-
Investigate the possibility of JS using the SDK running in [React](https://react.dev/) to call native executable code.
This case is useful to provide hight speed and secure cryptographic support to r…
-
Hello Keller,
In the paper "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (Usenix Security 2023), the authors point out that the truncpr protocol proposed …
-
> **Note:** this is a bit messy, will be cleaned some time soon
## Background
- **Privacy-preserving computation**: either X of F are hidden to who computes F(X)
- **Verifiable computation**: A…
-
Hi Marcel, hope you are doing well. I have a question about the 3PC protocol in appendix A of "Secure Quantized Training for Deep Learning", which leverages mixed-circuit computation. From my understa…
-
HE is the process of performing operations directly on encrypted data
HE is more computationally expensive, but doesn't require any interaction between parties. MPC is computationally cheaper, but …
-
I came across this tidbit when reading the Gazelle Paper [1]
> Book-keeping: Hoisting
>
> The hoisting optimization reduces the cost of the ciphertext
> rotation when the same ciphertext must b…
j2kun updated
2 weeks ago
-
1. **Design a generic gate**: Create a generic gate that can be used to build complex digital circuits.
2. **Implement arithmetic circuits**: Implement arithmetic circuits using the generic gate, whic…
-
## Call to Action
This research initiative aims to explore and identify potential use-cases for Polykey, with a particular focus on web-3 environments where our decentralized architecture could off…
-
When doing keygen you have to somehow do an out of band check with each party that they have the same result, or assume a PKI setup (which can be setup with an out-of-band check). A typical way to do …
-
Following on from #25 , let's try and output to a PDF using IEEE journal format.
https://template-selector.ieee.org/secure/templateSelector/publicationType, I picked Journal/IEEE Transactions on E…