Before the events of 2020 called a halt to face-to-face collaboration, the World Economic Forum Annual Meeting in Davos, Switzerland, was one of the biggest events on the international calendar. During the previous two meetings in 2018 and 2019, digital identity became a discussion topic high on the agenda due to its role in unlocking new economic value for governments of developed and developing countries alike.

Now that the fallout from the global pandemic continues to unfold, the imperative for digitalization is more dominant than ever before. …


Riko Jacob, Kasper Green Larsen, and Jesper Buus Nielsen

(Submitted in Mars 2019)

An oblivious data structure is a data structure where the memory access patterns reveals no information about the operations performed on it.

Such data structures were introduced by Wang et al. [ACM SIGSAC’14] and are intended for situations where one wishes to store the data structure at an untrusted server.

One way to obtain an oblivious data structure is simply to run a classic data structure on an oblivious RAM (ORAM).

Until very recently, this resulted in an overhead of ω(lg n) for the most natural setting…


Riko Jacob, Kasper Green Larsen, and Jesper Buus Nielsen

(Submitted in Mars 2019)

An oblivious data structure is a data structure where the memory access patterns reveals no information about the operations performed on it.

Such data structures were introduced by Wang et al. [ACM SIGSAC’14] and are intended for situations where one wishes to store the data structure at an untrusted server.

One way to obtain an oblivious data structure is simply to run a classic data structure on an oblivious RAM (ORAM).

Until very recently, this resulted in an overhead of ω(lg n) for the most natural setting…


Diego F. Aranha, and Elena Pagnin

(Submitted on January 2019)

We consider the problem of outsourcing computation on data authenticated by different users. Our aim is to describe and implement the simplest possible solution to provide data integrity in cloud- based scenarios.

Concretely, our multi-key linearly homomorphic signature scheme (mklhs) allows users to upload signed data on a server, and at any later point in time any third party can query the server to compute a linear combination of data authenticated by different users and check the correctness of the returned result.

Our construction generalizes Boneh et al.’s linearly homomorphic…


Dominic Deuber, Bernardo Magri, Sri Aravinda Krishnan Thyagarajan

(Submitted on 10 Jan 2019 (v1), last revised 9 Oct 2019 (this version, v3))

Bitcoin is an immutable permissionless blockchain system that has been extensively used as a public bulletin board by many different applications that heavily relies on its immutability. However, Bitcoin’s immutability is not without its fair share of demerits. Interpol exposed the existence of harmful and potentially illegal documents, images and links in the Bitcoin blockchain, and since then there have been several qualitative and quantitative analysis on the types of data currently residing in the Bitcoin blockchain.

Although…


Danil Annenkov, Jakob Botsch Nielsen, Bas Spitters

(Submitted on 24 Jul 2019 (v1), last revised 20 Dec 2019 (this version, v4))

We present a new way of embedding functional languages into the Coq proof assistant by using meta-programming.

This allows us to develop the meta-theory of the language using the deep embedding and provides a convenient way for reasoning about concrete programs using the shallow embedding. We connect the deep and the shallow embeddings by a soundness theorem.

As an instance of our approach, we develop an embedding of a core smart contract language into Coq and verify several important…


Release Date: October 29th, 2019

General

Supported Platforms

  • All devices running iOS 11.0 and higher

Features

  • When a crash occurs we’ll ask politely to submit the technical details, that will allow us to investigate the issue and improve app’s stability
  • Transactions screen was introduced to present the extended transactions info

Improvements

  • Loading bar works smoother and is a bit more informative
  • Payment proof screen, settings screens, transaction details screen, tag edit screen, main menu, transaction statuses and icons updated to match the new design
  • Show owner key flow became more informative
  • Transaction actions can be triggered through haptic touch / 3d touch

Fixes

  • Many…


Introduction

In modern societies, human beings are conscious of their rights, and the right to privacy is now globally accepted. Several legislations exist from Europe to North America but also in Asia and more particularly in Japan.

Still, a perception of the idea of privacy and its significance is not fundamentally universal. In Japan, due to a specific idiosyncrasy, including one particular cultural and linguistic situation, the right to privacy is part of a subjective notion, coming from the Judeo-Christian civilization.

Privacy in Japan, not a concept but a law

The digital revolution forced the Japanese regulator to build a legal framework in 2005[1] when one of the main goals…


The philosophical approach has given insufficient attention so far to the problem of privacy as such the structure of reference within which the privacy paradigm has so lately and extensively become a matter of a dispute is a modern one.

Is Privacy ‘only’ a value?

Good and Evil — Ary Scheffer, 1854

What has not been addressed, or at least made explicit, is why privacy is commonly considered a right or a value, when its ontology forces to outstrip any morality. There is no historical consensus in Philosophy that privacy is a right. Few philosophers would claim that privacy is a “physical” right or that the fundamental essence of privacy establishes it…

Beni Issembert

Tragic Cypher Punk | Writer and truth seeker | Family guy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store