15 Is this it? Next-generation cryptography

This chapter covers

  • Getting rid of trusted third parties via secure multi-party computation (MPC)
  • Allowing others to act on encrypted data via fully homomorphic encryption (FHE)
  • Hiding parts of a program execution via zero-knowledge proofs (ZKPs)

I started this book with the idea that readers who would get through most of the chapters would also be interested in the future of real-world cryptography. While you’re reading an applied and practical book with a focus on what is in use today, the field of cryptography is rapidly changing (as we saw in recent years with cryptocurrencies, for example).

As you’re reading this book, a number of theoretical cryptographic primitives and protocols are making ...

Get Real-World Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.