InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEProxy Re-Encryption — Allowing Alice To Share Her Protect Secret Key With BobLet’s say that Alice has stored an encrypted file, and which uses a given key (K_A). Alice can then protect her key by encrypting the key…Feb 12, 20222Feb 12, 20222
InPrivacy & Scaling ExplorationsbyKyle CharbonnetA Technical Introduction to MACI 1.0Introduction a. BackgroundJan 18, 20221Jan 18, 20221
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEEverything You Want To Know About AES, But Were Afraid To Ask …The workhorse of the cybersecurity industry is AES (Advanced Encryption Standard) and which is used to encrypt and decrypt data. The…Jan 22, 2022Jan 22, 2022
Prof Bill Buchanan OBE FRSEThe Answer to Life, The Universe, and Cybersecurity …Oh, I miss Douglas Adam’s writing. I hung on everyone word of Hitcher’s Guide to the Gallery, and just love the BBC programme. I even…Jan 15, 2022Jan 15, 2022
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEPedersen Verifiable Secret Shares (PVSS), Commitments and Spotting A Bad Dealer and a Cheating…Okay. Let’s say you are in a card game, how do you know that the dealer is honest, and that the other players are also honest? Well, let’s…Dec 11, 2021Dec 11, 2021
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEHomomorphic Subtraction Is So Much More Useful Than Homomorphic Addition?Paillier addition is fairly straight forward, and where we multiply the ciphers, but the subtraction operation can be a little sticky…Dec 22, 20211Dec 22, 20211
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEKey Distribution Generators using FROST and KryptologyOne of the most important challenges within cybersecurity is key management. This is a way that organisations store encryption keys and can…Dec 20, 20211Dec 20, 20211
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEBuilding A New Digital World: Threshold Signing and Key Distribution GenerationWe live in an old legacy digital world. Many of the methods and protocols we use were created in a time when security was not really an…Dec 21, 2021Dec 21, 2021