15 Is this it? Next-generation cryptography
This chapter covers
- Getting rid of trusted third parties via secure multi-party computation (MPC)
- Allowing others to act on encrypted data via fully homomorphic encryption (FHE)
- Hiding parts of a program execution via zero-knowledge proofs (ZKPs)
I started this book with the idea that readers who would get through most of the chapters would also be interested in the future of real-world cryptography. While you’re reading an applied and practical book with a focus on what is in use today, the field of cryptography is rapidly changing (as we saw in recent years with cryptocurrencies, for example).
As you’re reading this book, a number of theoretical cryptographic primitives and protocols are making ...
Get Real-World Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.