tag:blogger.com,1999:blog-5722310642266356003.post1692877717141048855..comments2024-01-07T23:21:32.676+01:00Comments on The Axis of Eval: PL nerds: learn cryptography insteadUnknownnoreply@blogger.comBlogger3125tag:blogger.com,1999:blog-5722310642266356003.post-4803582947288097152011-07-16T06:49:18.536+02:002011-07-16T06:49:18.536+02:00Hi Manuel, I also first learned to appreciate cryp...Hi Manuel, I also first learned to appreciate cryptography after studying Tahoe-LAFS!<br /><br />My favorite revelations, though, have come from Homomorphic Encryption and Secure Multiparty Computation. These are by far the most interesting areas in modern crypto.<br /><br />The important result of HE is that you can offload arbitrary program to a cloud computer service, without the cloud service having access to your input data or the code itself (time/cost efficiency is pretty poor for the time being)<br />- http://en.wikipedia.org/wiki/Homomorphic_encryption <br />Also read anything by Craig Gentry, his thesis or the i-Hop paper<br /><br />Secure Multiparty Computation:<br />Real life application of a Sugar Beet Auction between three large parties that don't trust each other http://fc09.ifca.ai/papers/15_Secure_MPC_goes_live.pdf<br />Important results:<br /> It's possible for a group of N people to construct a keypair such that no individual knows the key, only a minimum M/N subset can sign messages with it.<br /><br />I hope you find these avenues of thought as interesting as I have!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5722310642266356003.post-84163459352078448022011-07-11T00:43:13.265+02:002011-07-11T00:43:13.265+02:00Thanks, I'll look into these.
There is a lot ...Thanks, I'll look into these.<br /><br /><em>There is a lot more that can be done leveraging the idea of cryptography than is done by Tahoe-LAFS.</em><br /><br />I'm excitedly looking forward to your blog post on this topic! :)Manuel Simonihttps://www.blogger.com/profile/07840673741485280526noreply@blogger.comtag:blogger.com,1999:blog-5722310642266356003.post-39077597914530736142011-07-10T22:26:22.038+02:002011-07-10T22:26:22.038+02:00I would suggest reading 'Policing Online Games...I would suggest reading 'Policing Online Games' from Peter Wayner, which provides several patterns involving cryptography. <br /><br />You can also review the use of sealer/unsealer patterns in E language, including the Horton protocol. And I also remember some interesting essays from Nick Szabo.<br /><br />There is a lot more that can be done leveraging the idea of cryptography than is done by Tahoe-LAFS.dmbarbourhttps://www.blogger.com/profile/12370605342201490009noreply@blogger.com