HOME
*





Aggelos Kiayias
Aggelos Kiayias ( el, Άγγελος Κιαγιάς) Fellowship of the Royal Society of Edinburgh, FRSE is a Greeks, Greek cryptographer and computer scientist, currently a professor at the University of Edinburgh and the Chief Science Officer at Input Output Global, the company behind Cardano (blockchain platform), Cardano. Education Kiayias received his PhD in 2002 at the City University of New York; his advisors were Moti Yung and Stathis Zachos. Career and research Kiayias is the chair in cyber security and privacy, and director of the Blockchain Technology Laboratory at the University of Edinburgh, as well as a member of its Laboratory for Foundations of Computer Science. He is also the chief scientist at the blockchain technology company IOHK (IOG). Previously he worked at the University of Connecticut and at the National and Kapodistrian University of Athens. In 2017, Kiayias started a blockchain course, making Edinburgh “one of the first big European universities ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ouroboros (protocol)
Ouroboros is a family of proof-of-stake consensus protocols used in the Cardano and Polkadot blockchains. It can run both permissionless and permissioned blockchains. Ouroboros was published as "the first provable secure PoS consensus protocol". It was postulated by an academic team led by Aggelos Kiayias at the Annual International Cryptology Conference in 2017. Later that year, Ouroboros (Classic) was implemented by IOHK as the basis of the Cardano blockchain platform and various upgrades. Ouroboros versions include: * Ouroboros BFT was an interim version used in 2020 to enable the switch between the Classic and Praos versions of Cardano using a hard fork combinator that preserved the blockchain history; * Ouroboros Praos (2017) provided security against fully-adaptive corruption in the semi-synchronous model. In 2020, this version was used to introduce decentralized block production on Cardano by stake pools; * Ouroboros Genesis (2018) provides security with a dynamic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Science
Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to practical disciplines (including the design and implementation of hardware and software). Computer science is generally considered an area of academic research and distinct from computer programming. Algorithms and data structures are central to computer science. The theory of computation concerns abstract models of computation and general classes of problems that can be solved using them. The fields of cryptography and computer security involve studying the means for secure communication and for preventing security vulnerabilities. Computer graphics and computational geometry address the generation of images. Programming language theory considers different ways to describe computational processes, and database theory concerns the management of repositories o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Laboratory For Foundations Of Computer Science
The Laboratory for Foundations of Computer Science (LFCS) is a research institute within the School of Informatics at the University of Edinburgh, in Scotland. It was founded in 1987 and is a community of theoretical computer scientists with interests in concurrency, semantics, categories, algebra, types, logic, algorithms, complexity, databases In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases spa ... and modelling. References External links LFCS websitePeople
University of Edinburgh School of Informatics
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Real World Crypto Symposium
Real may refer to: Currencies * Brazilian real (R$) * Central American Republic real * Mexican real * Portuguese real * Spanish real * Spanish colonial real Music Albums * ''Real'' (L'Arc-en-Ciel album) (2000) * ''Real'' (Bright album) (2010) * ''Real'' (Belinda Carlisle album) (1993) * ''Real'' (Gorgon City EP) (2013) * ''Real'' (IU EP) (2010) * ''Real'' (Ivy Queen album) (2004) * ''Real'' (Mika Nakashima album) (2013) * ''Real'' (Ednita Nazario album) (2007) * ''Real'' (Jodie Resther album), a 2000 album by Jodie Resther * ''Real'' (Michael Sweet album) (1995) * ''Real'' (The Word Alive album) (2014) * ''Real'', a 2002 album by Israel Houghton recording as Israel & New Breed Songs * "Real" (Goo Goo Dolls song) (2008) * "Real" (Gorgon City song) (2013) * "Real" (Plumb song) (2004) * "Real" (Vivid song) (2012) * "Real" (James Wesley song) (2010) * "Real", a song by Kendrick Lamar from ''Good Kid, M.A.A.D City'' * "Real", a song by NF from ''Therapy Session'' * "Re ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Public Key Cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security. In a public-key encryption system, anyone with a public key can encrypt a message, yielding a ciphertext, but only those who know the corresponding private key can decrypt the ciphertext to obtain the original message. For example, a journalist can publish the public key of an encryption key pair on a web site so that sources can send secret messages to the news organization in ciphertext. Only the journalist who knows the corresponding private key can decrypt the ciphertexts to obtain the sources' messages—an eavesd ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




