See if this works. If not Iβll snap screenshots. www.nytimes.com/2025/11/21/w...
22.11.2025 16:58 β π 2 π 0 π¬ 1 π 0@matthewdgreen.bsky.social
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com
See if this works. If not Iβll snap screenshots. www.nytimes.com/2025/11/21/w...
22.11.2025 16:58 β π 2 π 0 π¬ 1 π 0The new stuff thatβs happening with function secret sharing is really cool! Not quite applicable to this yet. But I feel like maybe thereβs a future where it helps.
22.11.2025 15:13 β π 5 π 0 π¬ 0 π 0Thereβs all this cool work on function secret sharing and correlated pseudorandomness, where you can get structured output without interaction. But that work usually requires a setup! And most of it supports only 2-of-2 sharing. But I feel like weβre getting to a place where maybe this could help.
22.11.2025 15:12 β π 4 π 0 π¬ 0 π 0Theyβre so terrible to use.
22.11.2025 15:09 β π 2 π 0 π¬ 1 π 0Oh, ok. I was just looking at the code. Iβm donβt want to give Ben more unpaid volunteer work, I just think itβs interesting to have people research better low-interaction setup protocols. Interaction at key gen time is annoying.
22.11.2025 15:09 β π 2 π 0 π¬ 1 π 0I just think itβs interesting that Helios (out of the box) doesnβt support threshold decryption. Not even the IACRβs fault exactly. I canβt lay it at Heliosβs feet either, since that seems to be maintained as a volunteer project by Ben.
Anyway itβs a fun story! Letβs celebrate people caring!
Seems like Helios (out of the box) just doesnβt support it. So not even an IACR thing.
22.11.2025 15:04 β π 0 π 0 π¬ 1 π 0Well Lagrange and DKGs are pretty complicated, /*TODO*/
(Iβm actually being serious. DKGs suck. If youβre focusing on research, non-interactive distributed threshold keygen protocols that are practical seems like a good place to be working.)
Which ones?
22.11.2025 14:54 β π 0 π 0 π¬ 1 π 0But that doesnβt mean you should ever trust an academic cryptographer to hold important keys. You probably shouldnβt trust us with our car keys.
22.11.2025 14:54 β π 35 π 2 π¬ 2 π 0But those are still much better problems to have! You may hate cryptocurrency but itβs really accelerated our progress in being able to secure and manage keys. Nothing solves a security problem like piles of money and constant free red teaming done by North Korea.
22.11.2025 14:52 β π 29 π 4 π¬ 3 π 0The joke is that you have a software security problem, you use cryptography to solve it, now you have two problems: a software security problem and a key management problem.
22.11.2025 14:50 β π 38 π 5 π¬ 2 π 0Trying to think of something serious to say about the βcryptographers lose the key for the cryptographer electionβ story and, mostly, hey: I just love that cryptographers are actually using the weird cryptography! www.nytimes.com/2025/11/21/w...
22.11.2025 14:47 β π 96 π 12 π¬ 8 π 2Keys are hard. www.nytimes.com/2025/11/21/w...
22.11.2025 02:07 β π 253 π 62 π¬ 17 π 19cloudflare's on-duty IT staff bangs on the doors which I have padlocked from the inside as I calmly break open lava lamp after lava lamp and drink the contents
18.11.2025 13:59 β π 2106 π 564 π¬ 22 π 10I know this is super basic stuff but I wish it had all been spelled out better when I was learning this stuff. All sorts of weird quadratic stuff shows up in ZK proofs with no real explanation.
18.11.2025 16:22 β π 11 π 0 π¬ 0 π 0Everything in MPC and ZK comes down to how many sequential multiplications a private computation requires. In (non-interactive ZK) the answer is basically two, whereas in MPC the answer is βmanyβ unless weβre willing to decompose the computation into many rounds.
18.11.2025 16:21 β π 14 π 0 π¬ 1 π 0Because cryptographic vulnerabilities against US systems could potentially be exploited at large scale by countries that are US adversaries. You want those bugs shut down, not hoarded. This seems like a no-brainer but past behavior by the NSA was different.
15.11.2025 20:35 β π 3 π 1 π¬ 1 π 0As I understand this: show up with a 0click in a messaging app, cool. Show up with a break in Signalβs PQC implementation, that gets fixed.
Itβs actually excellent policy. But allegedly new policy.
I want to reiterate the βmountain of saltβ comment here. No idea if this is for real, policy from the top, just someoneβs opinion. But itβs kind of intriguing.
15.11.2025 18:06 β π 22 π 1 π¬ 1 π 0A wild rumor I heard: US agencies that purchase vulnerabilities have explicitly told their vendors *not* to bring them vulnerabilities in encryption protocols (like Signal or WhatsApp), unless they want those vulnerabilities disclosed/fixed. (Take this with a mountain of salt.)
15.11.2025 18:04 β π 41 π 5 π¬ 1 π 0I read it and Iβm pretty unsatisfied. He was coerced in a way that put the entire academic community at risk, and his answer is that he was cowardly.
In his defense I am going to assume that he organized the newspaper leak, and thatβs how he got it public. But he should have made them fire him.
I would have appreciated this more if it had been made public at the time.
14.11.2025 15:33 β π 10 π 0 π¬ 1 π 0Mafia governance in action
"the only offer on the table was that I needed to resign by 5pm that day or the DOJ would basically rain hell on UVA... If I did not resign that day, I was told that the DOJ would extract/block hundreds of millions of dollars from UVA before they would even negotiate."
Law enforcement: we need to break encryption to get access to Signal to protect the children!!
Also law enforcement: for years couldnβt catch a pedophile sex trafficker who used email to coordinate all of his pedophile sex trafficking
Thatβs what my wife said too.
14.11.2025 02:52 β π 2 π 0 π¬ 0 π 0Also the cheesesteaks were from this place, so nobody was asking any more computer science questions after that point. www.instagram.com/reel/DEgHXwT...
14.11.2025 02:08 β π 15 π 0 π¬ 2 π 0Having a kid is the very best way to make yourself feel dumb.
14.11.2025 02:06 β π 51 π 1 π¬ 4 π 1The 18y/o asked me how LZW compression worked at dinner tonight and I was like βoh [vague stuff about building a dictionary]β and he was like yeah, obviously but how do they build the dictionary, and I realized for the 6627th time that I know 0.1% of computer science and then our cheesesteak came.
14.11.2025 02:05 β π 94 π 1 π¬ 7 π 0