One thing that the Messaging Layer Security working group has shown is that N cryptographers working together can be as good or better than 2 cryptographers (for N>2). You end up with a lot more complexity, but working through that complexity reveals new and powerful insights.
-
Prikaži ovu nit
-
For example, this paper on updatable public key encryption and its application to post-compromise security in a group messaging setting. The new primitive is RTreeKEM. Check out the RWC talk when it comes out or the denser and more formal ePrint. https://eprint.iacr.org/2019/1189
1 reply 4 proslijeđena tweeta 9 korisnika označava da im se sviđaPrikaži ovu nit -
Other innovations include: A standard for hybrid public key encryption. https://tools.ietf.org/html/draft-barnes-cfrg-mult-for-7748-00/ … An examination of the re-randomizability of x25519 private keys, showing that clamping and cofactors problems can be avoided with existing implementations. https://datatracker.ietf.org/doc/draft-barnes-cfrg-hpke/ …
1 reply 2 proslijeđena tweeta 4 korisnika označavaju da im se sviđaPrikaži ovu nit -
There are new problems too, like detecting malicious updates to offline parties. Maybe, like RTreeKEM, algebraic properties could be leveraged in novel way to help. Instead of ECIES+ECDSA+SHA in TreeKEM, could a Schnorr chord (UPKE + Sig + Pedersen hash) help prove consistency?
1 proslijeđeni tweet 5 korisnika označava da im se sviđaPrikaži ovu nit
Also, having people with a diversity of backgrounds and experiences with the ability to express complex ideas in a clear way and the confidence to share dissenting options has been very useful.
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.