Author: Yan strong Source: Wezhong Bank Blockchain The application life of classic cryptography technology is coming? Why does quantum computing crack existing privacy protection schemes? What are the implications of quantum communication for the design of privacy protection schemes? How to effectively deal with the challenge of quantum computing communication technology to privacy protection? Here, […]
Hashing theory No privacy, no insurance? Privacy computing constitutes a moat that users trust, and the hero behind privacy computing is cryptography, which is also one of the foundations of blockchain technology. What kind of synergy does the three have? In the third lecture of the private computing class last night, Wu Xiaochuan, a blockchain […]
Author: Li Haoxuan Source: Weizhong Bank Blockchain Unbreakable cryptographic algorithms are also afraid of physical attacks? Why does a physical signal leak threaten the effectiveness of privacy protection? What is the privacy protection plan about the deployment environment? How to design a privacy protection scheme in an untrusted execution environment? Here, we will continue to […]
After writing the previous article, I thought that the blockchain's ins and outs were finally cleared up: the earliest participants were a group of programmers, so it showed a religious culture of the community. This religious culture has witnessed two important technical movements in the history of programmer struggle, one is the free software movement […]
Write in front: Regarding SkyEye, we can easily think of the "SkyEye" digital surveillance system that monitors video, or the SkyEye check that can query corporate information, or the Skynet in the film and television work "Terminator". These systems Some can help us find useful information, and some can have very serious consequences. For example, […]
Author: Li Haoxuan Source: Weizhong Bank Blockchain After the system changes, why does the privacy data leak frequently? Is the new protocol formed by free combination of cryptographic algorithms still secure? Will the privacy protection system currently deployed still be valid after 10 years? Are the cryptographic protocols more secure and more in line with […]
Author: Li Haoxuan Source: Weizhong Bank Blockchain Why choose a cryptographic algorithm for privacy protection? What magical mathematical theories are behind cryptographic algorithms? When is 3 greater than 9? How exactly is the illusion of computational reversibility broken in mathematics? Here, we will start from the theoretical foundation of cryptographic trust and share some […]
Cryptocurrencies cannot exist without cryptography. Advances in cryptography may have a profound impact on blockchain technology and its potential. In this article we will look at industry experts' views on the latest advances in cryptography and their potential impact on cryptocurrencies. Image credit: Pixabay Zero-knowledge proof: more than just privacy Andrew Poelstra, head of research […]
Author: Kao Cheng real This article is the periodic work report of the "Key Steward" research group. I. Asymmetric cryptography is the cornerstone of building blockchain applications Asymmetric cryptography has always played a key role in information systems, and has become the basis for building many core functions of information systems. In the blockchain system, […]
This article was written by Dr. Zhichen Chen. 1.List of Full Homomorphic Encryption Papers 1. http://people.csail.mit.edu/vinodv/FHE/FHE-refs.html This is a list classified by homomorphic encryption 2. http://eprint.iacr.org This site is estimated by anyone who knows cryptography. You can find all articles about homomorphism by the keyword "homomorphism". 3. http://arxiv.org/list/cs.CR/pastweek?skip=0&show=25 A list of articles hosted by Cornell […]
April 16, 2020
April 16, 2020
April 16, 2020
April 16, 2020