15 Is this it? Next-generation cryptography

 

This chapter covers

  • Getting rid of trusted third parties via secure multi-party computation (MPC)
  • Allowing others to act on encrypted data via fully homomorphic encryption (FHE)
  • Hiding parts of a program execution via zero-knowledge proofs (ZKPs)

I started this book with the idea that readers who would get through most of the chapters would also be interested in the future of real-world cryptography. While you’re reading an applied and practical book with a focus on what is in use today, the field of cryptography is rapidly changing (as we saw in recent years with cryptocurrencies, for example).

As you’re reading this book, a number of theoretical cryptographic primitives and protocols are making their ways into the applied cryptography world—maybe because these theoretical primitives are finally finding a use case or because they’re finally becoming efficient enough to be used in real-world applications. Whatever the reason, the real world of cryptography is definitely growing and getting more exciting. In this chapter, I give you a taste of what the future of real-world cryptography might look like (perhaps in the next 10 to 20 years) by briefly introducing three primitives:

15.1 The more the merrier: Secure multi-party computation (MPC)

 
 

15.1.1 Private set intersection (PSI)

 
 

15.1.2 General-purpose MPC

 
 
 

15.1.3 The state of MPC

 
 

15.2 Fully homomorphic encryption (FHE) and the promises of an encrypted cloud

 
 

15.2.1 An example of homomorphic encryption with RSA encryption

 
 
 

15.2.2 The different types of homomorphic encryption

 

15.2.3 Bootstrapping, the key to fully homomorphic encryption

 
 
 

15.2.4 An FHE scheme based on the learning with errors problem

 
 
 
 

15.2.5 Where is it used?

 

15.3 General-purpose zero-knowledge proofs (ZKPs)

 
 
 
 

15.3.1 How zk-SNARKs work

 

15.3.2 Homomorphic commitments to hide parts of the proof

 
 
 

15.3.3 Bilinear pairings to improve our homomorphic commitments

 
 
 
 

15.3.4 Where does the succinctness come from?

 
 
sitemap

Unable to load book!

The book could not be loaded.

(try again in a couple of minutes)

manning.com homepage