Matthew Green's Avatar

Matthew Green

@matthewdgreen.bsky.social

I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com

17,873 Followers  |  405 Following  |  1,871 Posts  |  Joined: 28.04.2023  |  2.5502

Latest posts by matthewdgreen.bsky.social on Bluesky

Preview
Cryptographers Held an Election. They Can’t Decrypt the Results.

See if this works. If not I’ll snap screenshots. www.nytimes.com/2025/11/21/w...

22.11.2025 16:58 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

The new stuff that’s happening with function secret sharing is really cool! Not quite applicable to this yet. But I feel like maybe there’s a future where it helps.

22.11.2025 15:13 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

There’s all this cool work on function secret sharing and correlated pseudorandomness, where you can get structured output without interaction. But that work usually requires a setup! And most of it supports only 2-of-2 sharing. But I feel like we’re getting to a place where maybe this could help.

22.11.2025 15:12 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

They’re so terrible to use.

22.11.2025 15:09 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Oh, ok. I was just looking at the code. I’m don’t want to give Ben more unpaid volunteer work, I just think it’s interesting to have people research better low-interaction setup protocols. Interaction at key gen time is annoying.

22.11.2025 15:09 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

I just think it’s interesting that Helios (out of the box) doesn’t support threshold decryption. Not even the IACR’s fault exactly. I can’t lay it at Helios’s feet either, since that seems to be maintained as a volunteer project by Ben.

Anyway it’s a fun story! Let’s celebrate people caring!

22.11.2025 15:07 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Seems like Helios (out of the box) just doesn’t support it. So not even an IACR thing.

22.11.2025 15:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Well Lagrange and DKGs are pretty complicated, /*TODO*/

(I’m actually being serious. DKGs suck. If you’re focusing on research, non-interactive distributed threshold keygen protocols that are practical seems like a good place to be working.)

22.11.2025 15:03 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 2    πŸ“Œ 0

Which ones?

22.11.2025 14:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

But that doesn’t mean you should ever trust an academic cryptographer to hold important keys. You probably shouldn’t trust us with our car keys.

22.11.2025 14:54 β€” πŸ‘ 35    πŸ” 2    πŸ’¬ 2    πŸ“Œ 0

But those are still much better problems to have! You may hate cryptocurrency but it’s really accelerated our progress in being able to secure and manage keys. Nothing solves a security problem like piles of money and constant free red teaming done by North Korea.

22.11.2025 14:52 β€” πŸ‘ 29    πŸ” 4    πŸ’¬ 3    πŸ“Œ 0

The joke is that you have a software security problem, you use cryptography to solve it, now you have two problems: a software security problem and a key management problem.

22.11.2025 14:50 β€” πŸ‘ 38    πŸ” 5    πŸ’¬ 2    πŸ“Œ 0
Preview
Cryptographers Held an Election. They Can’t Decrypt the Results.

Trying to think of something serious to say about the β€œcryptographers lose the key for the cryptographer election” story and, mostly, hey: I just love that cryptographers are actually using the weird cryptography! www.nytimes.com/2025/11/21/w...

22.11.2025 14:47 β€” πŸ‘ 96    πŸ” 12    πŸ’¬ 8    πŸ“Œ 2
Preview
Cryptographers Held an Election. They Can’t Decrypt the Results.

Keys are hard. www.nytimes.com/2025/11/21/w...

22.11.2025 02:07 β€” πŸ‘ 253    πŸ” 62    πŸ’¬ 17    πŸ“Œ 19

cloudflare's on-duty IT staff bangs on the doors which I have padlocked from the inside as I calmly break open lava lamp after lava lamp and drink the contents

18.11.2025 13:59 β€” πŸ‘ 2106    πŸ” 564    πŸ’¬ 22    πŸ“Œ 10

I know this is super basic stuff but I wish it had all been spelled out better when I was learning this stuff. All sorts of weird quadratic stuff shows up in ZK proofs with no real explanation.

