Homomorphism

If Zero Knowledge Proofs are the kind of magic seen in a full fledged opera theater, Homomorphisms in Cryptography are like intimate card tricks done in a 1-1 setting. Less grand, less machinery at work, but elegant and counter-intuitive all the same. You hear about homomorphism in encryption first. They also appear in commitment schemes […]

This Before That

This article is ostensibly about why the challenge space in an interactive zero knowledge proof has to be large. Understanding this rather obscure theoretical aspect of zero knowledge proofs is quite rewarding intellectually. I promise. Let me start with a trivial question. How do you convince yourself that something happened before something else? Here’re some […]

Trusting Trust

Ken Thompson is a Turing Award winner and an all-around genius – gave a seminal talk during his Turing Award acceptance called “Reflections on Trusting Trust.” In it, he shows how to sneak a Trojan horse into your application (in his case, the Unix operating system) while you compile the source code of the application […]

Bitcoin’s secret sauce

Bitcoin’s secret sauce, and how it works, was on full display these last few weeks. Bitcoin was designed to work against the most powerful of adversaries, and boy – did the adversary show up! China Ban A few months ago, 45% to 75% of Bitcoin mining happened inside China. Then the Chinese government banned it. […]