-
**Project name:**
Itheum (World's 1st Decentralised Data Brokerage which aims to build a Trusted Computation Framework layer on Alaya/PlatON
**Project repository:**
- Data DEX: https://github.co…
-
I see many papers are using Garbled Circuits instead of Secret Sharing. Why did they use the costly GC instead of SS?
-
We're going to add multisig support to the .stone format, as per-package verification is inherently far more secure than index-based verification.
As part of our build infrastructure, each build ma…
-
I want to warn that use of side channels like Lightning and Raiden are not as secure as using Ethereum. If there is any attack you could all of the transaction amount. If you are going to use it, I'd …
-
### Data Owner Name
WEITU
### Data Owner Country/Region
China
### Data Owner Industry
IT & Technology Services
### Website
N/A
### Social Media Handle
N/A
### Social Media Type
WeChat
### …
-
In the sunrise of the Quantum Era, what is needed most is cybersecurity.
With IBM commercializing their quantum computing systems, it leaves the door open for malicious "black hat" hackers to hijack…
-
As far as I can tell the current thread model does not cover attackers who get unauthorized access to a device. Let Alice be the device owner and Bob the Adversary. Once Bob learns `SK_t`, he can imme…
-
VSecM high-trust mode: Use a PKCS#11 interface to store VSecM root keys in a hardware security module and keep secrets encrypted (even in memory). When a workload requires a secret VSecM safe will use…
-
## Motivation
Current XGBoost introduced the support for Federated Learning, both horizontal and vertical. However, their capability in supporting secure features is limited. Based on basic arithmeti…
-
## Question
is it possible to train a neural network on encrypted values using Secure Multi-Party Computation and Autograd?
## Further Information
I found a blog from pysyft that can perform encr…