18.11.2025 16:22 β€” πŸ‘ 11    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Everything in MPC and ZK comes down to how many sequential multiplications a private computation requires. In (non-interactive ZK) the answer is basically two, whereas in MPC the answer is β€œmany” unless we’re willing to decompose the computation into many rounds.

18.11.2025 16:21 β€” πŸ‘ 14    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Because cryptographic vulnerabilities against US systems could potentially be exploited at large scale by countries that are US adversaries. You want those bugs shut down, not hoarded. This seems like a no-brainer but past behavior by the NSA was different.

15.11.2025 20:35 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

As I understand this: show up with a 0click in a messaging app, cool. Show up with a break in Signal’s PQC implementation, that gets fixed.

It’s actually excellent policy. But allegedly new policy.

15.11.2025 18:07 β€” πŸ‘ 31    πŸ” 0    πŸ’¬ 3    πŸ“Œ 0

I want to reiterate the β€œmountain of salt” comment here. No idea if this is for real, policy from the top, just someone’s opinion. But it’s kind of intriguing.

15.11.2025 18:06 β€” πŸ‘ 22    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

A wild rumor I heard: US agencies that purchase vulnerabilities have explicitly told their vendors *not* to bring them vulnerabilities in encryption protocols (like Signal or WhatsApp), unless they want those vulnerabilities disclosed/fixed. (Take this with a mountain of salt.)

15.11.2025 18:04 β€” πŸ‘ 41    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0
Post image 14.11.2025 15:41 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I read it and I’m pretty unsatisfied. He was coerced in a way that put the entire academic community at risk, and his answer is that he was cowardly.

In his defense I am going to assume that he organized the newspaper leak, and that’s how he got it public. But he should have made them fire him.

14.11.2025 15:41 β€” πŸ‘ 8    πŸ” 1    πŸ’¬ 3    πŸ“Œ 0

I would have appreciated this more if it had been made public at the time.

14.11.2025 15:33 β€” πŸ‘ 10    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Mafia governance in action

"the only offer on the table was that I needed to resign by 5pm that day or the DOJ would basically rain hell on UVA... If I did not resign that day, I was told that the DOJ would extract/block hundreds of millions of dollars from UVA before they would even negotiate."

14.11.2025 15:30 β€” πŸ‘ 1087    πŸ” 507    πŸ’¬ 29    πŸ“Œ 22

Law enforcement: we need to break encryption to get access to Signal to protect the children!!

Also law enforcement: for years couldn’t catch a pedophile sex trafficker who used email to coordinate all of his pedophile sex trafficking

14.11.2025 14:08 β€” πŸ‘ 125    πŸ” 46    πŸ’¬ 0    πŸ“Œ 1
Post image

That’s what my wife said too.

14.11.2025 02:52 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
undefined on Instagram: "stoolpresidenteBarstool Pizza Review - Frank’s Pizza & Pasta (Baltimore, MD) Bonus Cheesesteak ReviewView all 672 comments" stoolpresidenteBarstool Pizza Review - Frank’s Pizza & Pasta (Baltimore, MD) Bonus Cheesesteak Review

Also the cheesesteaks were from this place, so nobody was asking any more computer science questions after that point. www.instagram.com/reel/DEgHXwT...

14.11.2025 02:08 β€” πŸ‘ 15    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

Having a kid is the very best way to make yourself feel dumb.

14.11.2025 02:06 β€” πŸ‘ 51    πŸ” 1    πŸ’¬ 4    πŸ“Œ 1

The 18y/o asked me how LZW compression worked at dinner tonight and I was like β€œoh [vague stuff about building a dictionary]” and he was like yeah, obviously but how do they build the dictionary, and I realized for the 6627th time that I know 0.1% of computer science and then our cheesesteak came.

14.11.2025 02:05 β€” πŸ‘ 94    πŸ” 1    πŸ’¬ 7    πŸ“Œ 0

@matthewdgreen is following 19 prominent accounts