Non-interactive multi key encryption and decryption

I need some serious suggestions on my protocol, specifically for decryption.
So the scenario is Organizations A and B encrypt their employees’ records with their respective public keys and store them in a distributed blockchain.
When a Use… Continue reading Non-interactive multi key encryption and decryption

“Developers, as you know, do not like to pay for things”

Cockroach Labs has many things going for it. The company’s approach to distributed database technology is novel, and it has the potential to gain significant market share internationally. Continue reading “Developers, as you know, do not like to pay for things”

How to select a random node when nodes are untrusted in a distributed network?

Assume in a distributed network, where the nodes are not trusted and are identified by their public keys, we intend to select one of them in a random process. In such a situation, all of the nodes have the same chances to be elected.
Since… Continue reading How to select a random node when nodes are untrusted in a distributed network?

Secure Authentication of Technical User to a Network-Appliance-HSM

Let’s assume we have an internal environment consisting of some distributed systems, one central system and an internal PKI. The central system is serving a cluster of HSMs that shall be accessable by network in a securely controlled way. … Continue reading Secure Authentication of Technical User to a Network-Appliance-HSM

Methods to Prove Data Authenticity from Potentially Compromised Sources?

I’ve been thinking about this problem for some time and I wanted to ask if there are any known methods, or research papers, about how to prove "authenticity" or correctness of data originating from a potentially compromised sourc… Continue reading Methods to Prove Data Authenticity from Potentially Compromised Sources?

Behind The Scenes Of Folding@Home: How Do You Fight a Virus with Distributed Computing?

A great big Thank You to everyone who answered the call to participate in Folding@Home, helping to understand proteins interactions of SARS-CoV-2 virus that causes COVID-19. Some members of the FAH research team hosted an AMA (Ask Me Anything) session on Reddit to provide us with behind-the-scenes details. Unsurprisingly, the …read more

Continue reading Behind The Scenes Of Folding@Home: How Do You Fight a Virus with Distributed Computing?

Coronavirus and Folding@Home; More on How Your Computer Helps Medical Research

On Wednesday morning we asked the Hackaday community to donate their extra computer cycles for Coronavirus research. On Thursday morning the number of people contributing to Team Hackaday had doubled, and on Friday it had doubled again. Thank you for putting those computers to work in pursuit of drug therapies …read more

Continue reading Coronavirus and Folding@Home; More on How Your Computer Helps Medical Research