Highlights
全同态加密理论、生态现状与未来展望
介绍全同态加密知识理论、全同态加密四代算法中第一代第二代FHE算法的衍化历程、全同态加密四代算法中第三代第四代FHE算法的衍化历程、介绍全同态加密生态现状及未来展望。
Introduction to the theoretical knowledge of Fully Homomorphic Encryption (FHE), the evolutionary process of the first and second generations of FHE algorithms within the four generations of FHE algorithms, the evolutionary process of the third and fourth generations of FHE algorithms within the four generations of FHE algorithms, and an overview of the current state of the FHE ecosystem and its future prospects.
The Mathematics of Lattice-Based Cryptography
介绍基于格的加密系统(例如 Kyber 和 Dilithim)背后的核心数学。
An introduction to the core mathematics behind lattice-based cryptographic systems such as Kyber and Dilithim.
FRI and Proximity Proofs (Part.1) w/ Dan Boneh
斯坦福大学教授 Dan Boneh 详细讲解 FRI 的密码学基础,包括线性码、IOP、RS-IOPP 与 SNARK 的转换及距离保持变换。
In this module (Part.1), Prof. Dan Boneh, applied cryptography and computer security professor at Stanford University, provides a comprehensive overview of FRI (Fast Reed-Solomon Interactive Oracle Proofs of Proximity) and its foundations in cryptography. Prof. Boneh begins with essential background on linear codes and Interactive Oracle Proofs (IOPs), then demonstrates how to compile a Polynomial-IOP into a SNARK using Reed-Solomon IOP of Proximity, before diving into distance preserving transformations with detailed examples of batch RS-IOPP and folding.
Why We Can't Build Perfectly Secure Multi-Party Applications (yet)
多方计算应用受安全与活性权衡限制,MTCS 模型提供部分解决方案,iO 将是未来突破点。
Secure multi-party apps face tradeoffs; MTCS offers partial fixes, iO holds future promise.
Homomorphic Encryption in iOS 18
苹果在 iOS 18 中使用同态加密实现隐私保护搜索,平衡性能与隐私仍存挑战。
Apple uses homomorphic encryption in iOS 18 for private search, balancing privacy and performance with room for improvement.
Updates
Quantum Punk - Resources
ICICLE V3.4
Papers
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains
VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness
Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol
Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure
IND-CPA^C: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption
The Meta-Complexity of Secret Sharing
Time-Lock Puzzles from Lattices
Founding Zero-Knowledge Proofs of Training on Optimum Vicinity
Hash-Based Multi-Signatures for Post-Quantum Ethereum
Skyscraper: Fast Hashing on Big Primes
Fair Signature Exchange
CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures
SoK: Trusted setups for powers-of-tau strings
Morgana: a laconic circuit builder
Shielded CSV: Private and Efficient Client-Side Validation
The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption
If you’d like to receive updates via email, subscribe
us!