def\msg{m}
\def\ctxt{C}
\def\pk{\mathsf{pk}}
\def\sk{\mathsf{sk}}
\def\kgen{\mathsf{KGen}}
\def\enc{\mathsf{Enc}}
\def\dec{\mathsf{Dec}}
% IBE
\def\ibe{\mathsf{IBE}}
\def\tibe{\mathsf{IBE}}
\def\id{\mathsf{id}}
\def\mpk{\mathsf{mpk}}
\def\msk{\mathsf{msk}}
\def\dk{\mathsf{dk}}
\def\derive{\mathsf{Derive}}
$
tl;dr: Encrypt to a phone number ...
🌲 Encryption
tl;dr: This is how it all started: folks wanted to “encrypt.” What does that mean?
🌱 Fast Reed-Solomon Interactive Oracle Proofs of Proximity (FRI)
tl;dr: For now, this page gathers some resources on FRI[^BBHR18FRI].
🌲 Digital signatures
tl;dr: Digital signatures are one of the most important cryptographic primitives today.
They are used to establish HTTPS connections with your favorite website, to securely download software updates, to provably send emails to others, to sign legal electronic documents, or to transact on a cryptocurrency like Bitcoin.
🌲 Reflecting on the moral character of cryptographic work
I suspect that many of you see no real connection between social, political, and ethical values and what you work on.
You don’t build bombs, experiment on people, or destroy the environment. You don’t spy on populations.
You hack math and write papers.
This doesn’t sound ethically laden. I want to show you that it is.
–Phillip Rogaway...
🌱 Confidential assets on Aptos
tl;dr: Confidential fungible assets (CFAs) are in town! But first, a moment of silence for veiled coins.
🌲 Montgomery's trick for batched field inversions
tl;dr: For now, just including my tweet, which I keep having to look up to show to people.
105 post articles, 14 pages.