-
The Meta-Complexity of Secret Sharing
ePrint Report: The Meta-Complexity of Secret Sharing Benny Applebaum, Oded Nir A secret-sharing scheme allows the distribution of a secret $s$ among $n$ parties, such that only certain predefined “authorized” sets of parties can reconstruct the secret, while all other “unauthorized” sets learn nothing about $s$. The collection of authorized/unauthorized sets is defined by a…
-
IND-CPA$^{text{C}}$: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption
ePrint Report: IND-CPA$^{text{C}}$: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay Fully Homomorphic Encryption (FHE) allows a server to perform computations directly over the encrypted data. In general FHE protocols, the client is tasked with decrypting the computation result using its secret…
-
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE
ePrint Report: Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE Jeffrey Champion, Yao-Ching Hsieh, David J. Wu Registered attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control to encrypted data (like standard ABE), but without needing a central trusted authority. In a key-policy registered ABE scheme, users choose their…
-
SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models
ePrint Report: SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh Selfish mining attacks present a serious threat to Bitcoin security, enabling a miner with less than 51% of the network hashrate to gain higher rewards than when mining honestly. A…
-
Eight AI trends to prioritise in 2025
Author: Richard Farrell, CIO at Netcall Whilst 2024 saw the adoption of Generative AI (GenAI) accelerate, it also witnessed significant debates and challenges surrounding its use within business from security and data privacy perspectives, with questions surrounding its true value. As CIOs prepare to tackle AI in 2025, Richard Farrell, CIO of Netcall, shares the top trends that…
-
Harnessing Generative AI for Root Cause Analysis
Author: Neha Khandelwal, Software Design Assurance Engineering Manager, Zebra Technologies Root Cause Analysis (RCA) is a critical yet time-consuming process in the realm of software quality assurance (QA). It requires meticulous investigation to pinpoint the underlying cause of defects, often involving sifting through logs, analysing code, and correlating various system behaviours. QA teams spend significant effort…
-
Introducing Labels: A new era of email organization at Tuta Mail
At Tuta Mail, we focus on delivering unparalleled security, privacy, and open source. In 2024, we were the first email provider to upgrade our encryption to quantum-resistant algorithms, ensuring your data stays protected not only now, but also in the future. This was a great achievements and a huge step for your security. Now, in…