International Association For Cryptologic Research
International is an adjective (also used as a noun) meaning "between nations". International may also refer to: Music Albums * ''International'' (Kevin Michael album), 2011 * ''International'' (New Order album), 2002 * ''International'' (The Three Degrees album), 1975 *''International'', 2018 album by L'Algérino Songs * The Internationale, the left-wing anthem * "International" (Chase & Status song), 2014 * "International", by Adventures in Stereo from ''Monomania'', 2000 * "International", by Brass Construction from ''Renegades'', 1984 * "International", by Thomas Leer from ''The Scale of Ten'', 1985 * "International", by Kevin Michael from ''International'' (Kevin Michael album), 2011 * "International", by McGuinness Flint from ''McGuinness Flint'', 1970 * "International", by Orchestral Manoeuvres in the Dark from '' Dazzle Ships'', 1983 * "International (Serious)", by Estelle from '' All of Me'', 2012 Politics * Political international, any transnational organization o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptographic Voting System
End-to-end auditable or end-to-end voter verifiable (E2E) systems are voting systems with stringent integrity properties and strong tamper resistance. E2E systems often employ cryptographic methods to craft receipts that allow voters to verify that their votes were counted as cast, without revealing which candidates were voted for. As such, these systems are sometimes referred to as receipt-based systems. Overview Electronic voting systems arrive at their final vote totals by a series of steps: # each voter has an original intent, # voters express their intent on ballots (whether interactively, as on the transient display of a DRE voting machine, or durable, as in systems with voter verifiable paper trails), # the ballots are interpreted, to generate electronic cast vote records, # cast vote records are tallied, generating totals # where counting is conducted locally, for example, at the precinct or county level, the results from each local level are combined to produce the fin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Key Generation
Key generation is the process of generating keys in cryptography. A key is used to encrypt and decrypt whatever data is being encrypted/decrypted. A device or program used to generate keys is called a key generator or keygen. Generation in cryptography Modern cryptographic systems include symmetric-key algorithms (such as DES and AES) and public-key algorithms (such as RSA). Symmetric-key algorithms use a single shared key; keeping data secret requires keeping this key secret. Public-key algorithms use a public key and a private key. The public key is made available to anyone (often by means of a digital certificate). A sender encrypts data with the receiver's public key; only the holder of the private key can decrypt this data. Since public-key algorithms tend to be much slower than symmetric-key algorithms, modern systems such as TLS and SSH use a combination of the two: one party receives the other's public key, and encrypts a small piece of data (either a symmetric k ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Anonymity
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques. An important example for anonymity being not only protected, but enforced by law is the vote in free elections. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural. There are also various situations in which a person might choose to withhold their identity. Acts of cha ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Traitor Tracing
Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers. In a traitor tracing scheme, each customer is given a different personal decryption key. (Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.) Traitor tracing schemes are used in pay television to discourage pirate decryption – to discourage legitimate subscribers from giving away decryption keys. Traitor tracing schemes are ineffective if the traitor rebroadcasts the entire (decrypted) original content. There are other kinds of schemes that discourages pirate rebroadcast – i.e., discourages legitimate subscri ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Group Signature
A group signature scheme is a method for allowing a member of a group to anonymously sign a message on behalf of the group. The concept was first introduced by David Chaum and Eugene van Heyst in 1991. For example, a group signature scheme could be used by an employee of a large company where it is sufficient for a verifier to know a message was signed by an employee, but not which particular employee signed it. Another application is for keycard access to restricted areas where it is inappropriate to track individual employee's movements, but necessary to secure areas to only employees in the group. Essential to a group signature scheme is a ''group manager'', who is in charge of adding group members and has the ability to reveal the original signer in the event of disputes. In some systems the responsibilities of adding members and revoking signature anonymity are separated and given to a membership manager and revocation manager respectively. Many schemes have been proposed, how ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]